![]() In defence of privacy: The concept and the regime. Technology Blog at The Guardian UK Newspaper.īennett, C. ![]() What’s a zettabyte? By 2015, the internet will know, says Cisco. Theory, Culture and Society ( SAGE 2011) 28(6):24.Īrthur, Charles. Data derivatives: On the emergence of a security risk calculus for our times. Totowa: Rowman and Littlefield.Īmoore, Louise. Uneasy access: Privacy for women in a free society. This process is experimental and the keywords may be updated as the learning algorithm improves.Īllen, Anita L. These keywords were added by machine and not by the authors. Particular attention will be paid to how data mining defies this principle in a way that data analysis tools of the recent past do not. As early as 1998, commentators have noted that there is quite a paradoxical relation between data mining and some data protection principles.This paper seeks to explore this so-called paradoxical relationship further and to specifically examine how data mining calls into question the purpose limitation principle. And, perhaps nowhere is this more evident than when it comes data mining, which puts the European Union data protection principles to the ultimate test. One of the problems, however, with the European Union’s current reliance on fair information principles is that these tools are increasingly challenged by the technological reality. These tools empower the individual by giving him/her rights to control the processing of his/her data. ![]() European Union data protection law aims to protect individuals from privacy intrusions through a myriad of procedural tools that reflect a code of fair information principles.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |