Privacy in the Age of Transparency The New Vulnerability of the Individual

نویسنده

  • Maya Gadzheva
چکیده

In an ambient intelligent (AmI) environment with computing capabilities embedded in potentially every object it will be difficult (if not impossible) for users to maintain control over data generation, transfer, and use and to achieve unobservability and anonymity. Obtaining consent might not be feasible for the constant need for collection and exchange of incredible amount of data. In most cases, individuals are not aware that profiling is done, what profiles are being compiled, and what decisions may result from these profiles. Due to the overflow of information users cannot maintain knowledge of all data controllers that have some of their data or exercise their right to correct, rectify, block, or erase information collected about them. The present-day privacy legislation has several weaknesses if confronted with the AmI environment that could lead to the need for new principles on which to base new regulations, to take account of the changed context.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Tension between Transparency and Confidentiality in International Arbitrations

The present research study intends to investigate the concepts of transparency, confidentiality and privacy within the scope of Investor-State Arbitration and International Commercial Arbitration.Transparency, confidentiality and privacy are the main pillars of international arbitration which have a close relationship together, however in some cases they are in a controversial situation. The te...

متن کامل

Security, confidentiality, and privacy of information in the field of health with data EPR embedding in medical MRI images based on HVS model

the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...

متن کامل

Privacy in Cyberspace

Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...

متن کامل

Relationship between Spiritual Attitude and Protecting Patient Privacy in Nursing Students in Khoy

Background and Objectives: Protection of patient privacy consider as one of the fundamental requirements in professional morality, maintenance of individual dignity, and Patient-centered in the spiritual care system of nurses. This study aimed to explore the relationship between spiritual attitude and Protection of patient privacy in students at Khoy university of medical sciences in 2018. Met...

متن کامل

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

Vulnerability Management of the Elderly During COVID-19 Pandemic: A Systematic Review

Background and Objective: At the end of December 2019, a new infectious disease was reported in Wuhan, China. It was a new type of coronavirus named COVID-19. The spread of COVID-19 created an emergency in the global health system and the elderly was identified as a vulnerable group to the disease. Methods: This is a systematic review conducted to manage the vulnerability of the elderly during...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007