StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Depersonalization and the Protection of Personal Privacy - Research Paper Example

Cite this document
Summary
"Depersonalization and the Protection of Personal Privacy" paper explores depersonalization as an effective method of personal data collection, where privacy is still protected. Depersonalization is an effective solution to personal privacy concerns amidst the tremendous power of government. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Depersonalization and the Protection of Personal Privacy
Read Text Preview

Extract of sample "Depersonalization and the Protection of Personal Privacy"

?Depersonalization and the Protection of Personal Privacy The rapid development of computing technology has led to the emergence of the greater capacity to store personal data. These data are important and collected because of research. Governments collect them for the evaluation of its programs or for use databases such as in law enforcement and social security. Businesses are voracious consumers of these data because they are crucial in the success of several operations because they record habits, preferences, among other patterns of individual activities that help them develop, market and sell products and services. Computers and the Internet paved the way for more efficient and fast methods to gather, store and organize personal information. Since the 1970s the number of computer data banks or databases became staggering. There are the databases from Social Security Administration, Federal Bureau of Investigation, Medical Information Bureau, state criminal justice systems, municipal data systems, credit card companies, telephone companies, Medicaid, and, recently, Google, Facebook and so much more. The huge amount of information that governments and businesses collect from individuals have become a cause of concern. Personal data collection encroaches on the individual’s right, particularly as it invades privacy or the right to control information about ourselves; there is a disclosure of private personal facts; and, the information can be used in such a way that a person is cast in a bad light or in a case of identity theft. The method of personal data collection, its use and security, hence, necessitate citizen protection. Through the years, laws have enacted that aim to protect personal privacy but they appear to be insufficient. This paper will explore depersonalization as an effective method of personal data collection, where privacy is still protected. Legal Protection The foundation of legal protection against indiscriminate collection of private data is a Congressional report that outlined four tenets of fair information practices, namely: 1. Notice or the disclosure of the details of data gathering practices, policies and results to data subjects. 2. Choice or the ability of the data subjects to exercise choices about how their personal data can be used. 3. Access or the level of access provided to individuals on the gathered data about them. 4. Security or the responsibility of data gatherers to provide adequate protection for the information collected (Bidgoli 2004, 98). Based from these principles, a number of laws were enacted covering individual privacy across different sectors. For instance, the Gramm-Leach-Bliley Act protects personal banking information; the Fair Credit Reporting Act provides the framework for handling personal credit data. There are also laws that cover the collection and use of medical and health data, government records, children’s privacy, and so forth. Laws are also enacted in other countries such as the European Union Data Protection Directive, the OECD privacy guidelines adopted by countries such as Mexico, Australia, Japan and Czech Republic (Conrad, Misenar and Feldman 2012, 401). But these laws and even some ethical guidelines (see Kluge 2000), no matter how specific and comprehensive, still fail to address privacy issues. Neubauer and Kolb (2009), for example, noted that approaches and methods for protecting privacy often do not comply with legal requirements or basic security requirements without suffering any penalty, (7). Szeto and Miri (2007) revealed the same findings when they studied the Canadian experience. According to Hildebrandt and Gutwirth (2008), this is because most statutes builds on traditional ways of thinking data, personal data and their abuse, without understanding or recognizing the new type of knowledge that result from modern data processing (321). It was further argued that even when recent or updated laws were effective regarding personal data, they are still not equipped to deal with correlated data, which is persistent today since “(1) group profiles are often inferred from anonymous personal data to which data protection regulation do not apply and (2) group profiles do not necessarily apply to identifiable persons but may, even so, affect the autonomy, privacy, security and equality” of individuals (321). Depersonalization Depersonalization is a concept in personal data collection that builds on the principle that researchers do not necessarily need the personal identities of data subjects in order to be effective or to achieve because what is only required for legitimate research is statistical access. Ideally, depersonalization renders a data subject completely anonymous. However, this is impossible to achieve in most applications that is why a modified definition was put forward, which states depersonalization as “the modification of personal data so that the information concerning personal or material circumstances can no longer or only with a disproportionate amount of time, expense and labour, be attributed to an identified or identifiable individual” (Fischer-Hubner 2001, 112). The definition was contained in the groundbreaking Federal German Data Protection Act, which already became synonymous to practical depersonalization. To demonstrate this in real-world application, this paper cites a Lightweight Data Security System developed by Rawassizadeh et al., which provided a working framework that can provide insights how depersonalization actually works (see Fig. 1). Based from the architecture, the user inputs data into a system that include several stages of pseudonymization before personal information is published or made available to third parties. Fig. 1: Lightweight Data Security System Conceptual Framework (Rawassizadeh et al., 3) Neubauer and Heurix (2011) further provided specific applications when they proposed a depersonalization system or pseudonymization of medical data to be used in health care institutions. The application is called Pseudonymization of Information for Privacy in e-Health or PIPE, which aims to provide a “traceable anonymity” (p.194). It works using a combination of symmetric and asymmetric cryptographic keys in order to achieve a logical multi-tier hull model composed of three layers (see Fig. 2). The model is applicable in several health care scenarios as shown in Fig. 3. Fig. 2: The PIPE Model (Neubauer & Heurix, 195). Based from the sample frameworks provided, it is clear how the depersonalization system works and how data is stored, maintained and protected. Its adoption will entail the installation of additional application but it will effectively address ethical and legal questions on personal data gathering practices. Fig. 3: Scenarios for PIPE Application (Neubauer & Heurix, 195). Challenges and Future Trend Depersonalization, certainly, is not perfect. The method and its resulting applications still entail risks since the anonymity it could provide is not absolute. This was earlier cited with the modification in the definition of the concept. Actual depersonalization of data, wrote Wagner, is “weakened by the practice of linking different records to increase their information content and link the outcome to the identity of individuals (p.3). Neumann also argued that the method of depersonalization may lead to temptation to commit misdeeds, diminish human initiative and hinder the principle of accountability, and eroding our sense of ethical behavior in the process. There are risks involved such as the methods available to “re-identify” anonymous individuals. But the process, as has been pointed out by the German law cited in this paper, becomes time and resource consuming that undertaking them becomes impractical. There are also mechanisms and applications that can prevent the risk of re-identification. This is particularly important in the area of future work in this field. Like any form of technology, it rapidly evolves, updating capabilities so that there is a potential of more sophisticated and effective models. Conclusion All in all, depersonalization is an effective and viable solution to personal privacy concerns amidst the tremendous power available to governments and businesses to gather personal data. It is a technical solution to a technical problem. The inefficacies of enacted laws to protect personal privacy serve to highlight this point. Fundamentally, adopting it makes sense because it addresses the problem from the very beginning: the identities of data targets are masked and the statistical information is accessible. It solves privacy issues and satisfies the need for data so that governments and businesses are able to provide products and services that are better and more attuned to our needs. References Bidgoli, Hossein. The Internet Encyclopedia. Hoboken, NJ: John Wiley and Sons, 2004. Fischer-Hubner, S. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, Issue 1958. Berlin: Springer, 2001. Print. Conrad, Eric, Misenar, Seth. and Feldman, Joshua. CISSP Study Guide. Waltham, MA: Newnes, 2012. Print. Hildebrant, Mirreile and Gutwirth, Serge. Profiling the European Citizen: Cross-disciplinary Perspectives. Berlin: Springer, 2008. Print. Kluge, Eike. “Professional codes for electronic HC record protection: ethical, legal, economic and structural issues.” International Journal of Medical Informatics, 2.1 (2000): 85-96. Print. Neubauer, Thomas and Heurix, Johannes. “A methodology for the pseudonymization of medical data”. International Journal of Medical Informatics, 80(2011), 190-204. Print. Neubauer, Thomas. and Kolb, Mathias. Technologies for the Pseudonymization of Medical Data: A Legal Evaluation. 2009 Fourth International Conference on Systems, 2009. Print. Neumann, Peter. “Consideration on risks in using computing technology.” ACM SIGSAC Review, 6.2 (1988), 2-4. Print. Rawassizadeh, R., Heurix, Johannes, Khosravipour, S. and Tjoa, A Min. (n.d.). “LiDSec: A Lightweight Pseudonymization Approach for Textual Personal Information.” Vienna: Vienna University of Technology. Szeto, M. and Miri, A. “Analysis of the Use of Privacy-Enhancing Technologies to Achieve PIPEDA Compliance in a B2C e-Business Model.” Eighth World Congress on the Management of eBusiness, 2007. Print. Wagner, Gert. “Autonomous Organization of the (International) Scientific Community Would Simplify Data Protection in the Social Sciences and Encourage Reanalysis.” ECONSTOR: Discussion Paper N. 249, 2001. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Depersonalization as a method of representation and protection of Research Paper”, n.d.)
Depersonalization as a method of representation and protection of Research Paper. Retrieved from https://studentshare.org/information-technology/1477603-depersonalization-as-a-method-of-representation
(Depersonalization As a Method of Representation and Protection of Research Paper)
Depersonalization As a Method of Representation and Protection of Research Paper. https://studentshare.org/information-technology/1477603-depersonalization-as-a-method-of-representation.
“Depersonalization As a Method of Representation and Protection of Research Paper”, n.d. https://studentshare.org/information-technology/1477603-depersonalization-as-a-method-of-representation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Depersonalization and the Protection of Personal Privacy

The Implications of Electronic Marketing

This essay "The Implications of Electronic Marketing" elaborates on how the advancements in technology and the advent of the internet have assisted organizations in creating and improving customer value with the use of personalization and mass customization.... ... ... ... The demands of the consumers are now less similar....
7 Pages (1750 words) Essay

Privacy and Security Issues Online

In the paper 'privacy and Security Issues Online' the author focuses on the need to use the internet for business or e-commerce, which has come from the demand within businesses and governments to make better use of computing technology.... However, apart from bringing many profits to business owners, it has brought about breaches of privacy and security to consumers and businesses.... Various privacy and Security Issues experienced by Consumers and Businesses Online The ever increasing use of the internet has resulted in many consumers giving too much information without even realizing it and has been viewed as a tempting treasure, especially for marketers....
8 Pages (2000 words) Essay

Pao de Acucar: Brazilian Grocer Gets Personal with Customers

owever powerful the personalized customer data is, it arises many privacy protection issues.... Especially if it concerns their everyday habits and is collected by several different entities, they may feel it breaches their privacy significantly.... Pao de Acucar: Brazilian Grocer Gets personal with s Gathered aggregated checkout data that is not associated with a particular can provide some interesting insights for a retailer and help the company to streamline its operations....
2 Pages (500 words) Essay

IT privacy protection, first mover and follower advantages

privacy policies and features have become an important consideration for websites and users, and use of such policies and features allows the website to increase its credibility, user's trust, and traffic on the website, whereas for users privacy policies and features works as....
8 Pages (2000 words) Essay

The Suicide of Megan Meier Is an Illustration of the Unlegislated Diminuendos of the Internet

As such, MySpace alongside other sites of social networking still permits privacy to their operators, even though the idea of personal connections being dead owing to online social writing could be a means to hiding the exact individuality of a person (Palfrey and Urs 109).... As the author of the paper "Friend Game by Lauren Collins" outlines, the transformations in individual connections by writing due to technology have brought individuals within the social order closer together alongside resulting in lack of privacy....
7 Pages (1750 words) Research Paper

Whether the Use of Technology by Marketers to Gather Information about Customers is Ethical or Unethical

Information about individuals raises the issue about privacy, and information about corporations leads to problems related to trade secrecy and espionage.... Due to the vulnerability of information networks, the need for safeguards of online privacy as a part of business ethics has become vital today.... A corporation's greatest asset is customer trust which forms the foundation for a continuing relationship; hence information managers and technologists are confronted with the challenge of protecting online privacy (Cannon, 2002: 42)....
17 Pages (4250 words) Essay

Privacy Issues

While modern technology has enabled governments and private corporations to engage in activities which people may regard as extremely invasive of their privacy.... This article highlights some of the most important ways in which a person's right to privacy may be threatened through modern technology .... In the globalized world, there needs to be international regulation to ensure that the right to privacy is not violated.... But looking at all this from another perspective, we can say that the advances in technology severely threaten people's right to privacy....
5 Pages (1250 words) Research Paper

An Invention of a Ubiquitous Access Management System

Online accounts needed the entry of personal information and details.... This was a major improvement with respect to the security breach of personal details and identity attributes.... The availability of an ocean of knowledge and personal information tempted the malicious users to use this data for criminal purposes and different techniques were invented to threaten the privacy of the users.... The violation of the privacy of the users created a daunting need for rights management systems that would be able to filter the users [1, 2]....
12 Pages (3000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us