Results 51 to 60 of about 1,369,081 (196)

Personal information management systems: a user-centric privacy utopia?

open access: yesInternet Policy Review, 2020
Personal information management systems (PIMS) aka personal data stores (PDSs) represent an emerging class of technology that seeks to empower individuals regarding their data.
Heleen Janssen   +2 more
doaj   +1 more source

Das türkische Datenschutzrecht im Überblick - Gemeinsamkeiten und wesentliche Unterschiede zur Rl 95/46 Und zur DSGVO in Theorie und Praxis

open access: yesTürk-Alman Üniversitesi Hukuk Fakültesi Dergisi, 2023
Der Schutz personenbezogener Daten hat in der Türkei keine so lange Tradition im Vergleich zur Europäischen Union mit ihren allgemeinen1 und sektorspezifischen2 oder der USA mit ihren hauptsächlich sektorspezifischen und in letzter Zeit allgemeinen ...
Mesut Serdar Çekin
doaj   +1 more source

Exploring users’ willingness to share their health and personal data under the prism of the new GDPR: implications in healthcare [PDF]

open access: yes, 2019
At the same time healthcare undergoes a digital transformation, the implementation of the new General Data Protection Regulation (GDPR) introduces changes to internet users.
Isomursu, Minna   +2 more
core   +1 more source

Risk assessment of data protection in the maritime industry using system-theoretic process analysis

open access: yesResults in Engineering
The maritime industry is one of the most hazardous industries in the world. Risk assessment is applied in various contexts within this industry to prevent hazardous situations affecting systems and humans. Risk assessment in the maritime industry relates
Sutthipong Yungratog   +3 more
doaj   +1 more source

EyeSpot: leveraging gaze to protect private text content on mobile devices from shoulder surfing [PDF]

open access: yes, 2018
As mobile devices allow access to an increasing amount of private data, using them in public can potentially leak sensitive information through shoulder surfing.
Eiband, Malin   +3 more
core   +1 more source

Incident Response: Protecting Individual Rights Under the General Data Protection Regulation

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2016
Identifying and fixing problems with the security of computers and networks is essential to protect the data they contain and the privacy of their users.
Andrew Cormack
doaj   +1 more source

A Blockchain-based Approach for Data Accountability and Provenance Tracking

open access: yes, 2017
The recent approval of the General Data Protection Regulation (GDPR) imposes new data protection requirements on data controllers and processors with respect to the processing of European Union (EU) residents' data. These requirements consist of a single
Azaria A.   +3 more
core   +1 more source

The Regulation of Commercial Profiling – A Comparative Analysis [PDF]

open access: yes, 2016
The authors, all data protection experts, discuss the status of the relevant data protection regulatory framework on profiling in the business sector in sev- eral countries worldwide, from the constitutional lev- el to some individual regulation ...
Bernal, Paul   +9 more
core  

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

MANAGING INNOVATIVE COMPANY’S CAPITAL: THE CASE OF PERSONAL DATA TRANSFER

open access: yesZbornik Pravnog Fakulteta Sveučilišta u Rijeci, 2018
protection. The only case in which this issue could become more debatable is if personal data crosses EU borders. The transfer of personal data to third countries proved its disputed status when the CJEU invalidated the Safe Harbour Agreement, one of the
Danijela Vrbljanac
doaj   +1 more source

Home - About - Disclaimer - Privacy