Strategic News Bundling and Privacy Breach Disclosures

2015 ◽  
Author(s):  
Sebastien Gay
Keyword(s):  
Author(s):  
Dedi Gunawan ◽  
Yusuf Sulistyo Nugroho ◽  
Maryam ◽  
Fatah Yasin Al Irsyadi

2020 ◽  
pp. 106-130
Author(s):  
Julian Petley

This chapter examines the laws which have had a particular bearing on the practice of journalism in newspapers in England and Wales in the twentieth and twenty-first centuries. These relate to defamation, privacy, breach of confidence, official secrecy and terrorism. In particular it focusses on the recent impact of the European Convention on Human Rights and the Human Rights Act 1998 on how courts have interpreted and applied the various laws affecting press freedom in these particular areas. It argues that whilst much of the press has chafed against laws which prevent it from invading people’s private lives and unjustly defaming them, it has been remarkably insouciant about those which make it difficult to reveal abuses of state and corporate power.


2015 ◽  
pp. 426-458 ◽  
Author(s):  
S. R. Murugaiyan ◽  
D. Chandramohan ◽  
T. Vengattaraman ◽  
P. Dhavachelvan

The present focuses on the Cloud storage services are having a critical issue in handling the user's private information and its confidentiality. The User data privacy preserving is a vital facet of online storage in cloud computing. The information in cloud data storage is underneath, staid molests of baffling addict endeavor, and it may leads to user clandestine in a roar privacy breach. Moreover, privacy preservation is an indeed research pasture in contemporary information technology development. Preserving User Data in Cloud Service (PUDCS) happens due to the data privacy breach results to a rhythmic way of intruding high confidential digital storage area and barter those information into business by embezzle others information. This paper focuses on preventing (hush-hush) digital data using the proposed privacy preserving framework. It also describes the prevention of stored data and de-identifying unauthorized user attempts, log monitoring and maintaining it in the cloud for promoting allusion to providers and users.


Author(s):  
Maryam Qamar ◽  
Mehwish Malik ◽  
Saadia Batool ◽  
Sidra Mehmood ◽  
Asad W. Malik ◽  
...  

This work covers the research work on decentralization of Online Social Networks (OSNs), issues with centralized design are studied with possible decentralized solutions. Centralized architecture is prone to privacy breach, p2p architecture for data and thus authority decentralization with encryption seems a possible solution. OSNs' users grow exponentially causing scalability issue, a natural solution is decentralization where users bring resources with them via personal machines or paid services. Also centralized services are not available unremittingly, to this end decentralization proposes replication. Decentralized solutions are also proposed for reliability issues arising in centralized systems and the potential threat of a central authority. Yet key to all problems isn't found, metadata may be enough for inferences about data and network traffic flow can lead to information on users' relationships. First issue can be mitigated by data padding or splitting in uniform blocks. Caching, dummy traffic or routing through a mix of nodes can be some possible solutions to the second.


Sign in / Sign up

Export Citation Format

Share Document