skip to main content
10.1145/2527031.2527043acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Accountability and deterrence in online life

Published:15 June 2011Publication History

ABSTRACT

The standard technical approach to privacy and security in online life is preventive: Before someone can access confidential data or take any other action that implicates privacy or security, he should be required to prove that he is authorized to do so. As the scale and complexity of online activity has grown, it has become apparent that the preventive approach is inadequate; thus, a growing set of information-security researchers has embraced greater reliance on accountability mechanisms to complement preventive measures. Despite widespread agreement that "accountability" is important in online life, the term has no standard definition. We make three contributions to the study of accountability: (1) We flesh out with realistic examples our claim that a purely preventive approach to security is inadequate; (2) We present, compare, and contrast some existing formal frameworks for accountability; (3) We explore the question of whether "deterrence" may be a better general term in this context than "accountability."

References

  1. Bella, G. and L. Paulson, "Accountability Protocols: Formalized and Verified," ACM Transactions on Information and System Security, vol. 9, no. 2, 2006, pp. 138--161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Camenisch, J., A. Lysyanskaya, and M. Meyerovich, "Endorsed E-Cash," in Proceedings of the 28th IEEE Symposium on Security and Privacy, 2007, pp. 101--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chaum, D. "Blind signatures for untraceable payments," in CRYPTO '82, Plenum Press, 1982, pp. 199--203.Google ScholarGoogle Scholar
  4. Corrigan-Gibbs, H. and B. Ford, ""Dissent: accountable anonymous group messaging," in Proceedings of the 17th ACM Conference on Computer and Communication Security, 2010, pp. 340--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dubnick, M. J. "Clarifying Accountability: An Ethical Theory Framework," in Public Sector Ethics: Finding and Implementing Values, C. Sampford, N. Preston, and C.-A. Bois (eds.), The Federation Press, 1998, pp. 68--81.Google ScholarGoogle Scholar
  6. Feigenbaum, J. "Accountability as a Driver of Innovative Privacy Solutions," in Privacy and Innovation Symposium, Yale Law School Information Society Project, October 2010. http://www.law.yale.edu/intellectuallife/Privacy%20Symposium %20Thought%20Pieces.htmGoogle ScholarGoogle Scholar
  7. Feigenbaum, J., A. D. Jaggard, and R. N. Wright, "Towards a Formal Model of Accountability," submitted, April 2011.Google ScholarGoogle Scholar
  8. Grant, R. and R. Keohane, "Accountability and Abuses of Power in World Politics," American Political Science Review, vol. 99, no. 1, 2005, pp. 29--43.Google ScholarGoogle ScholarCross RefCross Ref
  9. Halpern, J. "Defaults and Normality in Causal Structures," in Proceedings of the 11th Conference on Principles of Knowledge Representation and Reasoning, 2008, pp. 198--208.Google ScholarGoogle Scholar
  10. Jagadeesan, R., A. Jeffrey, C. Pitcher, and J. Riely, "Towards a Theory of Accountability and Audit," in Proceedings of the 14th European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 5789, Springer, Berlin, 2009, pp. 152--167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC), "Break-Glass -- An Approach to Granting Emergency Access to Healthcare Systems," 2004, http://www.medicalimaging.org/wp-content/uploads/2011/02/Break-Glass_-_Emergency_Access_to_Healthcare_Systems.pdfGoogle ScholarGoogle Scholar
  12. Jones, G. W. "The search for local accountability," in Strengthening Local Government in the 1990s, S. Leach (ed.), Longman, 1992, pp. 49--78.Google ScholarGoogle Scholar
  13. Küsters, R., T. Truderung, and A. Vogt, "Accountability: Definition and Relationship to Verifiability," in Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010, pp. 526--535. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Lampson, B. Notes for presentation entitled "Accountability and Freedom," http://research.microsoft.com/enus/um/people/blampson/slides/AccountabilityAndFreedom.pptGoogle ScholarGoogle Scholar
  15. Lampson, B. "Usable Security: How to Get it," Communications of the ACM, vol. 52, no. 11, November 2009, pp. 25--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Mashaw, J. "Structuring a Dense Complexity: Accountability and the Project of Administrative Law," Issues in Legal Scholarship, The Reformation of American Administrative Law, Article 4, 2005. http://www.bepress.com/ils/iss6/art4Google ScholarGoogle Scholar
  17. Mulgan, R. "'Accountability': An Ever-Expanding Concept?," Public Administration, vol. 78, no. 3, 2000, pp. 555--573.Google ScholarGoogle ScholarCross RefCross Ref
  18. Mulgan, R. Holding Power to Account: Accountability in Modern Democracies, Palgrave MacMillan, 2003.Google ScholarGoogle Scholar
  19. Nissenbaum, N. Privacy in Context: Technology, Policy, and the Integrity of Social Life, Stanford University Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Nozick, R. Philosophical Explanations, Harvard University Press, 1981.Google ScholarGoogle Scholar
  21. Romzek, B. S. and M. J. Dubnick, "Accountability in the Public Sector: Lessons from the Challenger Tragedy," Public Administration Review, vol. 47, 1987, pp. 227--238.Google ScholarGoogle ScholarCross RefCross Ref
  22. Sloan, R. H. and R. Warner, "Developing Foundations for Accountability Systems: Informational Norms and Context-Sensitive Judgments," in Proceedings of the ACM Workshop on Governance of Technology, Information, and Policies, 2010, pp. 21--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Vickrey, W. "Counterspeculation, auctions, and competitive sealed tenders," Journal of Finance, vol. 16, no. 1, 1961, pp. 8--37.Google ScholarGoogle ScholarCross RefCross Ref
  24. Weitzner, D. J., H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G. Sussman, "Information Accountability," Communications of the ACM, vol. 51, no. 6, June 2008, pp. 82--88. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Accountability and deterrence in online life

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WebSci '11: Proceedings of the 3rd International Web Science Conference
        June 2011
        483 pages
        ISBN:9781450308557
        DOI:10.1145/2527031

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 June 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        WebSci '11 Paper Acceptance Rate34of203submissions,17%Overall Acceptance Rate218of875submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader