Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.rights.licenseReconocimiento-NoComercial-SinObraDerivada 4.0 Internacional. (CC BY-NC-ND)es
dc.contributor.authorLee, Wanbil W.es
dc.contributor.authorZankl, Wolfganges
dc.contributor.authorChang, Henryes
dc.date.accessioned2018-11-23T18:48:48Z
dc.date.accessioned2020-10-28T19:25:43Z
dc.date.accessioned2021-09-07T19:10:46Z-
dc.date.available2018-11-23T18:48:48Z
dc.date.available2020-10-28T19:25:43Z
dc.date.available2021-09-07T19:10:46Z-
dc.date.issued2016
dc.identifier.citationLee, W. W., Zankl, W., Chang, H. "An Ethical Approach to Data Privacy Protection", Isaca Journal Volume 6, 2016.es
dc.identifier.urihttps://hdl.handle.net/20.500.12381/441-
dc.description.abstractPrivacy, trust and security are closely intertwined, as are law and ethics. Privacy preservation and security provisions rely on trust (e.g., one will allow only those whom one trusts to enter one’s zone of inaccessibility; one will not feel secure unless one trusts the security provider). Violation of privacy constitutes a risk, thus, a threat to security. Law provides a resolution when ethics cannot (e.g., ethics knows that stealing is wrong; the law punishes thieves); ethics can provide context to law (e.g., law allows trading for the purpose of making a profit, but ethics provides input into ensuring trade is conducted fairly). Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles. Data privacy (or information privacy or data protection) is about access, use and collection of data, and the data subject’s legal right to the data. This refers to: • Freedom from unauthorized access to private data • Inappropriate use of data• Accuracy and completeness when collecting data about a person or persons (corporations included) by technology • Availability of data content, and the data subject’s legal right to access; ownership • The rights to inspect, update or correct these data Data privacy is also concerned with the costs if data privacy is breached, and such costs include the socalled hard costs (e.g., financial penalties imposed by regulators, compensation payments in lawsuits such as noncompliance with contractual principles) and the soft costs (e.g., reputational damage, loss of client trust). Though different cultures put different values on privacy or make it impossible to define a stable, universal value, there is broad consensus that privacy does have an intrinsic, core and social value. Hence, a privacy approach that embraces the law, ethical principles, and societal and environmental concerns is possible despite the complexity of and difficulty in upholding data privacy.es
dc.format.extent9 p.es
dc.language.isoenges
dc.publisherISACAes
dc.rightsAcceso abiertoes
dc.sourceIsaca Journales
dc.source6es
dc.source2016es
dc.subjectPrivacyes
dc.subjectPersonal data protectiones
dc.subjectCollectiones
dc.subjectProcessinges
dc.titleAn Ethical Approach to Data Privacy Protectiones
dc.typeArtículoes
dc.subject.aniiCiencias Sociales-
dc.subject.aniiCiencias de la Educación-
dc.type.versionPublicadoes
dc.ceibal.researchlineUsos sociales de las TIC y cultura digitales
dc.ceibal.researchlineOtroes
dc.subject.ceibalDatoses
dc.subject.ceibalPrivacidades
dc.subject.ceibalÉticaes
dc.subject.ceibalTecnologíaes
Aparece en las colecciones: Fundación Ceibal

Archivos en este ítem:
archivo Descripción Tamaño Formato  
An-Ethical-Approach-to-Data-Privacy-Protection_joa_Eng_1216.pdf607.17 kBAdobe PDFDescargar

Las obras en REDI están protegidas por licencias Creative Commons.
Por más información sobre los términos de esta publicación, visita: Reconocimiento-NoComercial-SinObraDerivada 4.0 Internacional. (CC BY-NC-ND)