Matches in SemOpenAlex for { <https://semopenalex.org/work/W10878359> ?p ?o ?g. }
Showing items 1 to 93 of
93
with 100 items per page.
- W10878359 endingPage "13" @default.
- W10878359 startingPage "1" @default.
- W10878359 abstract "ABSTRACT A common casualty of poor information security is the privacy of the individual. Much has been written about formulating privacy policies, and there has been some work in identifying privacy abuses. This paper brings the two areas together by reviewing some of the key aspects of privacy policy. It presents a taxonomy of privacy abuses distilled from publicly available online reports issued during 2001. gaps between policy and practice are identified and some solutions put forward to fill those gaps. INTRODUCTION Poor information security can have a severe impact on an organisation. major risk in consumer to business e-commerce is that security concerns will result in a lack of consumer confidence resulting in a loss of business. Information security is defined by Parker (2001) as: The preservation of confidentiality and possession, integrity and validity, and availability and utility of information. With reference to the definition above, privacy is incorporated in the first two items; confidentiality and possession. A recent report suggested that only one in three businesses implement formal privacy policies (Computer Economics 2001). Even when policies are in place they are often not rigorously applied until a significant security breach forces management to focus on them (Fonseca 2000; Milberg, Smith et al. 2000). This study is confined to privacy abuses relating to computerised data assets of an organisation or an individual, and any channels through which this data is transmitted. Before any meaningful discussion of privacy abuses and their remedies can occur, it is necessary to acknowledge the complex backdrop against which such a discussion takes place. There are three dimensions to the space in which privacy policy and safeguards are developed; first, a plethora of regulatory approaches to assuring privacy exist worldwide. These approaches stem at least in part from the culture of the country in which they are developed. Second, new technologies are changing the landscape of privacy, but also the way organisations function, and third, organizational issues, including the structure of the organisation itself and the policies that evolve within it. This conceptual space is illustrated in Figure 1. paper is organised into four sections. First a review of the current research into the regulatory, technological and organisational policy aspects of privacy is given. purpose of this review is to develop an understanding of how privacy policy evolves within an organisation. In the second section a content analysis of a cross section of news stories is carried out. From this, a taxonomy of privacy abuses is distilled, these are compared to the results of existing studies. Third, using the taxonomy and guidelines for managing information security from section 1, gaps or representational deficiencies are identified which suggest where the weaknesses in current thinking on information privacy exist. Each of these abuses is discussed in turn. Finally some technical data management solutions are put forward. Laws, regulations and ethics Laws and regulations Balancing different privacy perspectives within the realm of increasingly connected global e-commerce presents a significant challenge to managers. Whilst privacy as an individual right is a very old concept, the information age has brought confusion about what is ethically right or wrong in the realm of privacy. Many privacy abuses do not break any law - it depends under which jurisdiction they occur. Even at the ethical level, opinions differ about what constitutes an abuse of privacy. Henderson (1999) gave the example of mailbox clutter or spam as something that could be seen as merely inconvenient rather than damaging to an individuals privacy. Eliminating spam was, however identified as one of the top five objectives for assuring privacy in a recent study (Dhillon and Moores 2001). …" @default.
- W10878359 created "2016-06-24" @default.
- W10878359 creator A5071082518 @default.
- W10878359 date "2002-01-01" @default.
- W10878359 modified "2023-09-26" @default.
- W10878359 title "Gaps between policy and practice in the protection of data privacy" @default.
- W10878359 cites W1971230468 @default.
- W10878359 cites W1982981577 @default.
- W10878359 cites W1989623757 @default.
- W10878359 cites W1996189363 @default.
- W10878359 cites W1999026095 @default.
- W10878359 cites W2041786654 @default.
- W10878359 cites W2059311829 @default.
- W10878359 cites W2174691174 @default.
- W10878359 hasPublicationYear "2002" @default.
- W10878359 type Work @default.
- W10878359 sameAs 10878359 @default.
- W10878359 citedByCount "12" @default.
- W10878359 countsByYear W108783592013 @default.
- W10878359 countsByYear W108783592014 @default.
- W10878359 crossrefType "journal-article" @default.
- W10878359 hasAuthorship W10878359A5071082518 @default.
- W10878359 hasConcept C102938260 @default.
- W10878359 hasConcept C10511746 @default.
- W10878359 hasConcept C108827166 @default.
- W10878359 hasConcept C123201435 @default.
- W10878359 hasConcept C138885662 @default.
- W10878359 hasConcept C144133560 @default.
- W10878359 hasConcept C148730421 @default.
- W10878359 hasConcept C163981777 @default.
- W10878359 hasConcept C169093310 @default.
- W10878359 hasConcept C175968658 @default.
- W10878359 hasConcept C193934123 @default.
- W10878359 hasConcept C2778656907 @default.
- W10878359 hasConcept C2780193096 @default.
- W10878359 hasConcept C38652104 @default.
- W10878359 hasConcept C41008148 @default.
- W10878359 hasConcept C41895202 @default.
- W10878359 hasConcept C509729295 @default.
- W10878359 hasConcept C69360830 @default.
- W10878359 hasConcept C71745522 @default.
- W10878359 hasConcept C78524284 @default.
- W10878359 hasConceptScore W10878359C102938260 @default.
- W10878359 hasConceptScore W10878359C10511746 @default.
- W10878359 hasConceptScore W10878359C108827166 @default.
- W10878359 hasConceptScore W10878359C123201435 @default.
- W10878359 hasConceptScore W10878359C138885662 @default.
- W10878359 hasConceptScore W10878359C144133560 @default.
- W10878359 hasConceptScore W10878359C148730421 @default.
- W10878359 hasConceptScore W10878359C163981777 @default.
- W10878359 hasConceptScore W10878359C169093310 @default.
- W10878359 hasConceptScore W10878359C175968658 @default.
- W10878359 hasConceptScore W10878359C193934123 @default.
- W10878359 hasConceptScore W10878359C2778656907 @default.
- W10878359 hasConceptScore W10878359C2780193096 @default.
- W10878359 hasConceptScore W10878359C38652104 @default.
- W10878359 hasConceptScore W10878359C41008148 @default.
- W10878359 hasConceptScore W10878359C41895202 @default.
- W10878359 hasConceptScore W10878359C509729295 @default.
- W10878359 hasConceptScore W10878359C69360830 @default.
- W10878359 hasConceptScore W10878359C71745522 @default.
- W10878359 hasConceptScore W10878359C78524284 @default.
- W10878359 hasIssue "3" @default.
- W10878359 hasLocation W108783591 @default.
- W10878359 hasOpenAccess W10878359 @default.
- W10878359 hasPrimaryLocation W108783591 @default.
- W10878359 hasRelatedWork W1466158917 @default.
- W10878359 hasRelatedWork W1509990502 @default.
- W10878359 hasRelatedWork W1813005377 @default.
- W10878359 hasRelatedWork W1961867604 @default.
- W10878359 hasRelatedWork W1981871319 @default.
- W10878359 hasRelatedWork W2019713891 @default.
- W10878359 hasRelatedWork W2044120881 @default.
- W10878359 hasRelatedWork W2080100756 @default.
- W10878359 hasRelatedWork W2102796456 @default.
- W10878359 hasRelatedWork W2108752510 @default.
- W10878359 hasRelatedWork W2120977875 @default.
- W10878359 hasRelatedWork W2145831867 @default.
- W10878359 hasRelatedWork W2150232399 @default.
- W10878359 hasRelatedWork W2172193860 @default.
- W10878359 hasRelatedWork W2259051884 @default.
- W10878359 hasRelatedWork W2266039914 @default.
- W10878359 hasRelatedWork W3121373824 @default.
- W10878359 hasRelatedWork W3122455483 @default.
- W10878359 hasRelatedWork W3124464482 @default.
- W10878359 hasRelatedWork W3124419892 @default.
- W10878359 hasVolume "4" @default.
- W10878359 isParatext "false" @default.
- W10878359 isRetracted "false" @default.
- W10878359 magId "10878359" @default.
- W10878359 workType "article" @default.