نتایج جستجو برای: pipeda privacy laws
تعداد نتایج: 100291 فیلتر نتایج به سال:
This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy risks in an app. When an end-user seeks to install an app, they are presented with the required permissions and make a supposedly informed decision as to whether to install that app based on the permissions presented. The results from an analysis of ten popular apps indi...
Privacy is a basic cultural requirement, often regulated by national law, but not everywhere in the same way. Privacy protection must be effective accross national borders. Technical tools and procedures can help to enforce and propagate privacy protection for Internet communication worldwide. This article evaluates the effect of P3P against legal requirements, particularly against those strict...
The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens' information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative hetero...
privacy in the context of islamic law, the quran and sunnah reasons, is not mentioned. but this does not mean that the concept of privacy as one of the basic human rights in islamic law has not been considered. various aspects of privacy are presented in the sharia particular discourse. in this study in addition to concept of privacy and law in islamic law, law enforcement in islamic law and so...
Improving Public Administration (PA) operations and services is a major focus globally; they should be transparent, accountable and provide services that improve citizens’ confidence and trust. In this context, it is important that PAs have the ability to define agreements between citizens and PAs and that such agreements can be used in the context of PAs Information Systems to specify citizens...
Recent trends towards database outsourcing, as well as concerns and laws governing data privacy, have led to great interest in enabling secure database services. Previous approaches to enabling such a service have been based on data encryption, causing a large overhead in query processing. We propose a new, distributed architecture that allows an organization to outsource its data management to...
This paper presents a model to enrich an ontology with a thesaurus based on a domain corpus and WordNet. The model is applied to the data privacy domain and the initial domain resources comprise a data privacy ontology, a corpus of privacy laws, regulations and guidelines for projects. Based on these resources, a thesaurus is automatically generated. The thesaurus seeds are composed by the onto...
We discuss ongoing work on developing tools and techniques for understanding natural-language descriptions of security and privacy rules, particularly in the context of cloud computing services. In particular, we present a three-part toolkit for analyzing and processing texts, and enforcing privacy and security rules extracted from those texts. We are interested in developing efficient, accurat...
Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید