skip to main content
column
Free Access

Summing up

Published:27 October 2014Publication History
Skip Abstract Section

Abstract

Considering recent privacy- and security-related events through this column.

References

  1. boyd, d. It's Complicated. Yale University Press, 2014.Google ScholarGoogle Scholar
  2. Burley, D., Eisenberg, J., and Goodman, S. Would cybersecurity professionalization help the cybersecurity crisis? Commun. ACM 57, 2 (Feb. 2013), 24--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Byres, E. The air gap: SCADA's enduring security myth. Commun. ACM 56, 8 (Aug. 2013), 29--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. European Court, Judgement of the Court, Grand Chamber. Google Spain SL Google Inc. v. Agencia Espanola Proteccion de Datos Mario Costeja Gonzalez, May 13, 2014; http://bit.ly/1prYAfk.Google ScholarGoogle Scholar
  5. Federal Trade Commission. SnapChat Settles FTC Charges that Promises of Disappearing Messages were False. Press Release, May 8, 2014.Google ScholarGoogle Scholar
  6. Florencio, D., Herley, C., and Shostack, A. FUD: A plea for intolerance. Commun. ACM 57, 6 (June 2014), 31--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Garside, J. Vodafone reveals existence of secret wires that allow state surveillance. Guardian (June 5, 2014).Google ScholarGoogle Scholar
  8. Gellman, R. Fair Information Practices: A History, Version 2.11 (Apr. 2014); http://bobgellman.com/rg-docs/rg-FIPShistory.pdf.Google ScholarGoogle Scholar
  9. Irion, K. Communications networks tapped for intelligence-gathering. Commun. ACM 52, 2 (Feb. 2009), 26--28.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. McDermott, R. Emotion and security. Commun. ACM 55, 2 (Feb. 2012), 35--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Mirani, L. Google's sneaky new privacy change affects 85% of iPhone users---but most of them won't have noticed. Quartz (Apr. 3, 2014); http://bit.ly/1fKRDB2.Google ScholarGoogle Scholar
  12. Narayanan, A. and Shmatikov, V. Myths and fallacies of 'personally identifiable information'. Commun. ACM 53, 6 (June 2010), 24--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Riley, M., Elgin, B., Lawrence, D., and Matlack, C. Missed alarms and 40 million stolen credit card numbers: How target blew it. BloombergBusinessweek Technology, (Mar. 14, 2014).Google ScholarGoogle Scholar
  14. Snow, B. and Brooks, C. An ethics code for U.S. intelligence officers. Commun. ACM 52, 8 (Aug. 2009), 30--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Tor Metrics Portal, Users; http://bit.ly/1oMOzJA.Google ScholarGoogle Scholar
  16. U.S. Secretary's Advisory Committee on Automated Personal Data Systems. Records, Computers and the Rights of Citizens, 1973.Google ScholarGoogle Scholar
  17. Westin, A. Privacy and Freedom, Antheneum, 1967.Google ScholarGoogle Scholar

Index Terms

  1. Summing up

      Recommendations

      Reviews

      Eric Chan-Tin

      The topic of privacy and security is an important aspect to consider in CACM 's Viewpoints column. The author provides a good summary of the topics covered by this particular column in the past six years. Several prominent examples of privacy and security breaches from government agencies and companies are given as an explanation for the failing privacy and security grade in current times. The author also points out that companies are increasingly collecting more information about users and decreasing their privacy online, but users in general are not concerned about the lack of privacy. However, the increasing use of privacy- and anonymity-enabling applications such as Snapchat and Tor show that users are interested in maintaining their privacy, but maybe they trust certain companies such as Facebook and Google more. Providing incentives to improve security is critical, and a deeper understanding of privacy is needed before user privacy can be maintained. Security and privacy is also not just a technical or computer science issue; many other disciplines such as law, anthropology, and psychology need to become more involved. Finally, the author points out that certain aspects of security and privacy might be getting worse (such as censorship), but other aspects are getting better (such as user exposure to the digital age). She then concludes that this column has done “reasonably well” in covering these topics and introduces the next editor. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 57, Issue 11
        November 2014
        95 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/2684442
        • Editor:
        • Moshe Y. Vardi
        Issue’s Table of Contents

        Copyright © 2014 Copyright is held by the owner/author(s)

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2014

        Check for updates

        Qualifiers

        • column
        • Popular
        • Un-reviewed
      • Article Metrics

        • Downloads (Last 12 months)50
        • Downloads (Last 6 weeks)25

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format