Abstract
Considering the increasing number of Personal Information (PI) used and shared in our now common social networked interactions, privacy issues, retention and how such information are manages have become important. Most approaches rely on one-way disclaimers and policies, often complex, hard to find and lacking ease of understanding for ordinary users of such common networks. Thus leaving little room for users to actually retain any control how the released information is actually used and managed once it has been put online. Additionally, personal information (PI) may include digital artifacts and contributions for which people would legitimately like to retain some rights over their use and their lifetime. Of particular interest in this category is the notion of the “right to forget” we no longer have control over, given the persistent nature of the Internet and its ability to retain information forever. This paper examines this issue from the point of view of the user and social responsibility, arguing for the need to augment information with an additional set of metadata about its usage and management. We discuss the use of DRM technologies in this context as a possible direction.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bekmann, J., Lancaster, M., Lassen, S., Wang, D.: Google Wave Data Model and Client-Server Protocol, http://www.waveprotocol.org/whitepapers/internal-client-server-protocol (retrieved January 2010)
Aaronson, S.A.: Corporate responsibility in the global village: the British role model and the American laggard. Business and Society Review 108(3), 309–338 (2003)
Rouvroy, A.: Réinventer l’art d’oublier et de se faire oublier dans la société de l’information? In: Lacour, S. (ed.) version augmentée du chapitre paru, sous le même titre, dans La sécurité de l’individu numérisé. Réflexions prospectives et internationales, pp. 249–278. L’Harmattan, Paris (2008), http://works.bepress.com/antoinette_rouvroy/5
Foucault, M.: Surveiller et punir. In: de la Prison, N. (ed.), Galimard, Paris (1975)
Cameron, K.: The Laws of Identity. In: Identity Weblog, December 5 (2005), http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf Retrieved (January 2010)
Morin, J.-H.: Exception Based Enterprise Rights Management: Towards a Paradigm Shift in Information Security and Policy Management. International Journal On Advances in Systems and Measurements 1(1), 40–49 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Morin, JH. (2010). Towards Socially-Responsible Management of Personal Information in Social Networks. In: Breslin, J.G., Burg, T.N., Kim, HG., Raftery, T., Schmidt, JH. (eds) Recent Trends and Developments in Social Software. BlogTalk BlogTalk 2008 2009. Lecture Notes in Computer Science, vol 6045. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16581-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-16581-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16580-1
Online ISBN: 978-3-642-16581-8
eBook Packages: Computer ScienceComputer Science (R0)