Online Data Privacy and the Justification of the Market

Author(s):  
Jennifer Baker
Keyword(s):  
2020 ◽  
pp. 004728752095164
Author(s):  
Athina Ioannou ◽  
Iis Tussyadiah ◽  
Graham Miller

Against the backdrop of advancements in technology and its deployment by companies and governments to collect sensitive personal information, information privacy has become an issue of great interest for academics, practitioners, and the general public. The travel and tourism industry has been pioneering the collection and use of biometric data for identity verification. Yet, privacy research focusing on the travel context is scarce. This study developed a valid measurement of Travelers’ Online Privacy Concerns (TOPC) through a series of empirical studies: pilot ( n=277) and cross-validation ( n=287). TOPC was then assessed for its predictive validity in its relationships with trust, risk, and intention to disclose four types of personal data: biometric, identifiers, biographic, and behavioral data ( n=685). Results highlight the role of trust in mitigating the relationship between travelers’ privacy concerns and data disclosure. This study provides valuable contribution to research and practice on data privacy in travel.


Author(s):  
Maria Tzanou

The right to be forgotten as established in the CJEU's decision in Google Spain is the first online data privacy right recognized in the EU legal order. This contribution explores two currently underdeveloped in the literature aspects of the right to be forgotten: its unexpected consequences on search engines and the difficulties of its implementation in practice by the latter. It argues that the horizontal application of EU privacy rights on private parties, such as internet search engines—as undertaken by the CJEU—is fraught with conceptual gaps, dilemmas, and uncertainties that create confusions about the enforceability of the right to be forgotten and the role of search engines. In this respect, it puts forward a comprehensive legal framework for the implementation of this right, which aims to ensure a legally certain and proportionate balance of the competing interests online in the light of the EU's General Data Protection Regulation (GDPR).


Author(s):  
Maria Tzanou

The right to be forgotten as established in the CJEU's decision in Google Spain is the first online data privacy right recognized in the EU legal order. This contribution explores two currently underdeveloped in the literature aspects of the right to be forgotten: its unexpected consequences on search engines and the difficulties of its implementation in practice by the latter. It argues that the horizontal application of EU privacy rights on private parties, such as internet search engines—as undertaken by the CJEU—is fraught with conceptual gaps, dilemmas, and uncertainties that create confusions about the enforceability of the right to be forgotten and the role of search engines. In this respect, it puts forward a comprehensive legal framework for the implementation of this right, which aims to ensure a legally certain and proportionate balance of the competing interests online in the light of the EU's General Data Protection Regulation (GDPR).


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Libing Wu ◽  
Zhiyan Xu ◽  
Debiao He ◽  
Xianmin Wang

With the application of sensor technology in the field of healthcare, online data sharing in healthcare industry attracts more and more attention since it has many advantages, such as high efficiency, low latency, breaking the geographical location, and time constraints. However, due to the direct involvement of patient health information, the privacy and integrity of medical data have become a matter of much concern to the healthcare industry. To retain data privacy and integrity, a number of digital signature schemes have been introduced in recent years. Unfortunately, most of them suffer serious security attacks and do not perform well in terms of computation overhead and communication overhead. Very recently, Pankaj Kumar et al. proposed a certificateless aggregate signature scheme for healthcare wireless sensor network. They claimed that their signature scheme was able to withstand a variety of attacks. However, in this paper, we find that their scheme fails to achieve its purpose since it is vulnerable to signature forgery attack and give the detailed attack process. Then, we propose a new certificateless aggregate signature scheme to fix the security flaws and formally prove that our proposed scheme is secure under the computationally hard Diffie-Hellman assumption. Security analysis and performance evaluation demonstrate that the security of our proposal is improved while reducing the computation cost. Compared with Pankaj Kumar et al.'s scheme, our proposed scheme is more efficient and suitable for the healthcare wireless sensor networks (HWSNs) to maintain security at various levels.


2015 ◽  
Vol 9 (1) ◽  
pp. 129-153
Author(s):  
Dan Svantesson

In this article I will address a somewhat eclectic selection of data privacy topics that I think are of particular significance, including:Some international developments in the data privacy law area;Extraterritoriality issues including the ‘jurisdictional lasagne’;The recently decided Court of Justice of the European Union (CJEU) case on the so-called ‘right to be forgotten’;‘Big Data’ and the Internet of Things; andThe concept of ‘consent’.


2014 ◽  
Vol 8 (2) ◽  
pp. 201-207 ◽  
Author(s):  
Duncan H. Brown ◽  
Norma Pecora

Sign in / Sign up

Export Citation Format

Share Document