Chapter Twenty Two. Privacy Policies and Privacy Preferences


Lorrie Faith Cranor

MOST PRIVACY ENHANCING TECHNOLOGIES (PETs) research and development has focused on just one category of Benjamin Brunk's Privacy Space Framework :[1] prevention. In Brunk's 2002 review of available privacy technology solutions, prevention tools dominated. In the PETs research literature, we see numerous papers on cryptographic protocols, anonymous communication systems, and private information retrieval techniques, all of which are designed to prevent information from being disclosed. However, prevention tools tend to be blunt instruments that offer their users only the ability to turn protections on or off. They usually do not facilitate fine-grained control over the flow of personal information.

[1] See Chapter 20, this volume.

The concept of individual control over personal information is central to most conceptions of privacy. To facilitate user control over their information requires tools that can be tuned to allow or block information exchange at a fine-grained level based on a variety of factors. Such tools might be categorized as awareness tools, as they can convey privacy-related information to users to help them inform their decision making. However, we would ultimately like these tools not only to inform users, but also to take actions on their behalf. Thus, these tools might also be categorized as detection tools, because they can analyze privacy-related information and detect situations where preventive steps should be taken. New tools are being developed that straddle these three categories, offering the ability to inform users about privacy -related issues, detect conflicts with user-specified privacy preferences, and take appropriate preventive actions. In this chapter, I focus on tools that make use of computer-readable privacy policies to allow users to control the use of their personal information on the World Wide Web.



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net