Bah, 2007 - Google Patents
The Digitized Self as Public Tender: Conceptualizing Informational Privacy at the Intersection of Information Technology, Commerce, and Public PolicyBah, 2007
- Document ID
- 6400051334712972919
- Author
- Bah U
- Publication year
- Publication venue
- Atlantic Journal of Communication
External Links
Snippet
This article identifies the key issues and interests influencing the informational privacy debate, namely, new information technologies, the mass media, the identity industry, and lawmakers. It argues that new information technologies undermine informational privacy by …
- 238000005516 engineering process 0 title description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2428—Tag details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Nehf | Recognizing the societal value in information privacy | |
| Davies | Shining a light on policing of the dark web: an analysis of UK investigatory powers | |
| Westin | Social and political dimensions of privacy | |
| Lee et al. | Reconciliation of privacy with preventive cybersecurity: The bright internet approach | |
| Wright et al. | The big phish: cyberattacks against US healthcare systems | |
| Cross et al. | More than money: examining the potential exposure of romance fraud victims to identity crime | |
| Prastyanti et al. | Law and personal data: Offering strategies for consumer protection in new normal situation in Indonesia | |
| Gibson et al. | Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy | |
| Seda | Identity theft and university students: do they know, do they care? | |
| Ben et al. | The Right of Privacy in Florida in the Age of Technology and the Twenty-First Century: A Need for Protection from Private and Commerical Intrusion | |
| Holt et al. | An assessment of cryptomixing services in online illicit markets | |
| Hakkala et al. | Personal data protection in the age of mass surveillance | |
| Clough | Towards a common identity? The harmonisation of identity theft laws | |
| Raul | Privacy and the digital state: balancing public information and personal privacy | |
| Sprague et al. | Preserving identities: protecting personal identifying information through enhanced privacy policies and laws | |
| Simmons | Buying You: The Government's Use of Fourth-Parties to Launder Data about the People | |
| Igwe et al. | Imperative of cyber ethics education to cyber crimes prevention and cyber security in Nigeria | |
| Sturc et al. | Developing a system of indicators for clustering financial cybercrime | |
| Kayser et al. | Identity theft: The importance of prosecuting on behalf of victims | |
| Taylor | Data collection, counterterrorism and the right to privacy | |
| Sergienko | Self incrimination and cryptographic keys | |
| Devine et al. | The evolving impact of the invisible web: Exploring economic and political ramifications | |
| Anderson | Data breaches and electronic personal health information (ePHI): what is injury-in-fact and does HIPAA set a negligence standard of care? | |
| Bah | The Digitized Self as Public Tender: Conceptualizing Informational Privacy at the Intersection of Information Technology, Commerce, and Public Policy | |
| Channak et al. | Business Ethics in E-Commerce-Legal Challenges and Opportunities |