scholarly journals Regulating the Information Society: Data Protection and Ireland's Internet Industry

2020 ◽  
Author(s):  
TJ McIntyre

Ireland has become a global hub for personal information with internet firms headquartered in Dublin collectively holding information on billions of users. But has Ireland been a responsible regulator of the way in which these firms use that data? In this chapter I examine the approach taken by the Irish state, tracing the evolution of data protection governance and its application to the internet industry.

Author(s):  
T. J. McIntyre

Ireland has become a global hub for personal information, with internet firms headquartered there holding information on billions of users. But has Ireland been a responsible regulator? This chapter examines the approach of the Irish state, tracing the evolution of data protection governance and its application to the internet industry. It outlines the legal and policy context, and argues that regulation has been hampered by a weak legislative framework and significant under-resourcing of the data protection supervisory authority. Using Facebook as a case study, it examines how this has prompted international pressure for stronger regulation and evaluates the Irish response. It concludes by arguing that Ireland has yet to properly engage with the wider issues presented by its new role as a key jurisdiction for the internet industry, with data protection being just one of many aspects that need more attention as Irish regulation increasingly has spillover effects elsewhere.


2010 ◽  
Vol 4 (2) ◽  
pp. 150-167
Author(s):  
Jim McDonnell

This paper is a first attempt to explore how a theology of communication might best integrate and develop reflection on the Internet and the problematic area of the so-called “information society.” It examines the way in which official Church documents on communications have attempted to deal with these issues and proposes elements for a broader framework including “media ecology,” information ethics and more active engagement with the broader social and policy debates.


Author(s):  
Meghna Babubhai Patel ◽  
Jagruti N. Patel ◽  
Upasana M. Bhilota

ANN can work the way the human brain works and can learn the way we learn. The neural network is this kind of technology that is not an algorithm; it is a network that has weights on it, and you can adjust the weights so that it learns. You teach it through trials. It is a fact that the neural network can operate and improve its performance after “teaching” it, but it needs to undergo some process of learning to acquire information and be familiar with them. Nowadays, the age of smart devices dominates the technological world, and no one can deny their great value and contributions to mankind. A dramatic rise in the platforms, tools, and applications based on machine learning and artificial intelligence has been seen. These technologies not only impacted software and the internet industry but also other verticals such as healthcare, legal, manufacturing, automobile, and agriculture. The chapter shows the importance of latest technology used in ANN and future trends in ANN.


2003 ◽  
Vol 31 (3) ◽  
pp. 452-461 ◽  
Author(s):  
Peter Blume

Data protection and information privacy are essential parts of lex informatica. The purpose of legal rules is to sustain a modern development and adjustment of the fundamental right to privacy, taking the realities of the information society into consideration. The aim is to protect the individual against misuse of personal information that may violate the private sphere and simultaneously to protect against surveillance with the purpose of governing behavior. Privacy protection is furthermore important, since personal information, which always has had economic value to a much larger degree, has become a commodity today. There are many reasons sustaining data protection, and legal regulation is very broad covering all parts of society. Merely a fragment of this issue is being considered in the following.


Author(s):  
Matt Zwolenski ◽  
Lee Weatherill

The Digital Universe, which consists of all the data created by PC, Sensor Networks, GPS/WiFi Location, Web Metadata, Web-Sourced Biographical Data, Mobile, Smart-Connected Devices and Next-Generation Applications (to name but a few) is altering the way we consume and measure IT and disrupting proven business models. Unprecedented and exponential data growth is presenting businesses with new and unique opportunities and challenges. As the ‘Internet of Things’ (IoT) and Third Platform continue to grow, the analysis of structured and unstructured data will drive insights that change the way businesses operate, create distinctive value, and deliver services and applications to the consumer and to each other. As enterprises and IT grapple to take advantage of these trends in order to gain share and drive revenue, they must be mindful of the Information Security and Data Protection pitfalls that lay in wait ─ hurdles that have already tripped up market leaders and minnows alike.


Author(s):  
István Mezgar

Based on the results of the information and communications technologies (ICTs), a new “digital” economy and society are arising. This new computer- and communication-networked environment needs new set of services and technologies besides new rules and values, which determine the behavior of its actors. In the starting phase of information society the Internet, later on the Internet-based technologies (e.g., the Web) have changed the way business was done the world over, and is now changing the way government interacts with citizens and business sector. With the dramatic increase of the Internet as a business tool and the incredible growth of e-technologies have changed not only the economy but the society as well. According to researchers, early e-government was a form of e-commerce as both used Internet-based technology for the benefit of the information society. Today, e-government can be defined as online government services, that is, any interaction one might have with any government body or agency, using the Internet or World Wide Web. As the mobility is an important characteristic of the information society, new e-government solutions apply wireless/mobile networks as well. The insufficient security of many Internet services is an important limitation of using the Internet. Lack of trustworthy security services is a major obstacle to the use of information systems in private, in business as well as in public services. Trust is intimately linked to citizens’ rights, like security, identification, authentication, privacy, and confidentiality. Secure identification, authentication of the users and communication security are main problems in today’s networked systems. These demands for trust and security are valid in an increased extent in case of digital government applications.


Author(s):  
Anabelen Casares Marcos

The right to informational self-determination has raised bitter debate over the last decade as to the opportunity and possible scope of the right to demand withdrawal from the internet of personal information which, while true, might represent a detriment that there is no legal duty to put up with. The leading case in this topic is that of Mario Costeja, Judgment of the EU Court of Justice, May 13, 2014. The interest of recent European jurisprudence lies not so much in the recognition of such a right but in the appreciation of certain limits to its implementation, assisting data protection authorities in balancing the rights at stake in each case. Reflection on the current status of the issue considers rights and duties imposed in the matter by Regulation (EU) 2016/679, of 27 April, known as the new General Data Protection Regulation.


2019 ◽  
pp. 146-164
Author(s):  
Christopher Millard

This chapter brings a legal perspective to bear on the topic of data protection on the contemporary Internet in which personal information is increasingly stored and processed in, and accessed from, “the cloud.” The reliance of ever more apps, websites, and services on cloud providers contrasts with earlier days of the Internet in which much more data was stored locally on personal computers. At a time when there is ever more use of cloud computing, this chapter illuminates the complexities over what information in cloud computing environments is protected as personal data, and who is responsible. Will data protection laws, such as those in the EU, protect us, or are there alternative approaches to providing effective protection for personal data in clouds? This chapter airs the question of whether a greater focus should be placed on localizing personal data, as advocated by the Internet pioneer, Tim Berners-Lee.


Author(s):  
Bernard Szatkowski

Introducing new technologies is being slowly presented more and more as a dystopiarather than utopia. The information revolution is understood as the Internet and all furtherconsequences of its existence. It is obvious that social media are becoming the main tool ofpolitical communication and social and political activation. Direct communication with theelectorate using these means opens politicians to the unprecedented possibilities, but at thesame time it raises numerous controversies. ICT technologies have changed the way not onlyparties act, but also many groups, organizations and associations. The changes also influencemany apolitical areas of life, however there should be a political discussion about thepossibility of regulations. The examples presented in the text of the further going solutions issupposed to serve as a reflection on the issue of predictability of the consequences of humaninventiveness.Keywords: ITC technologies, information society, social media, artificial intelligence, utopiaand dystopia


Sign in / Sign up

Export Citation Format

Share Document