skip to main content
10.1145/3598469.3598497acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

Legal and Ethical Implications of Data Processing in Sex-Positive Techno Parties: the case of ZusammenKommen

Published:11 July 2023Publication History

ABSTRACT

This paper describes how the organizers of large sex-positive parties make use of digital systems to provide a safe and governed space for their libertine guests. It describes the legal and ethical implications of processing (including storing) person-identifying and sensible type of data about the sexuality of individuals who apply for entry into such parties. Based on the case of the so-called ZusammenKommen party series in Vienna, it describes the technical and organizational safeguards used to assure the protection of data and privacy of the guests. It further discusses which other methods could be developed and deployed to increase even further the privacy of its guests.

References

  1. Abiteboul, S. and Stoyanovich, J. 2019. Transparency, Fairness, Data Protection, Neutrality: Data Management Challenges in the Face of New Regulation. Journal of Data and Information Quality. 11, 3 (Sep. 2019), 1–9. DOI:https://doi.org/10.1145/3310231.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alvarez, R. and Urla, J. 2002. Tell me a good story: using narrative analysis to examine information requirements interviews during an ERP implementation. ACM SIGMIS Database: the DATABASE for Advances in Information Systems. 33, 1 (Feb. 2002), 38–52. DOI:https://doi.org/10.1145/504350.504357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Article 29 Data Protection Working Party 2011. Advice paper on special categories of data (“sensitive data”). Technical Report #Ref. Ares(2011)444105.Google ScholarGoogle Scholar
  4. Beyer, H.R. and Holtzblatt, K. 1995. Apprenticing with the customer. Communications of the ACM. 38, 5 (May 1995), 45–52. DOI:https://doi.org/10.1145/203356.203365.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Duina, F. 1997. Explaining Legal Implementation in the European Union. International Journal of the Sociology of Law. 25, 2 (Jun. 1997), 155–179. DOI:https://doi.org/10.1006/ijsl.1997.0039.Google ScholarGoogle ScholarCross RefCross Ref
  6. European Parliament and Council 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC.Google ScholarGoogle Scholar
  7. Flyvbjerg, B. 2006. Five Misunderstandings About Case-Study Research. Qualitative Inquiry. 12, 2 (Apr. 2006), 219–245. DOI:https://doi.org/10.1177/1077800405284363.Google ScholarGoogle ScholarCross RefCross Ref
  8. Fricker, S.A. 2015. Requirements Engineering: Best Practice. Requirements Engineering for Digital Health. S.A. Fricker , eds. Springer International Publishing. 25–46.Google ScholarGoogle ScholarCross RefCross Ref
  9. Glick, E. 2000. Sex Positive: Feminism, Queer Theory, and the Politics of Transgression. Feminist Review. 64, 1 (Apr. 2000), 19–45. DOI:https://doi.org/10.1080/014177800338936.Google ScholarGoogle ScholarCross RefCross Ref
  10. Hevner, A.R. 2004. Design Science in Information Systems Research. Management Information Systems Quarterly. 28, 1 (2004), 6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hunt, G. 2009. Epidemiology meets cultural studies: Studying and understanding youth cultures, clubs and drugs. Addiction Research & Theory. 17, 6 (Jan. 2009), 601–621. DOI:https://doi.org/10.3109/16066350802245643.Google ScholarGoogle ScholarCross RefCross Ref
  12. ICAO 2021. Doc 9303, Machine Readable Travel Documents Part 3 - Specifications Common to all MRTDs. International Civil Aviation Organization.Google ScholarGoogle Scholar
  13. Inside Pornceptual: The Sex-Positive Party taking Berlin by Storm: 2018. https://boilerroom.tv/article/pornceptual. Accessed: 2022-03-07.Google ScholarGoogle Scholar
  14. Ivanski, C. and Kohut, T. 2017. Exploring definitions of sex positivity through thematic analysis. The Canadian Journal of Human Sexuality. 26, 3 (Dec. 2017), 216–225. DOI:https://doi.org/10.3138/cjhs.2017-0017.Google ScholarGoogle ScholarCross RefCross Ref
  15. Mansfield-Devine, S. 2015. The Ashley Madison affair. Network Security. 2015, 9 (Sep. 2015), 8–16. DOI:https://doi.org/10.1016/S1353-4858(15)30080-5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Mashatan, A. and Heintzman, D. 2021. The Complex Path to Quantum Resistance: Is your organization prepared? Queue. 19, 2 (Apr. 2021), 65–92. DOI:https://doi.org/10.1145/3466132.3466779.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Matzinger, L. 2022. Nackte Nächte. Falter.Google ScholarGoogle Scholar
  18. Michel, R. 2021. pretix Documentation - Release 4.1.0.dev0.Google ScholarGoogle Scholar
  19. Mosher, C.M. 2017. Historical Perspectives of Sex Positivity: Contributing to a New Paradigm Within Counseling Psychology. The Counseling Psychologist. 45, 4 (May 2017), 487–503. DOI:https://doi.org/10.1177/0011000017713755.Google ScholarGoogle ScholarCross RefCross Ref
  20. Nächte im Kitkatclub - „Wenn man die Leute in normalen Klamotten reinlässt, wird nur das Normale passieren“: 2020. https://www.tagesspiegel.de/berlin/naechte-im-kitkatclub-wenn-man-die-leute-in-normalen-klamotten-reinlaesst-wird-nur-das-normale-passieren/25847548.html. Accessed: 2022-03-07.Google ScholarGoogle Scholar
  21. .NET Foundation and Open-Source Community 2021. ASP.NET Core. .NET Foundation.Google ScholarGoogle Scholar
  22. Paulin, A. 2019. Describing Legal Rules Through a System of Electronic Legal Acts. Smart City Governance. Elsevier. 237–250.Google ScholarGoogle Scholar
  23. Paulin, A. and Thuemmler, C. 2016. Dynamic fine-grained access control in e-Health using the secure SQL server system as an enabler of the Future Internet. (Sep. 2016).Google ScholarGoogle Scholar
  24. Pérez-Castillo, R. 2017. Fundaments of Business Process Archeology. Organizational Culture and Behavior: Concepts, Methodologies, Tools, and Applications. IGI Global.Google ScholarGoogle Scholar
  25. Pfitzmann, A. and Köhntopp, M. 2001. Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology. Designing Privacy Enhancing Technologies. H. Federrath, ed. Springer Berlin Heidelberg. 1–9.Google ScholarGoogle Scholar
  26. Queen, C. and Comella, L. 2008. The Necessary Revolution: Sex-Positive Feminism in the Post-Barnard Era. The Communication Review. 11, 3 (Sep. 2008), 274–291. DOI:https://doi.org/10.1080/10714420802306783.Google ScholarGoogle ScholarCross RefCross Ref
  27. Ragin, C.C. and Becker, H.S. eds. 1992. What is a case? exploring the foundations of social inquiry. Cambridge University Press.Google ScholarGoogle Scholar
  28. Rao, S. 2017. The AES-256 cryptosystem resists quantum attacks. Int. J. Adv. Res. Comput. Sci. 8, (2017), 404–408.Google ScholarGoogle Scholar
  29. Rogaway, P. and Shrimpton, T. 2004. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Fast Software Encryption. B. Roy and W. Meier, eds. Springer Berlin Heidelberg. 371–388.Google ScholarGoogle Scholar
  30. Staunton, C. 2019. The GDPR and the research exemption: considerations on the necessary safeguards for research biobanks. European Journal of Human Genetics. 27, 8 (Aug. 2019), 1159–1167. DOI:https://doi.org/10.1038/s41431-019-0386-5.Google ScholarGoogle ScholarCross RefCross Ref
  31. Tossmann, P. 2001. The Use of Drugs within the Techno Party Scene in European Metropolitan Cities. European Addiction Research. 7, 1 (2001), 2–23. DOI:https://doi.org/10.1159/000050709.Google ScholarGoogle ScholarCross RefCross Ref
  32. Vermersch, P. 2009. Describing the Practice of Introspection. Journal of Consciousness Studies. 16, (Jan. 2009), 20–57.Google ScholarGoogle Scholar
  33. Walke, J. and Open-Source Community 2017. React. Meta Platforms Inc.Google ScholarGoogle Scholar
  34. WMA 1964. WMA Declaration of Helsinki - Ethical Principles for Medical Research Involving Human Subjects.Google ScholarGoogle Scholar
  35. WMA 2002. WMA Declaration of Taipei on Ethical Considerations regarding Health Databases and Biobanks.Google ScholarGoogle Scholar
  36. “Zusammen Kommen” - Sex-positive-Partys: Alles können, nichts müssen: 2020. https://www.derstandard.at/story/2000114485472/sex-positive-partys-alles-koennen-nichts-muessen. Accessed: 2022-03-07.Google ScholarGoogle Scholar

Index Terms

  1. Legal and Ethical Implications of Data Processing in Sex-Positive Techno Parties: the case of ZusammenKommen

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            DGO '23: Proceedings of the 24th Annual International Conference on Digital Government Research
            July 2023
            711 pages
            ISBN:9798400708374
            DOI:10.1145/3598469

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 11 July 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate150of271submissions,55%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format