Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.rights.license | Reconocimiento-NoComercial-SinObraDerivada 4.0 Internacional. (CC BY-NC-ND) | es |
dc.contributor.author | Lee, Wanbil W. | es |
dc.contributor.author | Zankl, Wolfgang | es |
dc.contributor.author | Chang, Henry | es |
dc.date.accessioned | 2018-11-23T18:48:48Z | |
dc.date.accessioned | 2020-10-28T19:25:43Z | |
dc.date.accessioned | 2021-09-07T19:10:46Z | - |
dc.date.available | 2018-11-23T18:48:48Z | |
dc.date.available | 2020-10-28T19:25:43Z | |
dc.date.available | 2021-09-07T19:10:46Z | - |
dc.date.issued | 2016 | |
dc.identifier.citation | Lee, W. W., Zankl, W., Chang, H. "An Ethical Approach to Data Privacy Protection", Isaca Journal Volume 6, 2016. | es |
dc.identifier.uri | https://hdl.handle.net/20.500.12381/441 | - |
dc.description.abstract | Privacy, trust and security are closely intertwined, as are law and ethics. Privacy preservation and security provisions rely on trust (e.g., one will allow only those whom one trusts to enter one’s zone of inaccessibility; one will not feel secure unless one trusts the security provider). Violation of privacy constitutes a risk, thus, a threat to security. Law provides a resolution when ethics cannot (e.g., ethics knows that stealing is wrong; the law punishes thieves); ethics can provide context to law (e.g., law allows trading for the purpose of making a profit, but ethics provides input into ensuring trade is conducted fairly). Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles. Data privacy (or information privacy or data protection) is about access, use and collection of data, and the data subject’s legal right to the data. This refers to: • Freedom from unauthorized access to private data • Inappropriate use of data• Accuracy and completeness when collecting data about a person or persons (corporations included) by technology • Availability of data content, and the data subject’s legal right to access; ownership • The rights to inspect, update or correct these data Data privacy is also concerned with the costs if data privacy is breached, and such costs include the socalled hard costs (e.g., financial penalties imposed by regulators, compensation payments in lawsuits such as noncompliance with contractual principles) and the soft costs (e.g., reputational damage, loss of client trust). Though different cultures put different values on privacy or make it impossible to define a stable, universal value, there is broad consensus that privacy does have an intrinsic, core and social value. Hence, a privacy approach that embraces the law, ethical principles, and societal and environmental concerns is possible despite the complexity of and difficulty in upholding data privacy. | es |
dc.format.extent | 9 p. | es |
dc.language.iso | eng | es |
dc.publisher | ISACA | es |
dc.rights | Acceso abierto | es |
dc.source | Isaca Journal | es |
dc.source | 6 | es |
dc.source | 2016 | es |
dc.subject | Privacy | es |
dc.subject | Personal data protection | es |
dc.subject | Collection | es |
dc.subject | Processing | es |
dc.title | An Ethical Approach to Data Privacy Protection | es |
dc.type | Artículo | es |
dc.subject.anii | Ciencias Sociales | - |
dc.subject.anii | Ciencias de la Educación | - |
dc.type.version | Publicado | es |
dc.ceibal.researchline | Usos sociales de las TIC y cultura digital | es |
dc.ceibal.researchline | Otro | es |
dc.subject.ceibal | Datos | es |
dc.subject.ceibal | Privacidad | es |
dc.subject.ceibal | Ética | es |
dc.subject.ceibal | Tecnología | es |
Aparece en las colecciones: | Fundación Ceibal |
Archivos en este ítem:
archivo | Descripción | Tamaño | Formato | ||
---|---|---|---|---|---|
An-Ethical-Approach-to-Data-Privacy-Protection_joa_Eng_1216.pdf | Descargar | 607.17 kB | Adobe PDF |
Las obras en REDI están protegidas por licencias Creative Commons.
Por más información sobre los términos de esta publicación, visita:
Reconocimiento-NoComercial-SinObraDerivada 4.0 Internacional. (CC BY-NC-ND)