2012
DOI: 10.1093/idpl/ips003
|View full text |Cite
|
Sign up to set email alerts
|

The challenge of 'big data' for data protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(19 citation statements)
references
References 0 publications
0
16
0
1
Order By: Relevance
“…2 Against this background, scholars from various fields have increasingly investigated phenomena related to online privacy and provided different understandings of the concept. The perspectives range from economic (privacy as a commodity; Hui & Png, 2006;Kuner, Cate, Millard, & Svantesson, 2012;Shivendu & Chellappa, 2007) and psychological (privacy as a feeling) to legal (privacy as a right; Bender, 1974;Warren & Brandeis, 1890) and philosophical approaches (privacy as a state of control; Altman, 1975;see Pavlou, 2011, for more on this). Recently, Marwick and boyd (2014) have pointed to some key weaknesses in traditional models of privacy.…”
Section: Privacy Online and On Location-based Servicesmentioning
confidence: 99%
“…2 Against this background, scholars from various fields have increasingly investigated phenomena related to online privacy and provided different understandings of the concept. The perspectives range from economic (privacy as a commodity; Hui & Png, 2006;Kuner, Cate, Millard, & Svantesson, 2012;Shivendu & Chellappa, 2007) and psychological (privacy as a feeling) to legal (privacy as a right; Bender, 1974;Warren & Brandeis, 1890) and philosophical approaches (privacy as a state of control; Altman, 1975;see Pavlou, 2011, for more on this). Recently, Marwick and boyd (2014) have pointed to some key weaknesses in traditional models of privacy.…”
Section: Privacy Online and On Location-based Servicesmentioning
confidence: 99%
“…Although there exist hardware kill switches, there do not necessarily exist software kill switches. Having a hardware [22] protective stop may protect the physical safety of the user but may not protect the user from interferences with other rights, like data protection for example [53]. While the art.…”
Section: Kill Switches Design and Data Protectionmentioning
confidence: 99%
“…In legal dimensions, big data ratchet up the significance of data protection standards but the current data protection laws are not consistent or completed [16]. The definition of "invade individual privacy "is obscure, which makes it hard to determine whether the behavior constitute crimes.…”
Section: Cause and Challengesmentioning
confidence: 99%