scholarly journals A központosított felhasználó azonosítás jelene és jövője: biztonságos infrastruktúra vagy időzített bomba?

2019 ◽  
Vol 19 (2) ◽  
pp. 52
Author(s):  
Tibor Roskó

Kutatási projektünk célkitűzése a globálisan központosított felhasználó azonosítás bevezetés lehetőségének vizsgálata, támogatási modellek kidolgozása. Hipotézisünk, hogy a globálisan központosított felhasználó azonosítás eredményesen növelheti a biztonságot és hozzájárulhat az adatvédelmi előírások hatékony, gyakorlati implementálásához. Az olvasót, jelen publikációnk keretében, egy úton szeretnénk végigvezetni, melynek célállomása hipotézisünk igazolása, miközben átfogóan megismerheti a közelmúlt adatvédelmi incidenseinek hatásait, iránymutatást kaphat mind felhasználóként, mind szolgáltatóként a biztonság növelésére a személyes adatok megosztásával kapcsolatosan és nem elhanyagolandó, kutatásunk célkitűzéseit. --- The present and future of centralized user authentication: secure infrastructure or a time-bomb? The goal of our research project is to exam the possibility of using globally centra¬lized user authentication and developing support models. Our hypothesis is that glob¬ally centralized user identification can effectively increase security and contribute to the effective implementation of data protection regulations in practice. In the con¬text of our present publication, the reader would like to be guided along a path, the purpose of which is to prove our hypothesis while gaining a comprehensive under¬standing of the effects of recent data protection incidents, providing guidance both as a user and as a service provider to enhance security in sharing personal information and not neglecting the goals of our research. We will publish more detailed theoretical and implementation descriptions of our models in a separate paper.

Bioderecho.es ◽  
2019 ◽  
Author(s):  
María Mercedes Serrano Pérez

Resumen: El tratamiento de la información personal en el contexto de la salud y de la investigación en salud ha de conjugar el derecho a la protección de datos de las personas con la necesidad de utilizar la información para la satisfacción de la vertiente colectiva que incorpora el derecho a la salud. El beneficio de dicha armonía repercute en toda la sociedad. Las leyes de protección de datos han de perseguir dicho objetivo.  Summary: The treatmen of personal information in the context of health and the investigation has to harmonize the right to data protection with the use of information to satisfy the social side of the right to health. The benefit of this relationship has an impact on society. Data protection laws pursue this objective


2015 ◽  
Vol 4 (4) ◽  
pp. 47-58 ◽  
Author(s):  
Nico Martins ◽  
Adéle da Veiga

An information security culture is influenced by various factors, one being regulatory requirements. The United Kingdom (UK) has been regulated through the UK Data Protection Act since 1995, whereas South Africa (SA) only promulgated the Protection of Personal Information Act (PoPI) in 2013. Both laws stipulate requirements from an information security perspective with regard to the processing of personal information, however in the UK this has been regulated for a longer period. Consequently, it is to be expected that the information security culture for organisations in the UK will be significantly different from that of SA. This raises the question as to whether the same information security culture assessment (ISCA) instrument could be used in an organisation with offices in both jurisdictions, and whether it might be necessary to customise it according the particular country’s enforcement of information security and privacy-related conditions. This is reviewed, firstly from a theoretical perspective, and secondly a factorial invariance analysis was conducted in a multinational organisation with offices in both the UK and SA, using data from an ISCA questionnaire, to determine possible factorial invariances in terms of the ISCA.


Author(s):  
Sam De Silva

Developments in technology and the global nature of business means that personal information about individuals in the UK may often be processed overseas, frequently without the explicit knowledge or consent of those individuals. This raises issues such as the security of such data, who may have access to it and for what purposes and what rights the individual may have to object. The Data Protection Act 1998 provides a standard of protection for personal data, including in respect of personal data that is being transferred outside of the UK. Chapter 18 focus on how a UK data controller (the organisation that controls how and why personal data is processed and is therefore legally responsible for compliance) can fulfil its business and operational requirements in transferring personal data outside the EEA, whilst ensuring legal compliance.


Author(s):  
Cumhur Boyacioglu ◽  
Orkun Yıldız

Information is vital for enterprises. However, the usage of information uniquely personal data leads to various legal problems. On the one side, enterprises require free and unlimited usage of personal data as much as possible for their continuity and progression. On the other side, natural and legal persons seek legal protection regarding their personal information or market position. It is challenging to find a fair and reasonable balance that can last for an extended period in such a dynamic field. This article evaluates the general tendencies concerning data usage, sharing, and protection problems considering Start-Up enterprises' situation aside from their legal form. The problems mainly arise in the fields of data protection and unfair competition. Some of the legal problems are also related to intellectual property. Instead of trying to find general and local solutions, it seems more useful to seek and find solutions that shall take the interests of various enterprises and companies from diverse sectors and legal traditions employing good practices. Of course, it is not very easy to reach solutions that will be accepted by all the related parties. The legal solutions should not constraint Start-Up enterprises' innovative progress, as well as meeting related parties' protection and fair trade expectations. Otherwise, privacy violations and abuse of competition will be inevitable.


Author(s):  
Robert K. McCormack

This chapter highlights a case study involving research into the science of building teams. Accomplishment of mission goals requires team members to not only possess the required technical skills but also the ability to collaborate effectively. The authors describe a research project that aims to develop an automated staffing system. Any such system requires a large amount of personal information about the potential team members under consideration. Gathering, storing, and applying this data raises a spectrum of concerns, from social and ethical implications, to technical hurdles. The authors hope to highlight these concerns by focusing on their research efforts which include obtaining and using employee data within a small business.


2003 ◽  
Vol 31 (3) ◽  
pp. 452-461 ◽  
Author(s):  
Peter Blume

Data protection and information privacy are essential parts of lex informatica. The purpose of legal rules is to sustain a modern development and adjustment of the fundamental right to privacy, taking the realities of the information society into consideration. The aim is to protect the individual against misuse of personal information that may violate the private sphere and simultaneously to protect against surveillance with the purpose of governing behavior. Privacy protection is furthermore important, since personal information, which always has had economic value to a much larger degree, has become a commodity today. There are many reasons sustaining data protection, and legal regulation is very broad covering all parts of society. Merely a fragment of this issue is being considered in the following.


Author(s):  
Feng Wang ◽  
Ge Bao Shan ◽  
Yong Chen ◽  
Xianrong Zheng ◽  
Hong Wang ◽  
...  

Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.


Sign in / Sign up

Export Citation Format

Share Document