The Library
Protecting privacy in automated transaction systems : a legal and technological perspective in the European Union
Tools
Wang, Faye Fangfei and Griffiths, Nathan (2010) Protecting privacy in automated transaction systems : a legal and technological perspective in the European Union. International Review of Law, Computers & Technology, Vol.24 (No.2). pp. 153-162. doi:10.1080/13600861003748243 ISSN 1360-0869.
PDF
irlct-2010.pdf - Published Version Embargoed item. Restricted access to Repository staff only - Requires a PDF viewer. Download (110Kb) |
Official URL: http://dx.doi.org/10.1080/13600861003748243
Abstract
In the past, spies could enter one's residence, organisations or companies and collect valuable information such as personal sensitive data, trade secrets or transaction records. Nowadays, the open architecture of the Internet has generated an environment in which there are more opportunities to quickly and easily obtain data than there used to be, as a variety of sensitive information can be captured on the Internet without a physical presence in the location where the data is situated. Privacy rights have consequently become more vulnerable to attack. This paper will discuss the current legal framework of ePrivacy protection in the European Union (EU), examine the state-of-the-art technologies for service-oriented computing, evaluate practical obstacles and propose possible solutions to establish trust in privacy management.
Item Type: | Journal Article | ||||
---|---|---|---|---|---|
Subjects: | H Social Sciences > HV Social pathology. Social and public welfare K Law [Moys] > KW European Union Law Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software |
||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||
Library of Congress Subject Headings (LCSH): | Data protection -- Law and legislation -- European Union countries, Computer security -- Law and legislation -- European Union countries, Banks and banking -- Automation, Service-oriented architecture (Computer science), Computer crimes -- Prevention | ||||
Journal or Publication Title: | International Review of Law, Computers & Technology | ||||
Publisher: | Routledge | ||||
ISSN: | 1360-0869 | ||||
Official Date: | July 2010 | ||||
Dates: |
|
||||
Volume: | Vol.24 | ||||
Number: | No.2 | ||||
Page Range: | pp. 153-162 | ||||
DOI: | 10.1080/13600861003748243 | ||||
Status: | Peer Reviewed | ||||
Access rights to Published version: | Restricted or Subscription Access | ||||
Description: | Special Issue: Cybercrime and Privacy (SLS Cyberlaw Section 2009) |
||||
Date of first compliant deposit: | 17 December 2015 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |