Phillips, 2004 - Google Patents
Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologiesPhillips, 2004
- Document ID
- 12134786878659912580
- Author
- Phillips D
- Publication year
- Publication venue
- New Media & Society
External Links
Snippet
'Privacy'is an ambiguous notion, encompassing personal autonomy, democratic participation, identity management, and social coordination. Each of these privacy ideals reflect different sets of social concerns. Laws operationalize privacy in terms of 'personally …
- 238000011161 development 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3578—Hierarchy of users of cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Phillips | Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies | |
Xiang et al. | Privacy protection and secondary use of health data: strategies and methods | |
US20220012364A1 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
Spiekermann et al. | Engineering privacy | |
AU2018258656B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
Milne et al. | Information sensitivity typology: Mapping the degree and type of risk consumers perceive in personal data sharing | |
Rafiq et al. | Privacy prevention of big data applications: A systematic literature review | |
US10043035B2 (en) | Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments | |
CA3104119C (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
Liu et al. | A Clustering K‐Anonymity Privacy‐Preserving Method for Wearable IoT Devices | |
US20180307859A1 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
Shen et al. | Privacy enhancing technologies: A review | |
Williams | Social networking applications in health care: threats to the privacy and security of health information | |
Majeed et al. | Toward privacy preservation using clustering based anonymization: recent advances and future research outlook | |
Thuraisingham et al. | Towards a privacy-aware quantified self data management framework | |
Adams | Introduction to privacy enhancing technologies: a classification-based approach to understanding PETs | |
Prastyanti et al. | Law And Personal Data: Offering Strategies For Consumer Protection In New Normal Situation In Indonesia | |
Saatci et al. | Preserving privacy in personal data processing | |
Eng et al. | An exploratory study on the dark sides of artificial intelligence adoption: privacy’s invasion for intelligent marketing and intelligent services | |
Altalbe et al. | Assuring enhanced privacy violation detection model for social networks | |
Alekseenko | Privacy, Data Protection, and Public Interest Considerations for Fintech | |
Fujs et al. | What drives the motivation to self-protect on social networks? The role of privacy concerns and perceived threats | |
Wakenshaw et al. | Mechanisms for meaningful consent in Internet of Things | |
Phillips | The influence of policy regimes on the development and social implications of privacy enhancing technologies | |
Schomakers et al. | Putting Privacy into Perspective–Comparing Technical, Legal, and Users’ View of Information Sensitivity |