[go: up one dir, main page]

Bah, 2007 - Google Patents

The Digitized Self as Public Tender: Conceptualizing Informational Privacy at the Intersection of Information Technology, Commerce, and Public Policy

Bah, 2007

Document ID
6400051334712972919
Author
Bah U
Publication year
Publication venue
Atlantic Journal of Communication

External Links

Snippet

This article identifies the key issues and interests influencing the informational privacy debate, namely, new information technologies, the mass media, the identity industry, and lawmakers. It argues that new information technologies undermine informational privacy by …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0251Targeted advertisement
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Similar Documents

Publication Publication Date Title
Nehf Recognizing the societal value in information privacy
Davies Shining a light on policing of the dark web: an analysis of UK investigatory powers
Westin Social and political dimensions of privacy
Lee et al. Reconciliation of privacy with preventive cybersecurity: The bright internet approach
Wright et al. The big phish: cyberattacks against US healthcare systems
Cross et al. More than money: examining the potential exposure of romance fraud victims to identity crime
Prastyanti et al. Law and personal data: Offering strategies for consumer protection in new normal situation in Indonesia
Gibson et al. Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy
Seda Identity theft and university students: do they know, do they care?
Ben et al. The Right of Privacy in Florida in the Age of Technology and the Twenty-First Century: A Need for Protection from Private and Commerical Intrusion
Holt et al. An assessment of cryptomixing services in online illicit markets
Hakkala et al. Personal data protection in the age of mass surveillance
Clough Towards a common identity? The harmonisation of identity theft laws
Raul Privacy and the digital state: balancing public information and personal privacy
Sprague et al. Preserving identities: protecting personal identifying information through enhanced privacy policies and laws
Simmons Buying You: The Government's Use of Fourth-Parties to Launder Data about the People
Igwe et al. Imperative of cyber ethics education to cyber crimes prevention and cyber security in Nigeria
Sturc et al. Developing a system of indicators for clustering financial cybercrime
Kayser et al. Identity theft: The importance of prosecuting on behalf of victims
Taylor Data collection, counterterrorism and the right to privacy
Sergienko Self incrimination and cryptographic keys
Devine et al. The evolving impact of the invisible web: Exploring economic and political ramifications
Anderson Data breaches and electronic personal health information (ePHI): what is injury-in-fact and does HIPAA set a negligence standard of care?
Bah The Digitized Self as Public Tender: Conceptualizing Informational Privacy at the Intersection of Information Technology, Commerce, and Public Policy
Channak et al. Business Ethics in E-Commerce-Legal Challenges and Opportunities