'Privacy lost - and found?': the information value chain as a model to meet citizens' concerns

John van de Pas, Geert-Jan van Bussel

    Research output: Contribution to journalArticleProfessional

    166 Downloads (Pure)


    In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effective in providing privacy to citizens. Rapid development of ubiquitous computing and ‘the internet of things’ are leading to Big Data and the application of Predictive Analytics, effectively merging the real world with cyberspace. The power of information technology is increasingly used to provide personalised services to citizens, leading to the availability of huge amounts of sensitive data about individuals, with potential and actual privacy-eroding effects. To protect the private sphere, deemed essential in a state of law, information and communication systems (ICTs) should meet the requirements laid down in numerous privacy regulations. Sensitive personal information may be captured by organizations, provided that the person providing the information consents to the information being gathered, and may only be used for the express purpose the information was gathered for. Any other use of information about persons without their consent is prohibited by law; notwithstanding legal exceptions. If regulations are properly translated into written code, they will be part of the outcomes of an ICT, and that ICT will therefore be privacy compliant. We conclude that privacy compliance in the ‘technological’ sense cannot meet citizens’ concerns completely, and should therefore be augmented by a conceptual model to make privacy impact assessments at the level of citizens’ lives possible.
    Original languageEnglish
    Pages (from-to)185-195
    Number of pages11
    JournalElectronic journal of information systems evaluation
    Issue number2
    Publication statusPublished - 2015


    Dive into the research topics of ''Privacy lost - and found?': the information value chain as a model to meet citizens' concerns'. Together they form a unique fingerprint.

    Cite this