Privacy in the Age of Transparency The New Vulnerability of the Individual
نویسنده
چکیده
In an ambient intelligent (AmI) environment with computing capabilities embedded in potentially every object it will be difficult (if not impossible) for users to maintain control over data generation, transfer, and use and to achieve unobservability and anonymity. Obtaining consent might not be feasible for the constant need for collection and exchange of incredible amount of data. In most cases, individuals are not aware that profiling is done, what profiles are being compiled, and what decisions may result from these profiles. Due to the overflow of information users cannot maintain knowledge of all data controllers that have some of their data or exercise their right to correct, rectify, block, or erase information collected about them. The present-day privacy legislation has several weaknesses if confronted with the AmI environment that could lead to the need for new principles on which to base new regulations, to take account of the changed context.
منابع مشابه
The Tension between Transparency and Confidentiality in International Arbitrations
The present research study intends to investigate the concepts of transparency, confidentiality and privacy within the scope of Investor-State Arbitration and International Commercial Arbitration.Transparency, confidentiality and privacy are the main pillars of international arbitration which have a close relationship together, however in some cases they are in a controversial situation. The te...
متن کاملSecurity, confidentiality, and privacy of information in the field of health with data EPR embedding in medical MRI images based on HVS model
the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...
متن کاملPrivacy in Cyberspace
Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...
متن کاملRelationship between Spiritual Attitude and Protecting Patient Privacy in Nursing Students in Khoy
Background and Objectives: Protection of patient privacy consider as one of the fundamental requirements in professional morality, maintenance of individual dignity, and Patient-centered in the spiritual care system of nurses. This study aimed to explore the relationship between spiritual attitude and Protection of patient privacy in students at Khoy university of medical sciences in 2018. Met...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کاملVulnerability Management of the Elderly During COVID-19 Pandemic: A Systematic Review
Background and Objective: At the end of December 2019, a new infectious disease was reported in Wuhan, China. It was a new type of coronavirus named COVID-19. The spread of COVID-19 created an emergency in the global health system and the elderly was identified as a vulnerable group to the disease. Methods: This is a systematic review conducted to manage the vulnerability of the elderly during...
متن کامل