41 |
User¡¦s Risk Management for the Personal Data of the Cloud Computing Service IndustiresHuang, Yen-Lin 06 August 2012 (has links)
With the rapid development of Information Technology, ¡§Cloud Computing¡¨ is becoming increasingly popular in the industry as it is accessible to various data processing services just by connecting to third-party cloud service providers via network. A new global technological trend has thus been ushered as a result of powerful processing, elastic usage and low cost of the cloud computing.
Although ¡§Cloud Computing¡¨ provides a cloud which is more large-scaled, relevant and beneficial, most practical cloud patrons are aware that what matters is its corresponding security. Any who has ever used the Internet, whether an enterprise or an individual, will inevitably run the risks of information recorded, copied, leaked, deleted inappropriately or accidently or even used for inappropriate purposes by third-parties. The private data and business secrets of the stakeholders of an enterprise, including its customers, partners, employees or suppliers, will also suffer from the information vulnerability.
Therefore, as for the cloud computing industry, what matters for the government, enterprise or individual is to provide an information security shelter rather than a network environment in which the personal data is highly exposed. Cavoukin (2010) argues that the issue of information security related to the cloud computing is one of issues in the public domain. The data generated from the digital cloud computing management and the people involved are so large that each citizen is drawn to be concerned with the government policies and laws (Lee, 2010).
In this paper, we make a risk management for the cloud computing and discuss the risk management mechanisms for the cloud computing industry with the Freeman¡¦s stakeholder theory.
|
42 |
The Gnowsis semantic desktop approach to personal information management weaving the personal semantic webSauermann, Leo January 2009 (has links)
Zugl.: Kaiserslautern, Techn. Univ., Diss., 2009
|
43 |
On the value of information - what Facebook users are willing to payBauer, Christine, Korunovska, Jana, Spiekermann, Sarah 15 May 2012 (has links) (PDF)
In the age of Web 2.0 users contribute to platforms success by providing personal information by actively uploading information (e.g. messages, preferences, biographies) and also by leaving traces of their online behavoiour as can be derived from their clicks, navigation paths, etc. While there is a market for trading such information among companies, there is little knowledge about how users actually value their personal information. In an online survey-based experiment we have asked 1.045 Facebook users how much they would be willing to pay for keeping their personal information. Surprisingly, 48.1 percent of participants are not willing to pay a single Euro, - thus, valuing their information at zero. Results indicate that people that show 'spamming' behaviour and users that use Facebook for 'diary keeping' are significantly more willing to pay a certain amount higher than zero to be able to keep their personal Facebook information. Interestingly, having analysed various kinds of user behaviour, the regression model still explains no more than 14.2 percent of variance. Additionally, this article discusses four different method manipulations for eliciting people's willingness to pay for personal information and provides methodical guidance for future research in the field.
|
44 |
Security of Personal Information in Cloud Computing : Identifying and mitigating against risks to privacy in the deployment of Enterprise Systems Applications on the Software as a Service platformDenys, Paul January 2012 (has links)
The emergence and subsequent growth of Cloud computing has brought with it a great deal of change in the manner in which the world undertakes to compute and store information. This new technology has brought with it immense possibilities as far as processing of information and the pooling of resources is concerned. This potential has also been noticed by the public sector, as Governments all over the world have undertaken to introduce what has come to be known as e-Government, the provisioning of Government services and communications via Web based applications, rather than the traditional means of in person contact and paper based collection of personal information. While the move to Web based Government has been occurring for the last 20 or so years, a new development in this area is the introduction of Cloud computing and Cloud-based computing platforms, most notably Software-as-a-Service (SaaS) in the provisioning of these services. The computing and efficiency potential of this technology cannot be disputed, yet it’s important to recognize that taking advantage of this computing power does come at a price. That price being significant threats to personal privacy and security of personally identifiable information. This thesis will make it easier for government agencies to make informed decisions about whether or not to migrate data and applications into the cloud. The identification and analysis of potential risks to data security and personal information has drawn together key information from a multitude of both academic and industry sources to make such a decision plausible.
|
45 |
Physicians' perspectives on personal health records: a descriptive studyHarmse, Magda Susanna January 2016 (has links)
A Personal Health Record (PHR) is an electronic record of a patient’s health-related information that is managed by the patient. The patient can give access to other parties, such as healthcare providers and family members, as they see fit. These parties can use the information in emergency situations, in order to help improve the patient’s healthcare. PHRs have an important role to play in ensuring that a patient’s complete health history is available to his healthcare providers at the point of care. This is especially true in South Africa, where the majority of healthcare organizations still rely on paper-based methods of record-keeping. Research indicates that physicians play an important role in encouraging the adoption of PHRs amongst patients. Whilst various studies have focused on the perceptions of South African citizens towards PHRs, to date no research has focused on the perceptions of South African physicians. Considering the importance of physicians in encouraging the adoption of PHRs, the problem being addressed by this research project thus relates to the lack of information relating to the perceptions of South African physicians of PHRs. Physicians with private practices at private hospitals in Port Elizabeth, South Africa were surveyed in order to determine their perceptions towards PHRs. Results indicate perceptions regarding benefits to the physician and the patient, as well as concerns to the physician and the patient. The levels of trust in various potential PHR providers and the potential uses of a PHR for the physician were also explored. The results of the survey were compared with the results of relevant international literature in order to describe the perceptions of physicians towards PHRs.
|
46 |
A framework and model of operation for electronic personal information to achieve and maintain compliance with Condition 7 of the Protection of Personal Information (POPI) ActDala, Prittish January 2017 (has links)
Privacy entails controlling the use and access to place, location and personal information. In South Africa, the first privacy legislation in the form of the Protection of Personal Information (POPI) Act (Act 4 of 2013) was signed into law on 26 November 2013. The POPI Act promotes the protection of personal information by South African institutions and specifies the minimum requirements in 12 Chapters, which includes 8 Conditions for lawful processing of personal information. Condition 7 of the POPI Act makes specific provision for security safeguards to ensure the confidentiality and integrity of personal information. While the legislative requirements of Condition 7 of the POPI Act are spelt out in Sections 19, 20, 21 and 22, the requirements are not supported by specific guidance in terms of how these should be satisfied. There is also no specific guidance on the security safeguards, as required in Section 19, to ensure the confidentiality and integrity of personal information. Hence, this thesis - which focuses on electronic personal information - proposes a framework that includes a selection of security safeguards that may serve as a frame of reference and be used by South African institutions that store, process and transmit electronic personal information, to achieve and maintain compliance with Condition 7 of the POPI Act. As part of this study, a POPI research survey is used to assess the current state of security safeguards in South African institutions and to validate the selection of security safeguards of the proposed framework. In addition, a model of operation of security safeguards is proposed to guide one on how the selection of security safeguards should be implemented to achieve and maintain confidentiality and integrity of electronic personal information as required by Condition 7 of the POPI Act. Furthermore, this thesis explores the concept and principles of privacy as well as the importance of privacy and provides an overview of the global privacy legislative landscape, including South African privacy legislation. An analysis is also conducted to assess the extent to which the privacy legislation of the European Union (EU) and South Africa addresses the international 2013 Organisation for Economic Co-operation and Development (OECD) guidelines. The POPI research survey is also used to assess the level of compliance with the POPI Act and specifically Condition 7 of the Act. In addition, the POPI research survey is used to assess the financial value associated with electronic personal information and the potential impact of a data breach of electronic personal information. / Thesis (PhD)--University of Pretoria, 2017. / Computer Science / PhD / Unrestricted
|
47 |
Information Scraps in the Smartphone EraEllis, William Thomas 19 June 2016 (has links)
How people create and use information scraps, the small informal messages that people write to themselves to help them complete a task or remember something, has changed rapidly in the age of mobile computing. As recently as 2008, information scraps had continued to resist technological support. Since then, however, people have adopted mobile connected devices at a rate unimagined in the pre-smartphone era. Developers have, in turn, created a varied and growing body of smartphone software that supports many common information scrap use-cases. In this thesis, we describe our research into how and why people have adopted smartphone technology to serve their information scrap needs. The results of our survey show broad adoption of smartphones for many common information scrap tasks, particularly ones involving prospective memory. In addition, the results of our diary studies show that mobile contexts or locations are highly correlated with people's choosing to use smartphones to record information scraps. Our analysis of our diary study data also provides fresh understanding of the information scrap lifecycle and how mobile digital technology affects it. We find people's smartphone information scraps tend toward automatic archival, and we find their information scraps in general tend toward substantial role overlap regardless of medium. We use these findings to formulate a new information scrap lifecycle that is inclusive of mobile technology. These insights will help mobile technology creators to better support information scraps, which, in turn will allow users to enjoy the huge benefits of digital technology in their information scrap tasks. / Master of Science
|
48 |
Regulating Data in the European Union and United States: Privacy, Access, Portability & APIsWoodall, Angela January 2023 (has links)
This dissertation examines the way that demands for more control over the collection, processing, and sharing of personal data are being managed by both government and industry leaders with strategies that appear to comply with regulations, but that fail to do so. These are “by-design” strategies used by individuals to unilaterally manage their data with automated tools.
I take a multimethod approach that combines autoethnography, reverse engineering techniques, and data analysis to assess the implementation of by-design services implemented by Facebook, Twitter, and Instagram in compliance with current European Union regulations for access and portability. I also employ archival research, discourse analysis, interviews, and participant observation.
I argue that self-led, by-design approaches do not answer the demands for more control over personal data. The regulatory and technical resources put in place for individuals to control their data are not effective because they turn over decisions about execution to an industry with no interest in sharing that data or being regulated. If policymakers continue to pursue by-design approaches, they will need to learn how to test the techniques, and the execution of the techniques, provided by industry. They will need to assess the impact on data that is made available. So that results can be evaluated, by-design tools like the ones I assessed must be accompanied by clear and detailed details about design choices and procedures. In this vein, I offer directions for critical scrutiny, including standards and measuring the impact of APIs.
I conclude that self-managed, by-design approaches are not the source of the problem. But they are a symptom of the need for critical scrutiny over the execution of tools like the ones offered by Facebook, Twitter, and Instagram. Ultimately, I found that portability and access are legally and technically fraught. However, despite the shortcomings of by-design approaches, personal data can be more effectively regulated in Europe than in the United States as the result of current regulations.
|
49 |
An information processing model and a set of risk identification methods for privacy impact assessment in an international context / 国際的な文脈におけるプライバシー影響評価のための情報取扱モデル及び一連のリスク特定手法Kuroda, Yuki 25 September 2023 (has links)
京都大学 / 新制・課程博士 / 博士(情報学) / 甲第24935号 / 情博第846号 / 新制||情||142(附属図書館) / 京都大学大学院情報学研究科社会情報学専攻 / (主査)教授 黒田 知宏, 教授 矢守 克也, 教授 曽我部 真裕 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DGAM
|
50 |
Thoughtmarks: Re-thinking Bookmarks & the Personal Information SpaceGhaly, Marcus January 2012 (has links)
Bookmarking is one of the main methods by which users store the online information they find valuable. However, bookmarks in their current incarnation suffer from a number of drawbacks which do not support users in their daily routines. Bookmarks are very easy to make, but over time this causes bookmark collections to grow, requiring systems of organization to keep track of everything. Eventually though these systems of organization require organizing themselves. And as time passes the titles of both bookmarks and folders begin to loose their meaning and users find it harder and harder to determine a bookmark’s value or a folder’s contents based on title alone. This leads to the bookmarks themselves becoming stale and unused, making collections that much harder to search through when trying to re-find one’s found, online information.This thesis proposes to re-imagine bookmarks as visualized information that is easily recognizable, and can help users to predict the information a bookmark links to. In this way it is hoped that bookmarks can become a more meaningful link between users and their found, online information. Furthermore, automated tagging is proposed to assist users when searching for their content, as well as chronological sorting to help users visually scan through their collections and re-find their bookmarks. Finally, non- hierarchical, folder-less bookmarking was also proposed, though in the end this did not map to users’ habits. That being said, visualizing bookmarks would appear to be worth pursuing as it resonated with users, and could be one direction to follow in assisting users with their information collections.
|
Page generated in 0.1197 seconds