ABSTRACT
This paper describes how the organizers of large sex-positive parties make use of digital systems to provide a safe and governed space for their libertine guests. It describes the legal and ethical implications of processing (including storing) person-identifying and sensible type of data about the sexuality of individuals who apply for entry into such parties. Based on the case of the so-called ZusammenKommen party series in Vienna, it describes the technical and organizational safeguards used to assure the protection of data and privacy of the guests. It further discusses which other methods could be developed and deployed to increase even further the privacy of its guests.
- Abiteboul, S. and Stoyanovich, J. 2019. Transparency, Fairness, Data Protection, Neutrality: Data Management Challenges in the Face of New Regulation. Journal of Data and Information Quality. 11, 3 (Sep. 2019), 1–9. DOI:https://doi.org/10.1145/3310231.Google ScholarDigital Library
- Alvarez, R. and Urla, J. 2002. Tell me a good story: using narrative analysis to examine information requirements interviews during an ERP implementation. ACM SIGMIS Database: the DATABASE for Advances in Information Systems. 33, 1 (Feb. 2002), 38–52. DOI:https://doi.org/10.1145/504350.504357.Google ScholarDigital Library
- Article 29 Data Protection Working Party 2011. Advice paper on special categories of data (“sensitive data”). Technical Report #Ref. Ares(2011)444105.Google Scholar
- Beyer, H.R. and Holtzblatt, K. 1995. Apprenticing with the customer. Communications of the ACM. 38, 5 (May 1995), 45–52. DOI:https://doi.org/10.1145/203356.203365.Google ScholarDigital Library
- Duina, F. 1997. Explaining Legal Implementation in the European Union. International Journal of the Sociology of Law. 25, 2 (Jun. 1997), 155–179. DOI:https://doi.org/10.1006/ijsl.1997.0039.Google ScholarCross Ref
- European Parliament and Council 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC.Google Scholar
- Flyvbjerg, B. 2006. Five Misunderstandings About Case-Study Research. Qualitative Inquiry. 12, 2 (Apr. 2006), 219–245. DOI:https://doi.org/10.1177/1077800405284363.Google ScholarCross Ref
- Fricker, S.A. 2015. Requirements Engineering: Best Practice. Requirements Engineering for Digital Health. S.A. Fricker , eds. Springer International Publishing. 25–46.Google ScholarCross Ref
- Glick, E. 2000. Sex Positive: Feminism, Queer Theory, and the Politics of Transgression. Feminist Review. 64, 1 (Apr. 2000), 19–45. DOI:https://doi.org/10.1080/014177800338936.Google ScholarCross Ref
- Hevner, A.R. 2004. Design Science in Information Systems Research. Management Information Systems Quarterly. 28, 1 (2004), 6.Google ScholarDigital Library
- Hunt, G. 2009. Epidemiology meets cultural studies: Studying and understanding youth cultures, clubs and drugs. Addiction Research & Theory. 17, 6 (Jan. 2009), 601–621. DOI:https://doi.org/10.3109/16066350802245643.Google ScholarCross Ref
- ICAO 2021. Doc 9303, Machine Readable Travel Documents Part 3 - Specifications Common to all MRTDs. International Civil Aviation Organization.Google Scholar
- Inside Pornceptual: The Sex-Positive Party taking Berlin by Storm: 2018. https://boilerroom.tv/article/pornceptual. Accessed: 2022-03-07.Google Scholar
- Ivanski, C. and Kohut, T. 2017. Exploring definitions of sex positivity through thematic analysis. The Canadian Journal of Human Sexuality. 26, 3 (Dec. 2017), 216–225. DOI:https://doi.org/10.3138/cjhs.2017-0017.Google ScholarCross Ref
- Mansfield-Devine, S. 2015. The Ashley Madison affair. Network Security. 2015, 9 (Sep. 2015), 8–16. DOI:https://doi.org/10.1016/S1353-4858(15)30080-5.Google ScholarDigital Library
- Mashatan, A. and Heintzman, D. 2021. The Complex Path to Quantum Resistance: Is your organization prepared? Queue. 19, 2 (Apr. 2021), 65–92. DOI:https://doi.org/10.1145/3466132.3466779.Google ScholarDigital Library
- Matzinger, L. 2022. Nackte Nächte. Falter.Google Scholar
- Michel, R. 2021. pretix Documentation - Release 4.1.0.dev0.Google Scholar
- Mosher, C.M. 2017. Historical Perspectives of Sex Positivity: Contributing to a New Paradigm Within Counseling Psychology. The Counseling Psychologist. 45, 4 (May 2017), 487–503. DOI:https://doi.org/10.1177/0011000017713755.Google ScholarCross Ref
- Nächte im Kitkatclub - „Wenn man die Leute in normalen Klamotten reinlässt, wird nur das Normale passieren“: 2020. https://www.tagesspiegel.de/berlin/naechte-im-kitkatclub-wenn-man-die-leute-in-normalen-klamotten-reinlaesst-wird-nur-das-normale-passieren/25847548.html. Accessed: 2022-03-07.Google Scholar
- .NET Foundation and Open-Source Community 2021. ASP.NET Core. .NET Foundation.Google Scholar
- Paulin, A. 2019. Describing Legal Rules Through a System of Electronic Legal Acts. Smart City Governance. Elsevier. 237–250.Google Scholar
- Paulin, A. and Thuemmler, C. 2016. Dynamic fine-grained access control in e-Health using the secure SQL server system as an enabler of the Future Internet. (Sep. 2016).Google Scholar
- Pérez-Castillo, R. 2017. Fundaments of Business Process Archeology. Organizational Culture and Behavior: Concepts, Methodologies, Tools, and Applications. IGI Global.Google Scholar
- Pfitzmann, A. and Köhntopp, M. 2001. Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology. Designing Privacy Enhancing Technologies. H. Federrath, ed. Springer Berlin Heidelberg. 1–9.Google Scholar
- Queen, C. and Comella, L. 2008. The Necessary Revolution: Sex-Positive Feminism in the Post-Barnard Era. The Communication Review. 11, 3 (Sep. 2008), 274–291. DOI:https://doi.org/10.1080/10714420802306783.Google ScholarCross Ref
- Ragin, C.C. and Becker, H.S. eds. 1992. What is a case? exploring the foundations of social inquiry. Cambridge University Press.Google Scholar
- Rao, S. 2017. The AES-256 cryptosystem resists quantum attacks. Int. J. Adv. Res. Comput. Sci. 8, (2017), 404–408.Google Scholar
- Rogaway, P. and Shrimpton, T. 2004. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Fast Software Encryption. B. Roy and W. Meier, eds. Springer Berlin Heidelberg. 371–388.Google Scholar
- Staunton, C. 2019. The GDPR and the research exemption: considerations on the necessary safeguards for research biobanks. European Journal of Human Genetics. 27, 8 (Aug. 2019), 1159–1167. DOI:https://doi.org/10.1038/s41431-019-0386-5.Google ScholarCross Ref
- Tossmann, P. 2001. The Use of Drugs within the Techno Party Scene in European Metropolitan Cities. European Addiction Research. 7, 1 (2001), 2–23. DOI:https://doi.org/10.1159/000050709.Google ScholarCross Ref
- Vermersch, P. 2009. Describing the Practice of Introspection. Journal of Consciousness Studies. 16, (Jan. 2009), 20–57.Google Scholar
- Walke, J. and Open-Source Community 2017. React. Meta Platforms Inc.Google Scholar
- WMA 1964. WMA Declaration of Helsinki - Ethical Principles for Medical Research Involving Human Subjects.Google Scholar
- WMA 2002. WMA Declaration of Taipei on Ethical Considerations regarding Health Databases and Biobanks.Google Scholar
- “Zusammen Kommen” - Sex-positive-Partys: Alles können, nichts müssen: 2020. https://www.derstandard.at/story/2000114485472/sex-positive-partys-alles-koennen-nichts-muessen. Accessed: 2022-03-07.Google Scholar
Index Terms
- Legal and Ethical Implications of Data Processing in Sex-Positive Techno Parties: the case of ZusammenKommen
Recommendations
Legal implications after Schrems case: are we trading fundamental rights?
The world is slowly turning into a global village and borders that once stood between cultures now serve as bridges for the exchange of information. In Schrems, the Court of Justice invalidated the Safe Harbor agreement, which recognized the standards ...
Legal and Ethical Implications of Employee Location Monitoring
HICSS '05: Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 5 - Volume 05Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to sensor networks able to determine locations within buildings. Few ...
Ethical responsibilities and legal liabilities of network security professionals
ACSAC '97: Proceedings of the 13th Annual Computer Security Applications ConferenceProfits, losses and the attendant risks of tort litigation run to the extreme in times of great speculation in an unregulated economic environment-conditions which characterize the present enormous growth in computer networking. Public law enforcement ...
Comments