Privacy by design: a Holochain exploration
Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of...
Gespeichert in:
Veröffentlicht in: | AJIS. Australasian journal of information systems 2020-01, Vol.24 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | AJIS. Australasian journal of information systems |
container_volume | 24 |
creator | Wahlstrom, Kirsten Ul-haq, Anwaar Burmeister, Oliver |
description | Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are examples of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges. |
doi_str_mv | 10.3127/ajis.v24i0.2801 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2545734916</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2545734916</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-186395154f985d6abbf25e9bff0b4c61ed1afe354194da0653b53deae0b233ad3</originalsourceid><addsrcrecordid>eNpNj01LAzEURYMoWKsLV24Lrmeal5eXJkspfkFBF7oOySSRGbRTk7Yw_96OdeHq3sXhXg5jN8BrBLGYu64t9V7IltdCczhhE5DSVFqBPv3Xz9lFKR3nSmkyE3b9mtu9a4aZH2YhlvZjfcnOkvss8eovp-z94f5t-VStXh6fl3erqhECtxVohYaAZDKagnLeJ0HR-JS4l42CGMCliCTByOC4IvSEIbrIvUB0Aafs9ri7yf33Lpat7fpdXh8urSBJC5QG1IGaH6km96XkmOwmt18uDxa4Hb3t6G1_ve3ojT8Wv0qt</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2545734916</pqid></control><display><type>article</type><title>Privacy by design: a Holochain exploration</title><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Free E- Journals</source><creator>Wahlstrom, Kirsten ; Ul-haq, Anwaar ; Burmeister, Oliver</creator><creatorcontrib>Wahlstrom, Kirsten ; Ul-haq, Anwaar ; Burmeister, Oliver</creatorcontrib><description>Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are examples of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges.</description><identifier>ISSN: 1449-8618</identifier><identifier>EISSN: 1449-8618</identifier><identifier>EISSN: 1326-2238</identifier><identifier>DOI: 10.3127/ajis.v24i0.2801</identifier><language>eng</language><publisher>Wollongong: Australasian Association for Information Systems</publisher><subject>Blockchain ; Cryptography ; Privacy</subject><ispartof>AJIS. Australasian journal of information systems, 2020-01, Vol.24</ispartof><rights>2020. This work is published under https://creativecommons.org/licenses/by-nc/3.0/au/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,864,27924,27925</link.rule.ids></links><search><creatorcontrib>Wahlstrom, Kirsten</creatorcontrib><creatorcontrib>Ul-haq, Anwaar</creatorcontrib><creatorcontrib>Burmeister, Oliver</creatorcontrib><title>Privacy by design: a Holochain exploration</title><title>AJIS. Australasian journal of information systems</title><description>Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are examples of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges.</description><subject>Blockchain</subject><subject>Cryptography</subject><subject>Privacy</subject><issn>1449-8618</issn><issn>1449-8618</issn><issn>1326-2238</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpNj01LAzEURYMoWKsLV24Lrmeal5eXJkspfkFBF7oOySSRGbRTk7Yw_96OdeHq3sXhXg5jN8BrBLGYu64t9V7IltdCczhhE5DSVFqBPv3Xz9lFKR3nSmkyE3b9mtu9a4aZH2YhlvZjfcnOkvss8eovp-z94f5t-VStXh6fl3erqhECtxVohYaAZDKagnLeJ0HR-JS4l42CGMCliCTByOC4IvSEIbrIvUB0Aafs9ri7yf33Lpat7fpdXh8urSBJC5QG1IGaH6km96XkmOwmt18uDxa4Hb3t6G1_ve3ojT8Wv0qt</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Wahlstrom, Kirsten</creator><creator>Ul-haq, Anwaar</creator><creator>Burmeister, Oliver</creator><general>Australasian Association for Information Systems</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>HCIFZ</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>M0C</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20200101</creationdate><title>Privacy by design</title><author>Wahlstrom, Kirsten ; Ul-haq, Anwaar ; Burmeister, Oliver</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-186395154f985d6abbf25e9bff0b4c61ed1afe354194da0653b53deae0b233ad3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Blockchain</topic><topic>Cryptography</topic><topic>Privacy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wahlstrom, Kirsten</creatorcontrib><creatorcontrib>Ul-haq, Anwaar</creatorcontrib><creatorcontrib>Burmeister, Oliver</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>Proquest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Global</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>AJIS. Australasian journal of information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wahlstrom, Kirsten</au><au>Ul-haq, Anwaar</au><au>Burmeister, Oliver</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy by design: a Holochain exploration</atitle><jtitle>AJIS. Australasian journal of information systems</jtitle><date>2020-01-01</date><risdate>2020</risdate><volume>24</volume><issn>1449-8618</issn><eissn>1449-8618</eissn><eissn>1326-2238</eissn><abstract>Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are examples of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges.</abstract><cop>Wollongong</cop><pub>Australasian Association for Information Systems</pub><doi>10.3127/ajis.v24i0.2801</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1449-8618 |
ispartof | AJIS. Australasian journal of information systems, 2020-01, Vol.24 |
issn | 1449-8618 1449-8618 1326-2238 |
language | eng |
recordid | cdi_proquest_journals_2545734916 |
source | DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals; Free E- Journals |
subjects | Blockchain Cryptography Privacy |
title | Privacy by design: a Holochain exploration |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T17%3A49%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy%20by%20design:%20a%20Holochain%20exploration&rft.jtitle=AJIS.%20Australasian%20journal%20of%20information%20systems&rft.au=Wahlstrom,%20Kirsten&rft.date=2020-01-01&rft.volume=24&rft.issn=1449-8618&rft.eissn=1449-8618&rft_id=info:doi/10.3127/ajis.v24i0.2801&rft_dat=%3Cproquest_cross%3E2545734916%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2545734916&rft_id=info:pmid/&rfr_iscdi=true |