|
|
|
|
| LEADER |
00000cam a22000002c 4500 |
| 001 |
1866604384 |
| 003 |
DE-627 |
| 005 |
20250114054920.0 |
| 007 |
cr uuu---uuuuu |
| 008 |
231020s2019 xx |||||o 00| ||eng c |
| 035 |
|
|
|a (DE-627)1866604384
|
| 035 |
|
|
|a (DE-599)KXP1866604384
|
| 040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
| 041 |
|
|
|a eng
|
| 084 |
|
|
|a 2,1
|2 ssgn
|
| 100 |
1 |
|
|a Aronoff, Jacob
|e VerfasserIn
|4 aut
|
| 245 |
1 |
0 |
|a With Great Power Comes Great Responsibility: Utilizing Privacy Technology for the Greater Bad
|
| 264 |
|
1 |
|c 2019
|
| 336 |
|
|
|a Text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
| 338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
| 520 |
|
|
|a As people across the world become increasingly aware of how their privacy is compromised in this digital era, the field of Privacy Enhancing Technologies, or PETs, has boomed. The first workshop on Privacy Enhancing Technology was in 2000, then called the "Workshop on Design Issues in Anonymity and Unobservability." By 2007, the workshop had ballooned into a full symposium. In 2015, the first issue of the Proceedings on Privacy Enhancing Technologies journal was published. This year in 2019, there were 4 volumes of Proceedings on Privacy Enhancing Technologies published, containing a total of 66 papers. Of these papers, we identified 14 which specifically describe PETs that have been newly developed or utilized in a new way. We focused on 3 papers that seemed to have widespread use cases. Some of these use cases, however, include criminal activity. While heavily focused on adversarial actions and capability, much of security research does not focus on or consider the social science and motivations behind bad actors. We believe that this is a critical factor to consider when working on the problem of cybercrime. In this paper, we will analyze some of the cutting edge PETs and the potential risks associated with them from the lenses of computer science and criminal justice. We argue that the continued development of privacy enhancing technology contributes to the global rise of cybercrime
|
| 700 |
1 |
|
|a Cline, Sarah
|e VerfasserIn
|4 aut
|
| 856 |
4 |
0 |
|u http://arxiv.org/abs/2001.00226
|x Verlag
|z kostenfrei
|3 Volltext
|7 0
|
| 935 |
|
|
|a mkri
|
| 951 |
|
|
|a BO
|
| ELC |
|
|
|a 1
|
| LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
| LOK |
|
|
|0 001 4394240972
|
| LOK |
|
|
|0 003 DE-627
|
| LOK |
|
|
|0 004 1866604384
|
| LOK |
|
|
|0 005 20231020043703
|
| LOK |
|
|
|0 008 231020||||||||||||||||ger|||||||
|
| LOK |
|
|
|0 035
|a (DE-2619)CORE89600355
|
| LOK |
|
|
|0 040
|a DE-2619
|c DE-627
|d DE-2619
|
| LOK |
|
|
|0 092
|o n
|
| LOK |
|
|
|0 852
|a DE-2619
|
| LOK |
|
|
|0 852 1
|9 00
|
| LOK |
|
|
|0 935
|a core
|
| LOK |
|
|
|0 939
|a 20-10-23
|b l01
|
| OAS |
|
|
|a 1
|
| ORI |
|
|
|a SA-MARC-krimdoka001.raw
|