-
1
Privacy and law enforcement
Published 2004“…Please note that the paper was released on the Commissioner’s website in September 2004 as 'Striking the Right Balance: Respecting the Privacy of Individuals and Protecting the Public from Crime', but appears to be no longer available there.…”
Get full text
Monograph -
2
Usage and Consequences of Privacy Settings in Microblogs
Published 2015“…Previous research on privacy reveals information leakage and security threats in social networks despite of privacy protection enabled. …”
Get full text
Conference or Workshop Item -
3
La privacy in azienda: un modello operativo
Published 2002“…This paper, on "privacy in a business: an operational model”, was published (in Italian as "La privacy in azienda: un modello operativo" in the proceedings of the international conference on "Privacy, Cost to Resource", organised by the Italian Data Protection Authority in Rome in December 2002.…”
Conference or Workshop Item -
4
Protecting the right to privacy in the fight against terrorism
Published 2008“…This special right does not only concern protecting individuals from intrusions into their privacy or private life, but also more broadly is about guarding against the improper collecting, storing, sharing and use of their data. …”
Get full text
Monograph -
5
Issues of confidentiality and privacy of data with relation to HIV
Published 2007Get full text
Conference or Workshop Item -
6
Forensic genomics: kin privacy, driftnets and other open questions
Published 2008“…In this interdisciplinary discussion paper we highlight the complexity of DNA-related privacy issues as we move into the genomic (as opposed to genetic) era: the "driftnet" approach of comparing scene-of-crime samples against the DNA of the whole population rather than just against that of chosen suspects; the potential for errors in forensic DNA analysis and the consequences on security and privacy; the civil liberties implications of the interaction between medical and forensic applications of genomics. …”
Get full text
Conference or Workshop Item -
7
Children’s databases - safety and privacy: a report for the Information Commissioner
Published 2006“…The Foundation for Information Policy Research (FIPR) was awarded a tender by the Information Commissioner to undertake a research project on ‘identifying the growth in children’s databases and assessing the data protection and privacy implications’. Its aim is to provide the Commissioner with a comprehensive view of current and proposed databases, particularly in the public sector, their extent, their role, and their potential effect on the privacy of individuals. …”
Get full text
Monograph -
8
The right to privacy: a reflection on Warren and Brandeis’ interpretation and the case of Ethiopia 1991-2018
Published 2022“…Samuel Warren and Louis Brandeis are the two forerunner activists on the Right to Privacy. Although some of their propositions are debatable, their insight into the Right to Privacy is still valid. …”
Get full text
Article -
9
Novel approaches to applied cybersecurity in privacy, encryption, security systems, web credentials, and education
Published 2021“…Since 2018, GDPR has been in force in the EU and has been a milestone for people and institutions' privacy. The novel work in privacy, supported by four research papers, discusses the private mode navigation in several browsers and shows how privacy is a fragile feeling. …”
Get full text
Thesis -
10
-
11
Paper expanding on a short intervention on behalf of the European Digital Rights initiative (EDRi)
Published 2012“…The US is also assessing its approach to privacy. Where do the partners stand and what can we build on for the future?…”
Get full text
Conference or Workshop Item -
12
The protection of confidentiality in arbitration: balancing the tensions between commerce and public policy
Published 2021“…This thesis argues that the Arbitration Act 1996 should be reformed with respect to privacy and confidentiality. It begins by exploring the differences between privacy and confidentiality and tracing the development of those concepts. …”
Get full text
Thesis -
13
Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques
Published 2024“…In response to escalating cyber threats and privacy issues within the Industrial Internet of Things (IIoT), this research presents FedGenID, an advanced Federated Generative Intrusion Detection System, to safeguard IIoT networks. …”
Get full text
Article -
14
Technologies for the use of images: automated processes of identification, behavioural analysis and risk detection control at the airports
Published 2010“…This is a paper presented at an international seminar on "security, privacy & data protection", organised by the Spanish Data Protection Agency. …”
Get full text
Conference or Workshop Item -
15
Implementing challenges of artificial intelligence: evidence from public manufacturing sector of an emerging economy
Published 2021“…But challenges such as data quality, privacy and lack of a skilled workforce limit the scope of AI implementation in emerging economies, particularly in the Public Manufacturing Sector (PMS). …”
Get full text
Article -
16
How is blockchain used in marketing: a review and research agenda
Published 2021“…With vast data availability, there are challenges of big data, privacy, ransomware attacks, resulting into marketing fraud and spam. …”
Get full text
Article -
17
Workplace surveillance
Published 2019“…Twenty years ago Cairncross observed that ‘Paradoxically, the electronic media make it easier for pornographers, hackers, and swindlers to hide behind anonymity while at the same time representing a serious threat to privacy’ (1997: 191–2).…”
Get full text
Article -
18
Information security
Published 2017“…Nevertheless a series of high profile cyber-attacks in recent years have bought the question of information security to greater public attention, and thrown light on our growing dependency on digital technologies. Privacy, data protection, and the misuse of data are now driving the political agenda around information security in some sectors. …”
Get full text
Article -
19
Terrorism and the proportionality of internet surveillance
Published 2009“…Policing has become increasingly pre-emptive, with a range of activities criminalized as 'supporting' or 'apologizing for' terrorism. The privacy and non-discrimination rights that are core to the European legal framework are being challenged by the increased surveillance and profiling of terrorism suspects. …”
Article -
20
Digital age: challenges for libraries
Published 2007“…Digital age characterized by efficient graphic user interface, digital imaging, efficient transfer and storage of texts, is presenting important challenges for the libraries. Information privacy, copyrights, and information security are some of the challenging issues faced by the libraries in digital age. …”
Get full text
Article