Results 31 to 40 of about 32,672,869 (240)
From Monetary Towards Non-Monetary Transactions: Consumer Personal Data Protection in E-commerce [PDF]
The field of electronic commerce nowadays is actively developing and stimulating the use of cashless payments. At the same time, payments for goods and services purchased via the Internet may not always be expressed in financial terms.
Maria G. Girich +2 more
doaj +1 more source
The control over personal data: True remedy or fairy tale ? [PDF]
This research report undertakes an interdisciplinary review of the concept of "control" (i.e. the idea that people should have greater "control" over their data), proposing an analysis of this con-cept in the field of law and computer science.
Lazaro, Christphe, Métayer, Daniel Le
core +5 more sources
Personal Data Management: An Abstract Personal Data Lifecycle Model [PDF]
It is well understood that processing personal data without effective data management models may lead to privacy violations. Such concerns have motivated the development of privacy-aware practices and systems, as well as legal frameworks and standards.
Alshammari, M, Simpson, AC
openaire +1 more source
Pluggable personal data servers [PDF]
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure of database servers to keep confidential data really private. The advent of powerful secure tokens, combining the security of smart card microcontrollers with the storage ...
Anciaux, Nicolas +5 more
openaire +1 more source
The lack of clarity and harmony across European Economic Area (“EEA”) Member States of the data export rules under the European Union (“EU”) Data Protection Directive (“DPD”) gives rise to significant uncertainties relating to the use of cloud computing.
W Kuan Hon and Christopher Millard
doaj +1 more source
Capturing personal health data from wearable sensors [PDF]
Recently, there has been a significant growth in pervasive computing and ubiquitous sensing which strives to develop and deploy sensing technology all around us.
Camous, Fabrice +2 more
core +1 more source
Data law and policy assume that harms to individuals can result only from personal data processing. Conversely, generation and use of non-personal data supposedly create new value while presenting no risk to individual interests or fundamental rights ...
Przemysław Pałka
doaj +1 more source
MODELING THE PROTECTION OF PERSONAL DATA FROM TRUST AND THE AMOUNT OF INFORMATION ON SOCIAL NETWORKS
The article analyzes the parameters of social networks. The analysis is performed to identify critical threats. Threats may lead to leakage or damage to personal data. The complexity of this issue lies in the ever-increasing volume of data. Analysts note
S. Yevseiev +4 more
semanticscholar +1 more source
Personal data management in the enterprise
The activity of enterprises is regulated by many legal provisions, from which personal data have been of the highest importance recently. The introduction of the GDPR meant that the protection of personal data has acquired a new dimension, regardless of ...
Janusz RYBIŃSKI
doaj +1 more source
GDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Apps
The pervasiveness of Android mobile applications and the services they support allow the personal data of individuals to be collected and shared worldwide.
Danny S. Guamán +2 more
semanticscholar +1 more source

