PL EN


Preferences help
enabled [disable] Abstract
Number of results
2017 | 85 | 38-43
Article title

Data protection by design on the ground of a general data protection regulation

Content
Title variants
Languages of publication
EN
Abstracts
EN
Each member of the information society generates, often quite involuntarily, noticeable amounts of data being closely related to them. The range of such data may be extremely extensive as it may encompass the details on the geographical positioning, the data regarding the network behaviours or the data on ID numbers for the devices used. Hence, there exists a more and more intensified and permanent risk of the right for privacy , one of the most fundamental human right, being infringed on. Data controllers attempt to enter any personal data which are easily accessible due to the operational peculiarities applicable to various technological solutions. Such actions may infringe on the rights included into the charter of fundamental rights, namely the right for privacy and the right for personal data protection. Consequently, the data controllers remain under obligation to carry out a series of duties within the area of personal data protection that are related to appropriate technical and organisational means being applied in order to achieve full legal compliance on the matter. Privacy protection remains a complicated process involving the interactions from various areas including the law, software engineering, cycle management or ethics. One of the legal solutions to be introduced by the general data protection regulation is , the so called, “privacy by design” model. The following publication is intended to present the privacy by design model on the ground of the general data protection regulation.
Year
Volume
85
Pages
38-43
Physical description
References
  • [1] Cavoukian, A. Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. IDIS 3 (2010) 247. doi:10.1007/s12394-010-0062-y
  • [2] Demetrius Klitou, Privacy-Invading Technologies and Privacy by Design. The Value, Safeguarding Privacy, Liberty and Security in the 21st Century. T.M.C. Asser Press, The Hague, 2014. doi:10.1007/978-94-6265-026-8_9
  • [3] Ilten, C., Kroener, I., Neyland, D., Postigo, H., Managing Privacy through Accountability, Palgrave Macmillan UK, 2012. doi:10.1057/9781137032225
  • [4] C. Easton, Information Systems for Crisis Response and Management: The EU Data Protection Regulation, Privacy by Design and Certification. Proceedings of the ISCRAM 2016 Conference - Rio de Janeiro, Brazil, May 2016
  • [5] M. Colesky, S. Ghanavati. Privacy Shielding by Design — A Strategies Case for Near-Compliance. Requirements Engineering Conference Workshops (REW). IEEE International, pp. 271-275, 2016.
  • [6] P. Blume. Will it be a better world? The proposed EU Data Protection Regulation. International Data Privacy Law, Volume 2, Issue 3, 1 August 2012, Pages 130-136.
  • [7] James Lee Jr., Merrill Warkentin, Robert E. Crossler, Robert F. Otondo. (2017) Implications of Monitoring Mechanisms on Bring Your Own Device Adoption. Journal of Computer Information Systems 57: 4, pages 309-318.
  • [8] Nigel Martin, John Rice, Robin Martin. (2016) Expectations of privacy and trust: examining the views of IT professionals. Behaviour & Information Technology 35: 6, pages 500-510.
  • [9] Shuk Ying Ho, Patrick Y. K. Chau. (2013) The Effects of Location Personalization on Integrity Trust and Integrity Distrust in Mobile Merchants. International Journal of Electronic Commerce 17: 4, pages 39-72.
  • [10] Ruidong Zhang, Jim Q. Chen, Ca Jaejung Lee. (2013) Mobile Commerce and Consumer Privacy Concerns. Journal of Computer Information Systems 53: 4, pages 31-38.
  • [11] Shiu-Wan Hung, Min-Jhih Cheng, Pei-Che Chen. (2012) Reexamining the Factors for Trust in Cultivating Online Customer Repurchase Intentions: The Moderating Effect of Perceived Waiting. International Journal of Human–Computer Interaction 28: 10, pages 666-677.
  • [12] Alexander Benlian, Thomas Hess. (2011) The Signaling Role of IT Features in Influencing Trust and Participation in Online Communities. International Journal of Electronic Commerce 15: 4, pages 7-56.
  • [13] Paul Benjamin Lowry, Jinwei Cao, Andrea Everard. (2011) Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures. Journal of Management Information Systems 27: 4, pages 163-200.
  • [14] Bin Mai, Nirup M. Menon, Sumit Sarkar. (2010) No Free Lunch: Price Premium for Privacy Seal-Bearing Vendors. Journal of Management Information Systems 27: 2, pages 189-212.
Document Type
article
Publication order reference
YADDA identifier
bwmeta1.element.psjd-f79427d2-bf4f-49ab-abe0-6c2ac228157f
Identifiers
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.