Wirtschaftsinformatik 2005 2005
DOI: 10.1007/3-7908-1624-8_60
|View full text |Cite
|
Sign up to set email alerts
|

RFID als Technik des Ubiquitous Computing — Eine Gefahr für die Privatsphäre?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…These were included in the data collection. The documents contain requirements for RFID-based applications (Müller and Handy 2005), location-based services (Jandt 2008), telephone systems (Hammer et al 1993), electronic signature methods (Pordesch and Roßnagel 1994), mobile commerce applications (Ranke 2004), multimedia assistants (Steidle 2005), software agents (Gitter 2007), and Internet-based elections (Bräunlich et al 2011). As bases for the requirements, the documents under examination identified the Basic Law of the Federal Republic of Germany (Grundgesetz, GG), the German Federal Data Protection Act (Bundesdatenschutzgesetz, BDSG), the European Data Protection Directive 95/46/EC (Europäische Datenschutzrichtlinie, DSRL), the Code of Civil Procedure (Zivilprozessordnung, ZPO), the Telemedia Act (Telemediengesetz, TMG), the Civil Code (BGB), and the Telecommunications Act (Telekommunikationsgesetz, TKG).…”
Section: Extraction Of Recurring Requirements Concerning Legal Compatmentioning
confidence: 99%
See 3 more Smart Citations
“…These were included in the data collection. The documents contain requirements for RFID-based applications (Müller and Handy 2005), location-based services (Jandt 2008), telephone systems (Hammer et al 1993), electronic signature methods (Pordesch and Roßnagel 1994), mobile commerce applications (Ranke 2004), multimedia assistants (Steidle 2005), software agents (Gitter 2007), and Internet-based elections (Bräunlich et al 2011). As bases for the requirements, the documents under examination identified the Basic Law of the Federal Republic of Germany (Grundgesetz, GG), the German Federal Data Protection Act (Bundesdatenschutzgesetz, BDSG), the European Data Protection Directive 95/46/EC (Europäische Datenschutzrichtlinie, DSRL), the Code of Civil Procedure (Zivilprozessordnung, ZPO), the Telemedia Act (Telemediengesetz, TMG), the Civil Code (BGB), and the Telecommunications Act (Telekommunikationsgesetz, TKG).…”
Section: Extraction Of Recurring Requirements Concerning Legal Compatmentioning
confidence: 99%
“…Ten of the evaluated requirements aim for the avoidance of personal data. Data reduction and data economy mean that the processing of personal data is avoided completely or is minimized wherever possible (Gitter 2007, p. 424;Müller andHandy 2005, p. 1157;Ranke 2004, p. 101 ff. ;Steidle 2005, p. 338 ff.).…”
Section: Avoiding Personal Referencementioning
confidence: 99%
See 2 more Smart Citations
“…However, this approach is contrary to the common practice in systems development, which is to identify solutions abiding to statutes and regulations only to the extent to avoid the threat of legal consequences. Among others, the approach of legal compatibility was used for deriving requirements for RFID systems (Müller and Handy 2005), Location Based Services (Jandt 2008), and similar further applications (Bräunlich et al 2011;Gitter 2007;Hammer et al 1993;Pordesch and Roßnagel 1994;Ranke 2004;Steidle 2005).…”
Section: Introductionmentioning
confidence: 99%