With Great Power Comes Great Responsibility: Utilizing Privacy Technology for the Greater Bad

As people across the world become increasingly aware of how their privacy is compromised in this digital era, the field of Privacy Enhancing Technologies, or PETs, has boomed. The first workshop on Privacy Enhancing Technology was in 2000, then called the "Workshop on Design Issues in Anonymity...

Full description

Saved in:  
Bibliographic Details
Authors: Aronoff, Jacob (Author) ; Cline, Sarah (Author)
Format: Electronic Book
Language:English
Published: 2019
In:Year: 2019
Online Access: Volltext (kostenfrei)
Check availability: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866604384
003 DE-627
005 20250114054920.0
007 cr uuu---uuuuu
008 231020s2019 xx |||||o 00| ||eng c
035 |a (DE-627)1866604384 
035 |a (DE-599)KXP1866604384 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Aronoff, Jacob  |e VerfasserIn  |4 aut 
245 1 0 |a With Great Power Comes Great Responsibility: Utilizing Privacy Technology for the Greater Bad 
264 1 |c 2019 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a As people across the world become increasingly aware of how their privacy is compromised in this digital era, the field of Privacy Enhancing Technologies, or PETs, has boomed. The first workshop on Privacy Enhancing Technology was in 2000, then called the "Workshop on Design Issues in Anonymity and Unobservability." By 2007, the workshop had ballooned into a full symposium. In 2015, the first issue of the Proceedings on Privacy Enhancing Technologies journal was published. This year in 2019, there were 4 volumes of Proceedings on Privacy Enhancing Technologies published, containing a total of 66 papers. Of these papers, we identified 14 which specifically describe PETs that have been newly developed or utilized in a new way. We focused on 3 papers that seemed to have widespread use cases. Some of these use cases, however, include criminal activity. While heavily focused on adversarial actions and capability, much of security research does not focus on or consider the social science and motivations behind bad actors. We believe that this is a critical factor to consider when working on the problem of cybercrime. In this paper, we will analyze some of the cutting edge PETs and the potential risks associated with them from the lenses of computer science and criminal justice. We argue that the continued development of privacy enhancing technology contributes to the global rise of cybercrime 
700 1 |a Cline, Sarah  |e VerfasserIn  |4 aut 
856 4 0 |u http://arxiv.org/abs/2001.00226  |x Verlag  |z kostenfrei  |3 Volltext  |7 0 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4394240972 
LOK |0 003 DE-627 
LOK |0 004 1866604384 
LOK |0 005 20231020043703 
LOK |0 008 231020||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE89600355 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
LOK |0 939   |a 20-10-23  |b l01 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw