Social Emergent Semantics for Personal Data Management

Author(s):  
Cristian Vasquez
2020 ◽  
Vol 7 (1) ◽  
pp. 205395172093561
Author(s):  
Todd Hartman ◽  
Helen Kennedy ◽  
Robin Steedman ◽  
Rhianne Jones

Low levels of public trust in data practices have led to growing calls for changes to data-driven systems, and in the EU, the General Data Protection Regulation provides a legal motivation for such changes. Data management is a vital component of data-driven systems, but what constitutes ‘good’ data management is not straightforward. Academic attention is turning to the question of what ‘good data’ might look like more generally, but public views are absent from these debates. This paper addresses this gap, reporting on a survey of the public on their views of data management approaches, undertaken by the authors and administered in the UK, where departure from the EU makes future data legislation uncertain. The survey found that respondents dislike the current approach in which commercial organizations control their personal data and prefer approaches that give them control over their data, that include oversight from regulatory bodies or that enable them to opt out of data gathering. Variations of data trusts – that is, structures that provide independent stewardship of data – were also preferable to the current approach, but not as widely preferred as control, oversight and opt out options. These features therefore constitute ‘good data management’ for survey respondents. These findings align only in part with principles of good data identified by policy experts and researchers. Our findings nuance understandings of good data as a concept and of good data management as a practice and point to where further research and policy action are needed.


2009 ◽  
Vol 17 (4) ◽  
pp. 311-329 ◽  
Author(s):  
Pavlos S. Efraimidis ◽  
Georgios Drosatos ◽  
Fotis Nalbadis ◽  
Aimilia Tasidou

2019 ◽  
Vol 14 (2) ◽  
pp. 13-27
Author(s):  
Janusz RYBIŃSKI

Działalność przedsiębiorstw jest regulowana wieloma przepisami prawa, z których w ostatnim okresie na pierwszy plan wysuwają się te dotyczące danych osobowych. Wprowadzenie RODO spowodowało, że ochrona danych osobowych nabrała nowego wymiaru i to niezależnie od pozostałych uwarunkowań prowadzenia działalności gospodarczej. W artykule przedstawiono próbę przybliżenia przepisów z zakresu ochrony danych osobowych, które dla wielu przedsiębiorców stanowią poważne wyzwanie. Ponadto skupiono się na problemach praktycznego funkcjonowania tych norm prawnych, które z założenia mają poprawić stan ochrony danych osobowych znajdujących się w dyspozycji przedsiębiorców nie tylko w naszym kraju.


Author(s):  
Damla Kilic ◽  
Andy Crabtree ◽  
Glenn McGarry ◽  
Murray Goulden

AbstractThe home is a site marked by the increasing collection and use of personal data, whether online or from connected devices. This trend is accompanied by new data protection regulation and the development of privacy enhancing technologies (PETs) that seek to enable individual control over the processing of personal data. However, a great deal of the data generated within the connected home is interpersonal in nature and cannot therefore be attributed to an individual. The cardboard box study adapts the technology probe approach to explore with potential end users the salience of a PET called the Databox and to understand the challenge of collaborative rather than individual data management in the home. The cardboard box study was designed as an ideation card game and conducted with 22 households distributed around the UK, providing us with 38 participants. Demographically, our participants were of varying ages and had a variety of occupational backgrounds and differing household situations. The study makes it perspicuous that privacy is not a ubiquitous concern within the home as a great deal of data is shared by default of people living together; that when privacy is occasioned it performs a distinct social function that is concerned with human security and the safety and integrity of people rather than devices and data; and that current ‘interdependent privacy’ solutions that seek to support collaborative data management are not well aligned with the ways access control is negotiated and managed within the home.


the security of users are questioned when security breaches occur in data when third parties are incorporated for collecting and controlling huge amount of personal data. A decentralized network of peers are accompanied by a public ledger and it has demonstrated bitcoin in the financial space that trusted and auditable computing. This paper describes a decentralized personal data management system for ensuring users control over their data. A protocol is implemented that is capable of turning a blockchain into an automated access-control manager that is not requiring trust in a third party. There are no strict financial transactions in our system. They are used for carrying instructions like querying, storing and sharing data. Finally, some possible blockchain extensions are discussed that are able to harness them into a well-rounded solution for faithful computing problems in society.


Author(s):  
Namje Park ◽  
Kwangwoo Lee ◽  
Sangkeun Yoo ◽  
Junseob Lee ◽  
Youngwoon Kim ◽  
...  

Author(s):  
Richard Mortier ◽  
Tom Lodge ◽  
Tosh Brown ◽  
Derek McAuley ◽  
Chris Greenhalgh ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document