Information Technology and Data Protection in UK Law

  • The benefits and challenges of general data protection regulation for the information technology sector
    • Núm. 21-5, Agosto 2019
    • Digital Policy, Regulation and Governance
    • 510-524
    Purpose: The implementation of European data protection is a challenge for businesses and has imposed legal, technical and organizational changes for companies. This study aims to explore the benef...
  • “The margin between the edge of the world and infinite possibility”. Blockchain, GDPR and information governance
    • Núm. 29-1/2, Marzo 2019
    • Records Management Journal
    • 240-257
    Purpose: This paper aims to explore a paradoxical situation, asking whether it is possible to reconcile the immutable ledger known as blockchain with the requirements of the General Data Protection...
    ...... in with the requirements of the General Data Protection Regulations (GDPR), and morebroadly ... positi ve feature of blockchain technology fr om the perspective of trusted exchanges of ......
  • A comprehensive concept map for adequate protection and effective management of personal information in networked Chinese services
    • Núm. 33-6, Noviembre 2015
    • The Electronic Library
    • 1047-1064
    Purpose: – This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China throu...
    ...... information in networked Chinese services Xiaomi An Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, and ... of China, Beijing, China, and School of Business Information Technology and Logistics, RMIT University, Melbourne, Australia Shuyang Sun, Yu Dong ......
  • Semantic Disclosure Control: semantics meets data privacy
    • Núm. 42-3, Junio 2018
    • Online Information Review
    • 290-303
    Purpose: To overcome the limitations of purely statistical approaches to data protection, the purpose of this paper is to propose Semantic Disclosure Control (SeDC): an inherently semantic privacy ...
    ...... purely statistical approaches to data protection, the purpose of this paper is to propose Semantic ... and intuitive notions of privacy and information disclosure than purely statistical meth ods. As a ... Web Intelligence and Intelligent Agent Technology – Workshops , Lyon , pp. 253-256. Anandan, ......
  • Digital disaster management in libraries in India
    • Núm. 33-2, Junio 2015
    • Library Hi Tech
    • 230-244
    Purpose: – Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is necessary for ...
    ...... and apply the ways of protecting digital data and the related equipment from disaster. The ... the issues related to digital data protection in libraries in India. It aims to investigate the ...Information and communication technologies have completely ... Gavin Library by Illinois Institute of Technology (2012) discusses important issues for being ......
  • Personalized privacy in open data sharing scenarios
    • Núm. 41-3, Junio 2017
    • Online Information Review
    • 298-310
    Purpose: The purpose of this paper is to propose a privacy-preserving paradigm for open data sharing based on the following foundations: subjects have unique privacy requirements; personal data are...
    ...... user-controlled personalized privacy protection. Social implications – There is an increasing ... and genera lly easy to find informationabout our identities, habits,interests or opinions in ... s 2015 annual report “ How personal technology is changing our lives ” (Microsoft, 2015) ......
  • RFID tags: commercial applications v. privacy rights
    • Núm. 105-6, Agosto 2005
    • Industrial Management & Data Systems
    • 703-713
    Purpose: This article seeks to examine the use of radio frequency identification (RFID) technology in commercial applications and to discuss whether regulation is needed to balance commercial econo...
    ...... radio frequency identification (RFID) technology in commercial applications and to discuss whether ... enough to provide adequate privacy protection without unduly harming economic efficiency. ... in which Big Brother controls all information and citizen access to it. Fortunately, this ....htm RFID tags 703 Industrial Management & Data Systems Vol. 105 No. 6, 2005 pp. 703-713 q ......
  • An empirical study of wearable technology acceptance in healthcare
    • Núm. 115-9, Octubre 2015
    • Industrial Management & Data Systems
    • 1704-1723
    Purpose: – The purpose of this paper is to investigate the factors associated with consumer’s intention to adopt wearable technology in healthcare, and to examine the moderating effects of product ...
    ...... Yiwen Gao School of Economic Information Engineering, Southwestern University of Finance ... and use of technology 2 (UTAUT2), protection motivation theory (PMT), and privacy calculus ... ysiolytics efficiency by linkin g them with data analyt ics (Wolff, 2013), bu t also can provide ......
  • “Privacy by default” and active “informed consent” by layers. Essential measures to protect ICT users’ privacy
    • Núm. 14-2, Mayo 2016
    • Journal of Information, Communication and Ethics in Society
    • 124-138
    Purpose: The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improv...
    ...... to addressing the problem of privacy protection in the global digital environment based on the portance that information has to improve users’ informational ... decide whether or not to put their personal data on the internet. Design/methodology/approach – ... protect information and communication technology (ICT) users’ privacy. The second goal is to ......
  • Assessment of a South Africa national consultative workshop on the Protection of Personal Information Act (POPIA)
    • Núm. 69-1/2, Febrero 2020
    • Global Knowledge, Memory and Communication
    • 58-74
    Purpose: This paper aims to assess the Protection of Personal Information Act (No. 4 of 2013) (POPIA) in South African (SA) universities sector with the objective to formulate code of conduct to im...
    ......Data were collected using interviewswith the SA universities ’ ... Universities Representative Cape Peninsula University of Technology Legal practitioners 1 x 23 (92%) North West Central University of ......
  • See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT