Protect Personal Information

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 222 Experts worldwide ranked by ideXlab platform

Rasika Dayarathna - One of the best experts on this subject based on the ideXlab platform.

  • A Self Reflection on Privacy
    2011
    Co-Authors: Rasika Dayarathna
    Abstract:

    Privacy is a fundamental human right. During the last decades, in the Information age, Information privacy has become one of the most essential aspects of privacy. Information privacy is concerned with Protecting Personal Information pertaining to individuals.Organizations, which frequently process the Personal Information, and individuals, who are the subjects of the Information, have different needs, rights and obligations. Organizations need to utilize Personal Information as a basis to develop tailored services and products to their customers in order to gain advantage over their competitors. Individuals need assurance from the organizations that their Personal Information is not changed, disclosed, deleted or misused in any other way. Without this guarantee from the organizations, individuals will be more unwilling to share their Personal Information.Information privacy metrics is a set of parameters used for the quantitative assessment and benchmark of an organization’s measures to Protect Personal Information. These metrics can be used by organizations to demonstrate, and by individuals to evaluate, the type and level of Protection given to Personal Information. Currently, there are no systematically developed, established or widely used Information privacy metrics. Hence, the purpose of this study is to establish a solid foundation for building Information privacy metrics by discovering some of the most critical constructs and dimensions of these metrics. The research was conducted within the general research strategy of design science and by applying research methods such as data collection and analysis informed by grounded theory as well as surveys using interviews and questionnaires in Sweden and in Sri Lanka. The result is a conceptual model for Information privacy metrics including its basic foundation; the constructs and dimensions of the metrics.

  • TOWARDS BUILDING Information PRIVACY METRICS TO MEASURE ORGANIZATIONAL COMMITMENT TO Protect Personal Information
    2010
    Co-Authors: Rasika Dayarathna
    Abstract:

    Privacy is a fundamental human right. During the last decades, in the Information age, Information privacy has become one of the most essential aspects of privacy. Information privacy is concerned with Protecting Personal Information pertaining to individuals.Organizations, which frequently process the Personal Information, and individuals, who are the subjects of the Information, have different needs, rights and obligations. Organizations need to utilize Personal Information as a basis to develop tailored services and products to their customers in order to gain advantage over their competitors. Individuals need assurance from the organizations that their Personal Information is not changed, disclosed, deleted or misused in any other way. Without this guarantee from the organizations, individuals will be more unwilling to share their Personal Information.Information privacy metrics is a set of parameters used for the quantitative assessment and benchmark of an organization’s measures to Protect Personal Information. These metrics can be used by organizations to demonstrate, and by individuals to evaluate, the type and level of Protection given to Personal Information. Currently, there are no systematically developed, established or widely used Information privacy metrics. Hence, the purpose of this study is to establish a solid foundation for building Information privacy metrics by discovering some of the most critical constructs and dimensions of these metrics. The research was conducted within the general research strategy of design science and by applying research methods such as data collection and analysis informed by grounded theory as well as surveys using interviews and questionnaires in Sweden and in Sri Lanka. The result is a conceptual model for Information privacy metrics including its basic foundation; the constructs and dimensions of the metrics.

  • The principle of security safeguards: Unauthorized activities
    Computer Law & Security Review, 2009
    Co-Authors: Rasika Dayarathna
    Abstract:

    Abstract The principle of Information security safeguards is a key Information privacy principle contained in every privacy legislation measure, framework, and guideline. This principle requires data controllers to use an adequate level of safeguards before processing Personal Information. However, privacy literature neither explains what this adequate level is nor how to achieve it. Hence, a knowledge gap has been created between privacy advocates and data controllers who are responsible for providing adequate Protection. This paper takes a step toward bridging this knowledge gap by presenting an analysis of how Data Protection and Privacy Commissioners have evaluated the adequacy level of security Protection measures given to Personal Information in selected privacy invasive cases. This study addresses both security measures used to Protect Personal Information against unauthorized activities and the use of Personal Information in authentication mechanisms. This analysis also lays a foundation for building a set of guidelines that can be used by data controllers for designing, implementing, and operating both technological and organizational measures used to Protect Personal Information.

  • Towards Bridging the Knowledge Gap between Lawyers and Technologists
    International Journal of Technology Transfer and Commercialisation, 2008
    Co-Authors: Rasika Dayarathna
    Abstract:

    Although Information and Communication Technology (ICT) has made our lives more comfortable, it has also increased threats to our privacy by making the processing and storing of Personal Information more convenient and economical. Consequently, a huge demand has been created for the proper handling of Personal Information. Some countries have introduced data Protection and privacy legislation measures to ensure the proper handling of Personal Information. Data controllers deploy organisational and technological measures to Protect Personal Information. Technologists are then involved in designing, implementing and operating these measures to a great extent. It has been shown, however, that a knowledge gap exists between legal privacy advocates and technologists who Protect Personal Information. In order to hold a healthy dialogue, a common platform must be created for technologists and legal privacy advocates. This paper proposes a methodology for bridging the knowledge gap between technologists and legal privacy advocates. This platform facilitates a way for both parties to have a fruitful dialogue.

  • ISSA - The Principle of Security Safeguards : Accidental activities
    2008
    Co-Authors: Rasika Dayarathna
    Abstract:

    Privacy is a fundamental human right. During the last decades, in the Information age, Information privacy has become one of the most essential aspects of privacy. Information privacy is concerned with Protecting Personal Information pertaining to individuals.Organizations, which frequently process the Personal Information, and individuals, who are the subjects of the Information, have different needs, rights and obligations. Organizations need to utilize Personal Information as a basis to develop tailored services and products to their customers in order to gain advantage over their competitors. Individuals need assurance from the organizations that their Personal Information is not changed, disclosed, deleted or misused in any other way. Without this guarantee from the organizations, individuals will be more unwilling to share their Personal Information.Information privacy metrics is a set of parameters used for the quantitative assessment and benchmark of an organization’s measures to Protect Personal Information. These metrics can be used by organizations to demonstrate, and by individuals to evaluate, the type and level of Protection given to Personal Information. Currently, there are no systematically developed, established or widely used Information privacy metrics. Hence, the purpose of this study is to establish a solid foundation for building Information privacy metrics by discovering some of the most critical constructs and dimensions of these metrics. The research was conducted within the general research strategy of design science and by applying research methods such as data collection and analysis informed by grounded theory as well as surveys using interviews and questionnaires in Sweden and in Sri Lanka. The result is a conceptual model for Information privacy metrics including its basic foundation; the constructs and dimensions of the metrics.

Alan Rea - One of the best experts on this subject based on the ideXlab platform.

Kristen Bailey - One of the best experts on this subject based on the ideXlab platform.

Kelly D. Martin - One of the best experts on this subject based on the ideXlab platform.

  • Critical roles of knowledge and motivation in privacy research.
    Current opinion in psychology, 2019
    Co-Authors: Aaron R. Brough, Kelly D. Martin
    Abstract:

    Much research has focused on privacy concern, which describes individuals' motivation to Protect Personal Information from unauthorized access, collection, storage, and use. Variation in privacy concern has been attributed to differences in three key factors: 1) chronic privacy attitudes, 2) Information sensitivity, and 3) context. While each factor affects individuals' motivation to Protect Personal Information, none of them explicitly accounts for differences in individuals' privacy knowledge (or privacy literacy), which consists of factual, procedural, or experiential familiarity with privacy-related issues. Calling attention to how little research has investigated both privacy concern and privacy literacy, we argue that understanding how knowledge and motivation interact is critical to accurately predicting how people will respond to privacy threats.

Kuanchin Chen - One of the best experts on this subject based on the ideXlab platform.