personally identifiable information
Recently Published Documents


TOTAL DOCUMENTS

133
(FIVE YEARS 67)

H-INDEX

8
(FIVE YEARS 3)

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Mobile or IOT based applications are emerging rapidly across the globe and there is a massive digital transformation happening within each country. It is a need of an hour to improve and protect digital identity during online transactions through handheld devices. This paper proposes a Mobile ID solution based on Mobile-originated PKI without the need for the actual identity card or a card reader. The solution proposed focuses on security, privacy, and usability using open standards which will protect Personally Identifiable Information (PII) over handheld devices. The proposed mobile ID solution has better cost-efficacy and privacy than today’s scenario. It also explicates the Mobile ID solution with established secure identity among users, authorities, other organizations of public, and private sectors.


2021 ◽  
pp. 327-347
Author(s):  
Fred Cate ◽  
Rachel Dockery

This chapter discusses cybersecurity laws. Many measures employed to enhance cybersecurity pose a risk to privacy. In addition, data protection laws focus only on personally identifiable information, while cybersecurity is also concerned with securing economic data such as trade secrets and company databases, government information, and the systems that transmit and process information. As a practical matter, despite the prominence of security obligations in data protection legislation, these were often downplayed or ignored entirely until recent years. Only as cybersecurity threats became more pressing did regulators begin actively enforcing the security obligations found in most data protection laws. More recently, legislative bodies and regulators have begun adopting cybersecurity-specific obligations. However, even these have often mirrored or been combined with privacy protections, sometimes to the detriment of effective cybersecurity. The chapter describes major categories of cybersecurity law, including unfair or deceptive practices legislation, breach notification laws, and data destruction laws. It also considers the new focus on critical infrastructure and information sharing, the China Cybersecurity Law, and the new challenges to data privacy and security law.


Data breaches expose individuals to economic, mental, and social trauma. Electronic health information of individuals not only includes reports of medical diagnosis, medication histories but also comprises personally identifiable information (PII) (e.g, birth date). We examined the association of vulnerability perception - defined as privacy or security breach concerns and provider encouragement with the use of online medical records (OMR) and moderating effects of provider encouragement and age in the relationship between vulnerability and usage. Data came from a national population-based survey, the Health Information National Trends Survey (HINTS). This study included 1770 adult individuals many of who are chronic disease patients or cancer survivors. The majority of these subjects did report use of OMR. We found security/privacy related vulnerability and provider encouragement significantly predict patients' use of OMR. Healthcare providers and developers should work with patients to mitigate concerns and enable patients to derive benefits from using online medical records.


2021 ◽  
Vol 4 (1) ◽  
pp. 117-142
Author(s):  
Chad Currier

Learning analytics involve big data collection, analysis processes, and technology that are used in higher education institutes and academic libraries to support student success and perform organizational assessment. Since these processes require the input of personally identifiable student and patron information to be effective, there are major ethical and legal considerations that must be addressed concerning privacy. This article demonstrates that privacy concerns about learning analytics can be mitigated by requiring informed consent from participants, establishing protocols for the collection and management of personally identifiable information, and advocating privacy rights of patrons. By synthesizing and expanding on viewpoints from the literature, this article offers recommendations pertaining to the collection, analysis, and management of patron data that are gathered for the purpose of learning analytics.


2021 ◽  
Vol 11 (3) ◽  
pp. 58-81
Author(s):  
Mustafa Canan ◽  
Omer Ilker Poyraz ◽  
Anthony Akil

The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost varies significantly with personally identifiable information (PII) and sensitive personally identifiable information (SPII) with unique patterns. Second, SPII must be a separate independent variable. Third, the multilevel factorial interactions between SPII and the other independent variables elucidate subtle patterns in the total data breach cost variation. Fourth, class action lawsuit (CAL) categorical variables regulate the variation in the total data breach cost.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Supreet Kaur ◽  
Satinder Kumar

PurposeThe present study investigates the antecedents of sharenting, underlying strategies to mitigate the privacy risks of sharing children's personally identifiable information (PII) and majorly explores the relationship between sharenting activities of the parents and their buying behaviour. The study corroborates the previous studies in an advanced manner and adds a new construct “sherub marketing” as an effective marketing tool to impact the buying decisions of the parents.Design/methodology/approachFollowing interpretative phenomenological analysis, semi-structured personal interviews were conducted towards actively engaged parents on social media. For inferential analysis, responses of 23 parents were analysed with the help of theoretical thematic analysisFindingsThe findings uncover the multifaceted reasons persisting behind sharenting activities of the parents and observe a strong relationship between sharenting and buying behaviour of parents. The study results into exploration of sherub marketing as an effective marketing tool to influence the actions of the sharenters.Practical implicationsThe study will be of use to both the practitioners and the society as a whole as it indicates the ramification of parental sharing and the role of marketers in influencing the purchasing decisions of the sharenters.Originality/valueThe present study is a novice and untapped area in the literature of interactive marketing and sheds light on sherub marketing as an effective marketing strategy.


Sign in / Sign up

Export Citation Format

Share Document