A Survey on Transparency Tools for Enhancing Privacy

@inproceedings{Hedbom2008ASO,
  title={A Survey on Transparency Tools for Enhancing Privacy},
  author={Hans Hedbom},
  booktitle={FIDIS},
  year={2008}
}
  • Hans Hedbom
  • Published in FIDIS 1 September 2008
  • Computer Science
This paper provides a short survey on transparency tools for privacy purposes. It defines the term transparency tools, argues why they are important and gives examples for transparency tools. A classification of transparency tools is suggested and some example tools are analyzed with the help of the classification. 

Technical Tools and Designs for Data Protection

This chapter delves into the specific technical tools and designs for data protection key for a privacy by design and default approach and describes the individual tools, techniques, and designs in more details.

Preserving Privacy in Transparency Logging

The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability

Tools for Achieving Usable Ex Post Transparency: A Survey

This survey provides researchers and developers of privacy enhancing technologies an overview of the characteristics of state of the art ex post TETs based on their functionality, implementation and evaluation as described in the literature.

A Categorization of Transparency-Enhancing Technologies

A set of categorization parameters for describing the properties and functionality of a Transparency-Enhancing Technology on the one hand, and a categorization of Transparency- Enhancing Technologies on the other hand are presented.

Towards Improving Transparency, Intervenability, and Consent in HCI

Transparency of personal data processing is enforced by most Western privacy laws, including the new General Data Protection Regulation (GDPR) which will be effective from May 2018. The GDPR specif

Transparency Enhancing Tools (TETs): An Overview

The relationship between users' privacy concerns, transparency enhancing and privacy enhancing mechanisms on the one hand, and users' trust on the other, and this relationship should be re-examined in future work is reviewed.

Privacy Risk Analysis to Enable Informed Privacy Settings

  • S. DeD. L. Métayer
  • Computer Science
    2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
  • 2018
A method to enable better informed choices of privacy settings based on a privacy risk analysis parameterized by privacy settings is proposed that can be expressed, visualize their impact on the privacy risks through a user-friendly interface and decide to revise them to reduce risks to an acceptable level.

Towards Usable Transparency via Individualisation

The General Data Protection Regulation grants data subjects the legal rights of transparency and intervenability. Ex post transparency provides users of data services with insight into how their pe

Privacy transparency patterns

This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency

Designing for Usable Privacy and Transparency in Digital Transactions

People engage with multiple online services and carry out a range of different digital transactions with these services. Registering an account, sharing content in social networks, or requesting pr
...

References

SHOWING 1-10 OF 19 REFERENCES

Marrying Transparency Tools with User-Controlled Identity Management

Although transparency tools alone are no panacea for maintaining the private sphere, the combination of transparency tools and user-controlled identity management systems yields viable functionality to empower users to protect their privacy.

MozPETs - a privacy enhanced Web Browser

This work proposes a set of privacy protection tools for technically unskilled users that were integrated within the open-source browser Mozilla.

The platform for privacy preferences 1.0 (p3p1.0) specification

This document, along with its normative references, includes all the specification necessary for the implementation of interoperable P3P applications.

Transparent Accountable Data Mining: New Strategies for Privacy Protection

This paper presents a technology infrastructure -- the Policy Aware Web -- that supports transparent and accountable data use on the World Wide Web, and elements of a new legal and regulatory regime that supports privacy through provable accountability to usage rules rather than merely data access restrictions.

The platform for privacy preferences

It is believed users' confidence in online transactions will increase when they are presented with meaningful information and choices about Web site privacy practices, and P3P is not a silver bullet; it is complemented by other technologies as well as regulatory and self-regulatory approaches to privacy.

Usability meets security - the Identity-Manager as your personal security assistant for the Internet

A new concept to improve the usability of security mechanisms, introducing an extended classification of protection goals is presented, which is the basis of the Identity-Manager, a new security tool presented in this paper.

The Future of Identity in the Information Society

Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime.

Personalization in privacy-aware highly dynamic systems

This research presents novel ways to personalize the relationship with customers without sacrificing their privacy through the use of artificial intelligence, machine learning and other technologies.

Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing

In the information-intensive marketplaces of the networked economy, database-related marketing techniques have gained unprecedented popularity. Their development is based on the assumption that

Future of Identity in the Information Society

General recommendations are made in this report with regard to the regulation of central storage of biometric data and various other aspects, including the need for transparency ofBiometric systems.