Desperately Seeking Solutions: Using Implementation-based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society

نویسنده

  • Tal Z. Zarsky
چکیده

INTRODUCTION I. SOLUTIONS AND THE INFORMATION FLOW A. Collection B. Analysis C. Implementation D. Summing Up II. PREFERRING THE REGULATION OF IMPLEMENTATION TO COLLECTION A. Virtual Babies and Virtual Bathwater 1. Subsidies for Startups and the Importance of Innovation 2. Creating Value B. The “Personal-Information-Based” Transaction 1. Myopia and Corrective Lenses 2. Collectees vs. Subjects of Manipulation III. DOUBLECLICK, INC.—A PRACTICAL PERSPECTIVE A. Collection B. Analysis C. Implementation IV. IMPLEMENTATION-BASED SOLUTIONS A. General 1. Fear of Abuse and Misuse of Personal Information 2. The Adverse Effects of Errors 3. Seclusion and Solitude 4. Manipulation B. Price Discrimination 1. General 2. Exceptions a. Medical and Life Insurance b. Credit Rating V. CONCLUSION

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Designing a System for Trend Analysis of Users in Website Surfing in Iran Using Data Mining and Text Mining Algorithms

Background and Aim: As of the entrance of web surfing to the lifestyle of a vast majority of people in the society and the need for a more accurate social and cultural policy making in the field, authors intended to analyze the behavior of the society users in viewing different websites so as to help politicians and practitioners. Methods: Design science research method is used in this research...

متن کامل

ارزیابی رفتار اطلاع‌یابی دانشجویان تحصیلات تکمیلی دانشگاه علوم پزشکی هرمزگان در شبکه جهانی وب بر پایه مدل Ellis

Introduction: The aim of the study was to determine the information seeking behavior of post graduate students at Hormozgan University of Medical Sciences in Iran based on Ellis' model for using the Web. Methods: It was a descriptive-analytical study in which the population of the study included all the MSc. students (N=50) in the fields of Biochemistry, Genetics, Parasitology and Physiology...

متن کامل

A Technique for Improving Web Mining using Enhanced Genetic Algorithm

World Wide Web is growing at a very fast pace and makes a lot of information available to the public. Search engines used conventional methods to retrieve information on the Web; however, the search results of these engines are still able to be refined and their accuracy is not high enough. One of the methods for web mining is evolutionary algorithms which search according to the user interests...

متن کامل

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004