Information Communication Technology Law, Protection and Access Rights
Latest Publications


TOTAL DOCUMENTS

27
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781615209750, 9781615209767

Author(s):  
Juan José Andrés Gutiérrez ◽  
Esteban Pérez-Castrejón ◽  
Ana Isabel Calvo-Alcalde ◽  
Jesús Vegas ◽  
Miguel Ángel González

Chapter 26 describes the present situation of E-Health at home taking into account legal, privacy and security aspects. As a first step, some background and a general description of E-Health activities at home are presented. In order to have a general idea of the current status of this field, we analyze the general legal situation in terms of ICT for E-Health and several related issues on data mining privacy and information recovery aspects. The topics covered include the taxonomy for secondary uses of clinical data and a description of the role that controlled vocabularies play. Concerning the provision of E-Health at home, the chapter revises the current situation in the digital home evolution including topics on sensors and sanitary devices. Furthermore the challenge of digital identity at home and the differences between the domestic environment and the professional one are considered. Finally some ethical considerations under the "InfoEthics" concept and future lines of work are addressed.


Author(s):  
Sam De Silva

Developments in technology and the global nature of business means that personal information about individuals in the UK may often be processed overseas, frequently without the explicit knowledge or consent of those individuals. This raises issues such as the security of such data, who may have access to it and for what purposes and what rights the individual may have to object. The Data Protection Act 1998 provides a standard of protection for personal data, including in respect of personal data that is being transferred outside of the UK. Chapter 18 focus on how a UK data controller (the organisation that controls how and why personal data is processed and is therefore legally responsible for compliance) can fulfil its business and operational requirements in transferring personal data outside the EEA, whilst ensuring legal compliance.


Author(s):  
Pawan Chhabra ◽  
Chetan Jagatkishore Kothari ◽  
Subhadip Sarkar

In recent times, the focus of innovation is increasingly moving beyond the centralized R&D programs of large firms to more of a collaborative innovation. This is true even in the Information Communication Technology (ICT) industries. With this approach in mind, the technical strategy has to be laid down to design appropriate architectural models that act as key foundations of building large software systems without compromising on access rights, privacy, confidentiality, ethics, policies, IP, etc. A platform that can enable researchers to share their views, ideas, thoughts or products in seamless manner is the need of the hour. Chapter 17 examines the ways and means of creating a standard model which focuses on well proven software design practices to leverage full potential of open innovation platform; while focusing upon the evolution of IP trends and without compromising on access rights, privacy, confidentiality, ethics, policies, IP, etc.


Author(s):  
Beatriz Sainz de Abajo ◽  
Isabel de la Torre Díez ◽  
Miguel López-Coronado

The objective of chapter 14 is the study of the art of e-commerce, analyzing the different existing commercial models in the market such as Business to Business (B2B), Business to Consumers (B2C), Business to Business to Consumers (B2B2C), Consumers to Business (C2B), Business to Employee (B2E), Administration to Business/Consumers/Administration (A2/B/C/A), Consumers to Consumers (C2C), Peer to Peer (P2P), Mobile to Business (M2B) and Small Office Home Office (SOHO) amongst others, the level of implementation in the work place as well as the level of acceptation in society and the regulatory framework for the development of the activity. After this study, the central theme will be one of carrying out a study of the pros and cons that e-commerce brings to the client and to the company. Moreover, a study is carried out of the implementation of e-commerce in a Small and Medium Enterprise (SME), analyzing the technological possibilities and the market of the company which is the object of the study, as well as the associated barriers and risks.


Author(s):  
Riikka Kulmala ◽  
Juha Kettunen

As discussed in chapter 10, knowledge-based assets, intellectual property, and capital play a fundamental role in an enterprise’s competitiveness, especially in small knowledge intensive enterprises. Small knowledge intensive enterprises need to create new ways of operating in order to manage the intellectual and knowledge-based assets in their organizations more efficiently. Organizational knowledge and intellectual property can be protected, either formally via IPR, or informally via efficient knowledge management. Successful IP protection requires systematic intellectual property and knowledge management. Intellectual property protection via efficient knowledge management affects the entire organization rather than being just a separate task. It needs to be embedded in organizational work routines, practices, and processes as an overall operational strategy. When embedded in organizational work processes, IP protection and knowledge management become a continuous part of work routines and tasks in the enterprise, not a separate action.


Author(s):  
Witold Abramowicz ◽  
Piotr Stolarski ◽  
Tadeusz Tomaszewski

As discussed in the fouth chapter, re-usability is frequently declared as sine qua non feature of modern ontology engineering. Although thoroughly examined in general theory of knowledge management models the re-usability issue is still barely a declaration in the domain of legal ontologies. The similar situation also applies to statute-specific ontologies. Those knowledge modeling entities are well described especially as an opposition to the general application legal ontologies. Yet it is trivial to say that most of the developed legal ontologies so far are those generic ones. And this sole fact should not surprise as the very specialized knowledge models – usually harder to develop – are at the same time narrowed with their utility. Of course in terms of re-usability this simply means that this feature may be largely disabled in this kind of knowledge models. In this chapter the authors face both challenges, i.e. as an excuse for presentation of the most interesting in their opinion trends and works in the field the authors demonstrate the practical approach to modeling copyright law case by re-using statute-specific ontologies.


Author(s):  
Isabelle Motte ◽  
Monique Noirhomme-Fraiture

Web accessibility is a major question in present ICT legislation. An ageing population is a known phenomenon that makes older people become a specific interest group. In chapter 25 the authors present the evolution encountered in laws and standards due to specific concern about older people. This publication is related to the works of the W3C WAI-AGE group. The authors focus mainly in the adaptations encountered in W3C accessibility guidelines (WCAG) while considering the difficulties related to ageing.  The chapter also proposes some practical recommendations for web designers that want to develop websites targeting seniors, and finally gives some perspectives about accessibility legislation and standards.


Author(s):  
Georgios V. Lioudakis ◽  
Francesca Gaudino ◽  
Elisa Boschi ◽  
Giuseppe Bianchi ◽  
Dimitra I. Kaklamani ◽  
...  

Passive network monitoring is very useful for the operation, maintenance, control and protection of communication networks, while in certain cases it provides the authorities with the means for law enforcement. Nevertheless, the flip side of monitoring activities is that they are natively surrounded by serious privacy implications and, therefore, they are subject to data protection legislation. Chapter 22 investigates the challenges related to privacy protection in passive network monitoring, based on a joint technical and regulatory analysis of the associated issues. After introducing the issue and its special characteristics, the chapter provides background knowledge regarding the corresponding legal and regulatory framework, as well as some related work. It then delves into the description of the legal and regulatory requirements that govern network monitoring systems, before providing an overview of a reference monitoring system, which has been designed with these requirements in mind.


Author(s):  
Jaroslav Kral ◽  
Michal Zemlicka

Business intelligence is the most powerful part of enterprise information systems (ERP). It is shown that the absence of the counterpart of business intelligence in e-government called civic intelligence (CI) has important negative consequence that are probably more severe than the absence of business intelligence for enterprises. Missing CI threatens the prosperity of countries and nations as it has crucial negative effects on social processes like the quality of education, health-care research, and research and control of economic processes. Data security of CI is an issue. Current practices of data security are to a high degree equivalent to virtual massive data shredding. It is a big obstacle for the development of CI. An architecture of CI allowing satisfactory level of data security is proposed in chapter 15, together with organizational and legislative preconditions of CI, and the barriers of CI are analyzed.


Author(s):  
Jeremy Pitt ◽  
Arvind Bhusate

<P style="LINE-HEIGHT: 115%; MARGIN: 0in 0in 0pt" class=MsoNormal><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 11pt" lang=EN-GB>Pervasive computing aims to saturate ambient environments with sensors and processors; affective computing aims to infer emotive and intentional states from physiological readings and physical actions. The convergence of pervasive and affective computing offers genuine promise for creating ambient environments which (re-)configure themselves according to user’s emotive states. On the down-side, there is a real risk of privacy invasion if emotions, behaviours, and even intentions are recorded and subject to the same content-access rules as telephone calls, IP logs, and so on. Based on an experiment to enhance Quality of Experience (QoE) in a visit to a public collection enhanced with pervasive and affective computing, chapter 11 discuss the subtle interactions and requirements of enhanced service provision vis-à-vis privacy rights. The outcome will contribute to the discussion on ensuring an effective relationship between technologists and application developers on the one hand, and those concerned with privacy rights, ethical computing and formulation of social policy on the other, to promote and protect the rights and interests of citizens.<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /><o:p></o:p></SPAN></P>


Sign in / Sign up

Export Citation Format

Share Document