Information Privacy and Security
745 Followers
Recent papers in Information Privacy and Security
Ever since the evolution of banking, there have always been a number of unscrupulous individuals who have tried to breach its defenses in order to gain access to valuables. In the course of time, the physical attacks have become slowly... more
Internet Privacy and Myths Third Edition 2016
The paper lays out a roadmap for implementing privacy principles in an enterprise content management implementation.
Privacy is currently at the centre of a fierce battle. On one side, powerful data companies like Google, Facebook, and major data brokers are collecting and analysing as much personal data as they can. They are lobbying governments around... more
There are number of Anti-Spam filters that have reduced the amount of email spam in the inbox but the problem still continues as the spammers circumvent these techniques. The problems need to be addressed from different aspects. Major... more
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
From the time when the life span of our Great Grand Fathers and Mothers Generations, a lot has been said about privacy. The ability to share information and communicate freely using Information and Communication Technology is vital to the... more
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in... more
Ao analisar os comportamentos dos utilizadores através das mídias sociais, Hermida (2014) conclui que nestes ambientes observa-se claramente a natural predisposição humana para partilhar. Neste sentido, Rheingold (2012) discrimina cinco... more
Security concern has become the biggest obstacle to adoption of cloud because all information and data are completely under the control of cloud service providers. To provide optimal services on cloud, this paper introduces a new... more
Privacy has been a sensitive question lurking over the head of Indian administrators who have been equally reluctant and ignorant about answering the same. The advent of Aadhaar Act in 2016 and Government's mandate of linking Aadhaar with... more
The phenomenon of quantification and translating all elements of reality into data, in order to make them subject to aggregation and algorithmization, Viktor Mayer-Schonberger and Kenneth Cukier call datafication. This article will... more
This paper aims to provide enhancements in the privacy preserving model that was published in our previous paper entitled "An Effective Privacy Preserving Model for Databases Using (α, β, k) - Anonymity Model and Lossy Join" [1]. The... more
Aula para o Programa de Pós-graduação em Direito - Mestrado, da UNISC - Universidade de Santa Cruz do Sul, RS, Brasil. Dia 30 de agosto de 2019.
Few would deny that monitoring employees is a necessary part of doing business. The very act of paying someone for services would necessitate, in a competitive environment, that the product produced or time spent working be observed.... more
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in... more
Spațiul cibernetic se caracterizează prin anonimat, dinamism și lipsa frontierelor. Acest lucru generează atât oportunități de dezvoltare a societății informaționale, cât și riscuri la adresa funcționării acesteia la nivel individual,... more
Ever since the evolution of banking, there have always been a number of unscrupulous individuals who have tried to breach its defenses in order to gain access to valuables. In the course of time, the physical attacks have become slowly... more
In this paper I will offer several arguments in support of the view that individuals have moral claims to control personal information. Coupled with rights to control access to one's body, capacities, and powers, or physical privacy... more
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication... more
Nowadays, due to widespread participation of elementary school children in cyberspace activities, basic cybersecurity education and awareness is deemed necessary. Within this context, knowledge acquisition in this timely and important... more
Le tecnologie dell’informazione e della comunicazione modulano gran parte della vita quotidiana dell’uomo del XXI secolo. Tali tecnologie, insieme a innumerevoli vantaggi, hanno portato con sé una sfida alla privacy così come eravamo... more
FACEBOOK PRIVACY VIOLATION SCANDAL IN BROADER CONTEXT May -10-2018 In April, the CEO of Facebook, Mark Zuckerberg, testified in Congress about the alleged user privacy violations that occurred at Facebook. Several weeks later,Cambridge... more
<br>Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password... more
Plusieurs expériences menées par des chercheurs et journalistes prouvent que nos smartphones nous espionnent. Si la permanence de cette écoute ne peut être établie avec assurance, cela pose de gros problèmes de protection de la vie privée.
In this paper I will argue that establishing and maintaining practices promoting privacy and accountability will typically trump security concerns. While it is true that in specific instances security may outweigh privacy, this is not... more
Consumer concerns over the safety of their personal information and the violation of their privacy rights are described as being the single overwhelming barrier to rapid growth of e- commerce. This paper explores the problems for... more
I have argued elsewhere that individuals have moral privacy rights that limit the surveillance activities of governments. While not absolute, privacy rights shield individuals from the prying eyes and ears of neighbors, corporations, and... more
Today business environment is highly dependent on complex technologies, and information is considered an important asset. Organizations are therefore required to protect their information infrastructure and follow an inclusive risk... more
The author deals with the issues of the right to privacy and the right to anonymity in the framework of freedom and security. In this regard, the author gives definitions and characteristics of privacy and anonymity, indicating the... more
This submission seeks to respond to the terms of reference raised by Parliamentary Joint Committee on Intelligence and Security in its Review of the Mandatory Data Retention Regime prescribed by Part 5-1A of the Telecommunications... more
The Internet today connects about 40% of the world population. Half of these are living outside the advanced economies, often in some countries that are quickly climbing the developmental ladder, with diverse populations and inarguable... more
This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy,... more
Nowadays, due to widespread participation of elementary school children in cyberspace activities, basic cybersecurity education and awareness is deemed necessary. Within this context, knowledge acquisition in this timely and important... more
Dans les processus logistiques, de nombreuses organisations (publiques et privees) sont impliquees, et chacune a potentiellement son propre outil de gestion de chaine logistique (Supply Chain Management). Cependant, elles sont amenees a... more
9th International Conference of Managing Information Technology (CMIT 2021) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of information technology and... more
Il 15 ottobre 2019 si è tenuto un interessante confronto presso il Parlamento UE, organizzato dal Supervisore europeo (EDPS) e dall'Osservatorio679, sul tema dei modelli di certificazione ai sensi del GDPR , nel contesto del principio... more