6,540 Hits in 5.0 sec


Sinta Dewi
2017 Brawijaya Law Journal  
Data privacy is considered as fundamental human rights and has been regulated in a number of international instruments as well as regional instruments and has been incorporated into more than 100 national  ...  Countries have now recognized data privacy either as explicit constitutional rights, or in the form of comprehensive data privacy law.  ...  In ICT business there two pillars of trust, namely Security and Privacy.  ... 
doi:10.21776/ub.blj.2017.004.01.06 fatcat:ds4tszcejfb3hccomf2zavtrhe

Information security culture and information protection culture: A validated assessment instrument

Adéle Da Veiga, Nico Martins
2015 Computer Law and Security Review  
A strong information protection culture is required in organisations where the confidentiality, sensitivity and privacy of information are understood and handled accordingly.  ...  An information protection culture assessment (IPCA) is conducted as part of a case study in an organisation. This allowed for a factor and reliability analysis to validate the IPCA.  ...  The ISCA was deployed in a case study organisation and certain information privacy concepts were included in the assessment.  ... 
doi:10.1016/j.clsr.2015.01.005 fatcat:jd3b35t6qrd6tapx27gigti7cu

Privacy, trust and policy-making: Challenges and responses

David Wright, Serge Gutwirth, Michael Friedewald, Paul De Hert, Marc Langheinrich, Anna Moscibroda
2009 Computer Law and Security Review  
Privacy, trust and policy-making: challenges and responses David Wright (a), Professor Serge Gutwirth (b), Michael Friedewald (c), Professor Paul De Hert (b), Professor Marc Langheinrich (d), Anna Moscibroda  ...  Every research project should commit itself to explore possible risks in terms of privacy, security and trust, develop a strategy to cover problematic issues and involve users in this process as early  ...  One is an analysis of privacy and trust issues (challenges) raised by ambient intelligence as reported in the media, peer-reviewed journals (or books) and in project reports and studies, how the privacy  ... 
doi:10.1016/j.clsr.2008.11.004 fatcat:q5edc43dbza3npvosyu2ej55oa

Data Protection by Design and by Default à la European General Data Protection Regulation [chapter]

Marit Hansen
2016 IFIP Advances in Information and Communication Technology  
Privacy and Selfdetermined Life in the Digital World)".  ...  Work relating to this text is partially funded by the German Ministry of Education and Research within the project "Privacy-Forum -Forum Privatheit und selbstbestimmtes Leben in der digitalen Welt (Forum  ...  , organisational processes, and business models.  ... 
doi:10.1007/978-3-319-55783-0_3 fatcat:kmnpzq6azncudmkiol74ekxgaa

Context-aware web services for security control and privacy preservation in an RFID supply chain

Manmeet Mahinderjit Singh, Xue Li, Zhanhuai Li
2013 International Journal of Information Technology and Management  
In order to address the security and privacy problems, we also use the context parameters such as location and time to model the situations of RFID tags.  ...  Reference to this paper should be made as follows: Mahinderjit-Singh, M., Li, X. and Li, Z. (2013) 'Context-aware web services for security control and privacy preservation in an RFID supply chain', Int  ...  In the seven-layer trust framework (Mahinderjit-Singh and Li, 2009), trust in an RFID technology system is defined as a 'comprehensive decision making instrument that joins security elements in detecting  ... 
doi:10.1504/ijitm.2013.051629 fatcat:33swlzeno5fb5bpc4i2w6fzloq

Open-source intelligence and privacy by design

Bert-Jaap Koops, Jaap-Henk Hoepman, Ronald Leenes
2013 Computer Law and Security Review  
Both approaches are tested against three requirements that seem particularly suitable for a 'compliance by design' approach in OSINT: purpose specification; collection and use limitation and data minimisation  ...  ; and data quality (up-to-dateness).  ...  Katsikas, Javier Lopez, and Gü nther Pernul, editors, Trust, Privacy and Security in Digital Business: Second International Conference TrustBus 2005, Copenhagen, Denmark, August 2226, 2005, Pro- ceedings  ... 
doi:10.1016/j.clsr.2013.09.005 fatcat:nywm2bj3rfb2hjjw2x2tul4naa

Privacy and Data Protection by Design - from policy to engineering [article]

George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner
2015 arXiv   pre-print
Furthermore, for unfolding their full benefit for privacy and data protection, PETs need to be rooted in a data governance strategy to be applied in practice.  ...  Starting from the privacy principles of the legislation, important elements are presented as a first step towards a design process for privacy-friendly systems and services.  ...  While we cannot name all, we would like to thank Sébastien Gambs and Rosa Barcelo for their feedback on drafts of this report.  ... 
arXiv:1501.03726v1 fatcat:csxvtyiiprhodnquaigppcwbwi

Transformations of trust in society: A systematic review of how access to big data in energy systems challenges Scandinavian culture

Jaqueline de Godoy, Kathrin Otrel-Cass, Kristian Høyer Toft
2021 Energy and AI  
However, the challenges that big data collection and analytics can introduce in trust-based societies, like those of Scandinavia, are not yet understood.  ...  The literature suggests that even in highly trusting societies, like the ones found in Scandinavian countries, trust can be undermined and weakened. coined the term surveillance capitalism, which is the  ...  the need to trust those who are in power of processing data.  ... 
doi:10.1016/j.egyai.2021.100079 fatcat:7x7vsrmlkrbfhawsvmwwxhspie

Security Concerns and Trust in the Adoption of M-Commerce

Alexios Vasileiadis
2014 Social Technologies  
Originality/value -previous researchers have never focused solely and in-depth on the determinants of perceived risk and trust. Moreover, this object had never been examined in the Greek Population.  ...  When customers feel free of risks and have high level of trust in the intention to use mobile commerce, they actually adopt it.  ...  One way of building trust is for the e-businesses to provide users with privacy policy in order to inform them how and what for they are going to use the following elements: data user, data element, purpose  ... 
doi:10.13165/st-14-4-1-12 fatcat:olj56iwenbau7ju4oegkgged6u

Internet of Everything (Ioe): Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets)

Asim Majeed, Rehan Bhana, Anwar Ul, Imani Kyaruzi, Shaheed Pervaz, Mike-Lloyd Williams
2016 International Journal of Advanced Computer Science and Applications  
data.  ...  The infrastructure of ICT should be developed in alliance with the privacy laws and made compliant as well intelligent which learn by itself from the environment.  ...  The features of data minimisation and privacy by default were stressed and addressed in particular when designing PETs [8] .  ... 
doi:10.14569/ijacsa.2016.070303 fatcat:avugxnij4ffzhaeq3ctu3bve6q

Re-establishment and Regarding Trust and Transparency, Blockchain's Contribution to the Solution of a Thousand-Year Problem

2021 Düzce Üniversitesi Bilim ve Teknoloji Dergisi  
Although the atmosphere in business, management, and society today has been heavily altered and involved, trust stays the same.  ...  In this context, it is concluded that including new technologies such as Blockchain increased trust in various industries, and in the majority of the studies, Blockhain considered being an element to reduce  ...  , style and consistency.  ... 
doi:10.29130/dubited.868598 fatcat:7qbphbb5w5a77mmlxwa4yalkeq

Conclusion: What Next for Privacy Seals? [chapter]

Rowena Rodrigues
2018 Privacy and Data Protection Seals  
And doing the right thing is not only good for our customers -it's the foundation for business success as well." 27 Although privacy seals can be useful instruments to build consumer confidence, one of  ...  Privacy seals often use white in their design, either as a background for blue or black text (BBB Accredited Business Seal, PrivacyMark, Gigya, Verified by Visa, Trusted shops, McAfee Secure, TRUSTe, Privacy  ...  must have a privacy policy in order to qualify for the Trusty-me privacy certification seal. 54 Implementing the data security requirements (Article 30) Not stated. 55 Notification of a personal data  ... 
doi:10.1007/978-94-6265-228-6_9 fatcat:mpex6asr7bcwnmu7bazvkyblje

Privacy and e-commerce: a consumer-centric perspective

Rhys Smith, Jianhua Shao
2007 Electronic Commerce Research  
In this paper we review the historical development of this fundamental concept, discussing how advancements both in society and in technology have challenged the right to privacy, and we survey the existing  ...  Privacy is an ancient concept, but its interpretation and application in the area of e-commerce are still new.  ...  From a business' point of view, consumer-centric privacy would mean considering their customers as entities engaging in a two-way business interaction rather than entities to exploit in a one-way process  ... 
doi:10.1007/s10660-007-9002-9 fatcat:vs253toq4zeuxinqqzaqrfjiiu

The Impact of the General Data Protection Regulation on the Financial Services' Industry of Small European States*

Kieran Xuereb, Simon Grima, Frank Bezzina, Andre Farrugia, Pierpaolo Marano
2019 International Journal of Economics and Business Administration  
Originality/value: Although, all States might be represented in the decision process, the larger States usually take over and sometimes dictate the final decision.  ...  Purpose: With this paper we evaluate the impact and implications of the European Union (EU) General Data Protection Regulation (GDPR) on the Financial Services Industry in small European States; Findings  ...  Increase in Time-Consumption As organisations fear that the workload will increase, more time will be allocated to ensure that data privacy processes are working as they should.  ... 
doi:10.35808/ijeba/342 fatcat:2tzs4s73irfnvgvbkkqdvkfi5u

Beyond the EULA: Improving consent for data mining [article]

Luke Hutton, Tristan Henderson
2017 arXiv   pre-print
In this chapter, we review the data collection and mining landscape, including commercial and academic activities, and the relevant data protection concerns, to determine the types of consent instruments  ...  Companies and academic researchers may collect, process, and distribute large quantities of personal data without the explicit knowledge or consent of the individuals to whom the data pertains.  ...  While a secured instrument such as a consent form minimises the burden on the individual, with only a single form to read and comprehend, the accuracy is impossible to discern, with no process for validating  ... 
arXiv:1701.07999v1 fatcat:scwtyyr7tvdepbk5y454g5g764
« Previous Showing results 1 — 15 out of 6,540 results