Zobrazeno 1 - 10
of 407
pro vyhledávání: '"FTC Fair Information Practice"'
Autor:
Paul M. Schwartz
Publikováno v:
Schwartz, PM. (2017). Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices. UC Berkeley: Retrieved from: http://www.escholarship.org/uc/item/1h80117d
In Code, the most influential book yet written about law and cyberspace, Lawrence Lessig makes an intriguing proposal for shaping privacy on the Internet: (1) the legal assignment to every individual of a property interest in her own personal informa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ec376480feddaae3e4030acc89c4b03d
https://escholarship.org/uc/item/1h80117d
https://escholarship.org/uc/item/1h80117d
Autor:
Eugene Volokh
Proposed "information privacy" rules that give us the power to "control . . . information about ourselves" and to mandate "fair information practices" sound appealing. Why, after all, should a business be able to communicate information about its cli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3c19b9c8b8512a5b32b6d1621a2c7e28
https://escholarship.org/uc/item/6v26h4k9
https://escholarship.org/uc/item/6v26h4k9
Autor:
Arthur J. Cockfield
Publikováno v:
Canadian Tax Journal/Revue fiscale canadienne. 67:1179-1199
In the last 10 years, governments have initiated several reforms to automatically exchange bulk taxpayer information with other governments (mainly via the Foreign Account Tax Compliance Act, the common reporting standard, and country-by-country repo
Publikováno v:
SSRN Electronic Journal.
Despite years of heavy criticism, privacy self-management (i.e., the principle that people individually manage their privacy via notice and choice) remains the standard of privacy protection throughout the Western world. Building on previous research
By 2020, an individual is expected to own an average of 6.58 devices that share and integrate a wealth of personal user data. The management of privacy preferences across these devices is a complex task for which users are ill-equipped, which increas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f843e1159e607157616a06e85ad3e9df
https://hdl.handle.net/11567/966237
https://hdl.handle.net/11567/966237
Publikováno v:
Human Aspects of Information Security and Assurance ISBN: 9783030574031
HAISA
HAISA
Privacy issues extend to students as universities acquire and use their personal information for various reasons. This research study was aimed at determining the awareness, expectations and confidence levels of students when the university processes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9c5e3609274454dbaad537b2a6701a19
https://doi.org/10.1007/978-3-030-57404-8_23
https://doi.org/10.1007/978-3-030-57404-8_23
Publikováno v:
Government Information Quarterly. 35:445-459
With today's big data and analytics capability, access to consumer data provides competitive advantage. Analysis of consumers' transactional data helps organizations to understand customer behaviors and preferences. However, prior to capitalizing on
Autor:
Adele Da Veiga
Publikováno v:
Information & Computer Security. 26:338-364
Purpose This paper aims to propose an information privacy culture index framework (IPCIF) with a validated information privacy culture index instrument (IPCII) to measure information privacy culture across nations. The framework is based on consumers
Autor:
Joshua Yuvaraj
Publikováno v:
Computer Law & Security Review. 34:47-66
A recent Australian Federal Court decision has raised the issue of the scope of information protected under the Australian Privacy Act 1988. The Court failed to adequately address this question, leaving Australians unsure as to whether sections of th
Publikováno v:
Information
Volume 12
Issue 8
Information, Vol 12, Iss 311, p 311 (2021)
Volume 12
Issue 8
Information, Vol 12, Iss 311, p 311 (2021)
Personal information has been likened to “golden data”, which companies have chased using every means possible. Via mobile apps, the incidents of compulsory authorization and excessive data collection have evoked privacy concerns and strong reper