Protecting privacy in automated transaction systems : a legal and technological perspective in the European Union
Wang, Faye Fangfei and Griffiths, Nathan. (2010) Protecting privacy in automated transaction systems : a legal and technological perspective in the European Union. International Review of Law, Computers & Technology, Vol.24 (No.2). pp. 153-162. ISSN 1360-0869Full text not available from this repository.
Official URL: http://dx.doi.org/10.1080/13600861003748243
In the past, spies could enter one's residence, organisations or companies and collect valuable information such as personal sensitive data, trade secrets or transaction records. Nowadays, the open architecture of the Internet has generated an environment in which there are more opportunities to quickly and easily obtain data than there used to be, as a variety of sensitive information can be captured on the Internet without a physical presence in the location where the data is situated. Privacy rights have consequently become more vulnerable to attack. This paper will discuss the current legal framework of ePrivacy protection in the European Union (EU), examine the state-of-the-art technologies for service-oriented computing, evaluate practical obstacles and propose possible solutions to establish trust in privacy management.
|Item Type:||Journal Article|
|Subjects:||H Social Sciences > HV Social pathology. Social and public welfare
K Law > K Law (General)
Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
|Divisions:||Faculty of Science > Computer Science|
|Library of Congress Subject Headings (LCSH):||Data protection -- Law and legislation, Banks and banking -- Automation, Service-oriented architecture (Computer science), Computer crimes -- Prevention, Computer security -- Law and legislation , European Union|
|Journal or Publication Title:||International Review of Law, Computers & Technology|
|Page Range:||pp. 153-162|
|Access rights to Published version:||Restricted or Subscription Access|
|Description:||Special Issue: Cybercrime and Privacy (SLS Cyberlaw Section 2009)|
Actions (login required)