Information Technology and Data Protection in UK Law

  • The benefits and challenges of general data protection regulation for the information technology sector
    • No. 21-5, August 2019
    • Digital Policy, Regulation and Governance
    • 510-524
    Purpose: The implementation of European data protection is a challenge for businesses and has imposed legal, technical and organizational changes for companies. This study aims to explore the benef...
  • View analysis of personal information leakage and privacy protection in big data era—based on Q method
    • No. 74-5, September 2022
    • Aslib Journal of Information Management
    • 0000
    Purpose: In the era of big data, people are more likely to pay attention to privacy protection with facing the risk of personal information leakage while enjoying the convenience brought by big dat...
    ... ... pay attention to privacy protection with facing therisk of personal information leakage while enjoying the convenience brought by big data technology.Furthermore, people’s views on personal information leakage and privacy protection are varied, playing animportant role in the legal process of ... ...
  • “The margin between the edge of the world and infinite possibility”. Blockchain, GDPR and information governance
    • No. 29-1/2, March 2019
    • Records Management Journal
    • 240-257
    Purpose: This paper aims to explore a paradoxical situation, asking whether it is possible to reconcile the immutable ledger known as blockchain with the requirements of the General Data Protection...
    ... ... with the requirements of the General Data Protection Regulations(GDPR), and morebroadly ... positive feature of blockchain technology from the perspective of trustedexchanges of value ... ...
  • A comprehensive concept map for adequate protection and effective management of personal information in networked Chinese services
    • No. 33-6, November 2015
    • The Electronic Library
    • 1047-1064
    Purpose: – This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China throu...
    ... ... information innetworked Chinese servicesXiaomi AnKey Laboratory of Data Engineering and Knowledge Engineering of theMinistry of Education, and ... ofChina, Beijing, China, and School of Business Information Technology andLogistics, RMIT University, Melbourne, AustraliaShuyang Sun, Yu Dong ... ...
  • Recent history and development of environmental information systems and databases in Germany
    • No. 27-1, February 2003
    • Online Information Review
    • 37-50
    The topic of environmental protection has always been of great concern in Germany, the establishment of environmental data sources started in the 1970s. The development of environmental information...
    ... ... Page andKristina VoigtIntroductionThe protection of the environment has alwaysbeen a great concern ... ,Environmental risk assessment, Germany,Data envelopment, AnalysisAbstractThe topic of ... utilisation ofmodern information technology.Surveys of environmental informationsystem ... ...
  • “Privacy by default” and active “informed consent” by layers. Essential measures to protect ICT users’ privacy
    • No. 14-2, May 2016
    • Journal of Information, Communication and Ethics in Society
    • 124-138
    Purpose: The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improv...
    ... ... based on the importance that information has to improveusers’ informational ... autonomy as far as their privacy protection is concerned and decide whether or not to put irpersonal data on the internet.Design/methodology/approach – ... protect information and communication technology(ICT) users’ privacy. The second goal is to ... ...
  • Complementing DRM with digital watermarking: mark, search, retrieve
    • No. 31-1, February 2007
    • Online Information Review
    • 10-21
    Purpose: The purpose of this paper is to show how digital watermarking can be applied to assist and improve cryptography‐based digital rights management (DRM) systems by allowing the protection of ...
    ... ... – Digital watermarking is a passive technology, not allowing theactive prevention of copyright ... it allows the irreversible linking of information withmultimedia data, ensuring that an embedded ... as a technology to allowactive content protection beyond the limitations of current DRM ... ...
  • An empirical study of wearable technology acceptance in healthcare
    • No. 115-9, October 2015
    • Industrial Management & Data Systems
    • 1704-1723
    Purpose: – The purpose of this paper is to investigate the factors associated with consumer’s intention to adopt wearable technology in healthcare, and to examine the moderating effects of product ...
    ... ... healthcareYiwen GaoSchool of Economic Information Engineering,Southwestern University of Finance ... and use of technology 2 (UTAUT2), protection motivation theory (PMT), andprivacy calculus ... physiolyticsefficiency by linking them with data analytics (Wolff, 2013), but also can provide ... ...
  • The application of information technology and environmental protection
    • No. 78-4, December 2012
    • International Review of Administrative Sciences
    The Aarhus Convention became a part of the Serbian legal system through the adoption of the Law on Ratification of the Convention on Access to Information, Public Participation in Decision Making a...
    ... ... of e-access to environmental information and the relevant practice of the Commissioner for Information of Public Importance and Personal Data Protection. Third, the application of IT in environmental matters can promote public participation in environmental decision-making. If there were a ... ...
  • An integrated framework to elevate information governance to a national level in South Africa
    • No. 29-1/2, March 2019
    • Records Management Journal
    • 103-116
    Purpose: As an emerging discipline, information governance (IG) presents a number of challenges to organisations and countries. For example, IG has not yet been clearly defined and current proponen...
    ... ... , enterprise content management, privacy(data protection), freedom of information, corporate ... management and the State Information Technology Agency is responsible forinformation technology, ... ...
  • See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT