Technological Ubiquity: The Need for Consumer Privacy Protection

نویسنده

  • Tony LAM
چکیده

The marriage of computer and telecommunications technologies has created a new electronic networking environment on which business and services are delivered. Today, anyone who has a connection to the Internet is able to access easily an abundance of information that is made available online. No doubt, the technological advancement will eventually transform the way many organizations operate and virtually every aspect of our modern life.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

The Quest for Privacy in the Consumer IoT

Privacy remains among the toughest challenges for the consumer-facing Internet of Things (IoT). Privacy-by-Design (PbD) is the most recent attempt to address it. Thereby, privacy goals become part of the technical specification and are resolved directly in the development process. This contemplation opposes existing approaches that retrofit protection measures as an afterthought, often even aft...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Protecting Online Privacy: Self-Regulation, Mandatory Standards, or Caveat Emptor

Information technology-enabled markets enhance retailers’ ability to collect, aggregate, and transfer consumer information. These technological capabilities have raised concerns that this information could be used in ways the consumer would not anticipate or authorize. These concerns have been met with a variety of proposals including approaches placing the onus for protection on consumers, ind...

متن کامل

Information Systems for Crisis Response and Management: The EU Data Protection Regulation, Privacy by Design and Certification

With technological development in crisis management reaching a point at which there is wide-scale aggregation of data, including social media, there is a need to focus strongly upon the position of end users in order to uphold data protection principles. Recent wide-ranging European Union legal reforms, finalized in 2016, have enshrined the concept of data protection by design and paved the way...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005