[go: up one dir, main page]

Phillips, 2004 - Google Patents

Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies

Phillips, 2004

Document ID
12134786878659912580
Author
Phillips D
Publication year
Publication venue
New Media & Society

External Links

Snippet

'Privacy'is an ambiguous notion, encompassing personal autonomy, democratic participation, identity management, and social coordination. Each of these privacy ideals reflect different sets of social concerns. Laws operationalize privacy in terms of 'personally …
Continue reading at journals.sagepub.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3578Hierarchy of users of cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects

Similar Documents

Publication Publication Date Title
Phillips Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies
Xiang et al. Privacy protection and secondary use of health data: strategies and methods
US20220012364A1 (en) Systems and methods for enforcing privacy-respectful, trusted communications
Spiekermann et al. Engineering privacy
AU2018258656B2 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
Milne et al. Information sensitivity typology: Mapping the degree and type of risk consumers perceive in personal data sharing
Rafiq et al. Privacy prevention of big data applications: A systematic literature review
US10043035B2 (en) Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments
CA3104119C (en) Systems and methods for enforcing privacy-respectful, trusted communications
Liu et al. A Clustering K‐Anonymity Privacy‐Preserving Method for Wearable IoT Devices
US20180307859A1 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
Shen et al. Privacy enhancing technologies: A review
Williams Social networking applications in health care: threats to the privacy and security of health information
Majeed et al. Toward privacy preservation using clustering based anonymization: recent advances and future research outlook
Thuraisingham et al. Towards a privacy-aware quantified self data management framework
Adams Introduction to privacy enhancing technologies: a classification-based approach to understanding PETs
Prastyanti et al. Law And Personal Data: Offering Strategies For Consumer Protection In New Normal Situation In Indonesia
Saatci et al. Preserving privacy in personal data processing
Eng et al. An exploratory study on the dark sides of artificial intelligence adoption: privacy’s invasion for intelligent marketing and intelligent services
Altalbe et al. Assuring enhanced privacy violation detection model for social networks
Alekseenko Privacy, Data Protection, and Public Interest Considerations for Fintech
Fujs et al. What drives the motivation to self-protect on social networks? The role of privacy concerns and perceived threats
Wakenshaw et al. Mechanisms for meaningful consent in Internet of Things
Phillips The influence of policy regimes on the development and social implications of privacy enhancing technologies
Schomakers et al. Putting Privacy into Perspective–Comparing Technical, Legal, and Users’ View of Information Sensitivity