Data Security in UK Law
-
Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions
This article considers the regulatory problems of online tracking behaviour, lack of consent to data collection, and the security of data collected with or without consent. Since the mid-1990s the ...
-
Social-media-based risk communication for data co-security on the cloud
Purpose: Cloud computing has disrupted the information technology (IT) industry. Associated benefits such as flexibility, payment on an on-demand basis and the lack of no need for IT staff are amon...
-
Data flows and national security: a conceptual framework to assess restrictions on data flows under GATS security exception
Purpose: The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual framework...
-
Empirical assessment of mobile device users’ information security behavior towards data breach. Leveraging protection motivation theory
Purpose: The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information s...
- Accessing Telecommunications Data for National Security and Law Enforcement Purposes
-
Making better IS security investment decisions: discovering the cost of data breach announcements during the COVID-19 pandemic
Purpose: Stock price reactions have often been used to evaluate the cost of data breaches in the current information systems (IS) security literature. To further this line of research, this study e...
-
Fraud and corruption risk in business Mastercourse: Dr Stephen Hill is the managing director of snowdrop consulting, a company specialising in fraud risk management, prevention/awareness and data security. He is a trustee director of the ICAEW fraud advisory panel and chairs the cybercrime working group. Here, he explains what the course is about.
...This one-day course will offer attendees a full understanding of the threats posed by various types of fraud, how to recognise where the threats may be and how to respond to them. It is aimed at financial staff, from book-keepers to finance directors......
-
Data Mining and Profiling in the Area of Freedom, Security and Justice: State of Play and New Challenges in the Balance between Security and Fundamental Rights Protection
This article analyses the impact of the use of data processing mechanisms (i.e. data mining and profiling) as investigative tools on the fundamental rights of individuals. It highlights the pressin...
-
Spies as Informants: Triangulation and the Interpretation of Elite Interview Data in the Study of the Intelligence and Security Services
This article examines the application of ‘triangulation’ to the use of elite interviewing in political science, with specific reference to the study of the intelligence and security services. It is...
-
SST: secure, error‐free file transfer package
The SST (Super Simple Transfer) package simplifies PC file transfers by automating modern setup and using menus to conduct transfers. Error‐free transmission and data security are provided. SST run...... ... Error-free transmission and data security are provided. SST runs on IBM/PCs, ATs PSI2s and compatible ... ...
See all results