Is privacy controllable?

Yefim Shulman, Joachim Meyer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

One of the major views of privacy associates privacy with the control over information. This gives rise to the question how controllable privacy actually is. In this paper, we adapt certain formal methods of control theory and investigate the implications of a control theoretic analysis of privacy. We look at how control and feedback mechanisms have been studied in the privacy literature. Relying on the control theoretic framework, we develop a simplistic conceptual control model of privacy, formulate privacy controllability issues and suggest directions for possible research.

Original languageEnglish
Title of host publicationPrivacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Revised Selected Papers
EditorsEleni Kosta, Simone Fischer-Hübner, Jo Pierson, Daniel Slamanig, Stephan Krenn
PublisherSpringer New York LLC
Pages222-238
Number of pages17
ISBN (Print)9783030167431
DOIs
StatePublished - 1 Jan 2019
Externally publishedYes
Event13th International IFIP Summer School on Privacy and Identity Management – Fairness, accountability and transparency in the age of big data, 2018 - Vienna, Austria
Duration: 20 Aug 201824 Aug 2018

Publication series

NameIFIP Advances in Information and Communication Technology
Volume547
ISSN (Print)1868-4238

Conference

Conference13th International IFIP Summer School on Privacy and Identity Management – Fairness, accountability and transparency in the age of big data, 2018
Country/TerritoryAustria
CityVienna
Period20/08/1824/08/18

Keywords

  • Closed-loop control
  • Feedback
  • Feedback control
  • Human control
  • Information disclosure
  • Privacy

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Is privacy controllable?'. Together they form a unique fingerprint.

Cite this