Data Leakage in UK Law

  • View analysis of personal information leakage and privacy protection in big data era—based on Q method
    • No. 74-5, September 2022
    • Aslib Journal of Information Management
    • 0000
    Purpose: In the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought by big dat...
  • Human factors in information leakage: mitigation strategies for information sharing integrity
    • No. 119-6, July 2019
    • Industrial Management & Data Systems
    • 1242-1267
    Purpose: The purpose of this paper is to explore the human factors triggering information leakage and investigate how companies mitigate insider threat for information sharing integrity. Design/me...
    ... ... Its latest issue of information leakage in 2016shows that among the data leaks logged, 38.2 percent of the cases were triggered byexternal attacks, while 61.8 percent were caused by internal offenders (InfoWatch, ... ...
  • Let me in the cloud: analysis of the benefit and risk assessment of cloud platform
    • No. 20-1, December 2012
    • Journal of Financial Crime
    • 6-24
    Purpose: The purpose of this paper is to critically examine the vulnerabilities of the cloud platform affecting businesses trading on the internet. It aims to examine the appropriateness of the clo...
    ... ... the public and private sectors)undertaken to examine theirprivacy,and data security concerns associated with the cloud platform. Views of those who ... Data loss and leakage (73.5 per cent) were voted as the topthreat to cloud computing by ... ...
  • Private attribute inference from Facebook’s public text metadata: a case study of Korean users
    • No. 117-8, September 2017
    • Industrial Management & Data Systems
    • 1687-1706
    Purpose: As the number of users on social network services (SNSs) continues to increase at a remarkable rate, privacy and security issues are consistently arising. Although users may not want to di...
    ... ... to infer undisc losed personal attributes of users based o nly on the data" available on their publicprofiles on Facebook.Design/methodology/approach \xE2" ... users is available.Practical implications –A private attribute leakage alarm system based on the inference model would behelpful for users not ... ...
  • Risk and Privatisation
    • No. 11-2, December 2013
    • British Journal of Community Justice
    • Wendy Fitzgibbon
    • 87-90
    'Thought Pieces' are papers which draw on the author's personal knowledge and experience to offer stimulating and thought provoking ideas relevant to the aims of the Journal. The ideas are located ...
    ... ... The most obvious aspect is the risk of leakage of sensitive data about offenders and their victims. Probation always ... ...
  • Socio‐cultural analysis of personal information leakage in Japan
    • No. 6-2, June 2008
    • Journal of Information, Communication and Ethics in Society
    • 161-171
    Purpose: The purpose of this paper is to analyse incidents of personal information leakage in Japan based on Japanese socio‐cultural characteristics of information privacy and to consider how best ...
    ... ... personal information and the right to information privacy in the global,multicultural information society.Keywords Database managementsystems, Data security, Informationcontrol, Privacy, Legislation,JapanPaper type Research paperIntroductionIn step with the increasing development and use of ... ...
  • Data defence: from data breaches to industrial espionage, cybercrime can take on many forms. Neil Hodge tracks the recent growth in cyber attacks and highlights the role CFOs can play in protecting their organisations.
    • No. 2012, February 2012
    • Financial Management (UK)
    • Business
    ... ... Finance managers should also consider data leakage prevention, he says. "They should be monitoring what kind of data flows between which individuals in the company, how and when this data leaves the ... ...
  • Dilemmas of Electoral Clientelism: Taiwan, 1993
    • No. 28-2, March 2007
    • International Political Science Review / Revue internationale de science politique
    For many years, studies of electoral clientelism regarded clients as the captive votes of patrons. In recent years, this conventional wisdom has come under challenge, as scholars have come to recog...
    ... ... case of the 1993 Taiwan election to offer the fi rst ever systematic data on noncompliance. Documents from the ruling Kuomintang (Nationalist Party) ... combined with district electoral results, demonstrate considerable leakage in this instance of clientelistic mobilization: at least 45 percent of ... ...
  • Protecting privacy on the web. A study of HTTPS and Google Analytics implementation in academic library websites
    • No. 42-6, October 2018
    • Online Information Review
    • 734-751
    Purpose: The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the privacy impli...
    ... ... set by Google Analyticsact as beacons for collecting and sharing user data through a vast network of commercialtrackers. By understanding the extent ... profiles that track users across sites (Roesner et al., 2012).Data leakage from Google Analytics can also occur when websites activate the ... ...
  • A review of social media security risks and mitigation techniques
    • No. 14-2, April 2012
    • Journal of Systems and Information Technology
    • 171-180
    Purpose: The purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations address ...
    ... ... Social media, Securityrisks, Security strategy, Securitypolicy, Data security,User educationand training, Secure online behaviour,Risk ... site scripting, cross site requestforgery, phishing, information leakage, injection flaws, information integrity andinsufficient anti-automation ... ...
  • See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT