367,364 research outputs found
Lex Informatica: The Formulation of Information Policy Rules through Technology
Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage
Privacy in an Ambient World
Privacy is a prime concern in today's information society. To protect\ud
the privacy of individuals, enterprises must follow certain privacy practices, while\ud
collecting or processing personal data. In this chapter we look at the setting where an\ud
enterprise collects private data on its website, processes it inside the enterprise and\ud
shares it with partner enterprises. In particular, we analyse three different privacy\ud
systems that can be used in the different stages of this lifecycle. One of them is the\ud
Audit Logic, recently introduced, which can be used to keep data private when it\ud
travels across enterprise boundaries. We conclude with an analysis of the features\ud
and shortcomings of these systems
The control over personal data: True remedy or fairy tale ?
This research report undertakes an interdisciplinary review of the concept of
"control" (i.e. the idea that people should have greater "control" over their
data), proposing an analysis of this con-cept in the field of law and computer
science. Despite the omnipresence of the notion of control in the EU policy
documents, scholarly literature and in the press, the very meaning of this
concept remains surprisingly vague and under-studied in the face of
contemporary socio-technical environments and practices. Beyond the current
fashionable rhetoric of empowerment of the data subject, this report attempts
to reorient the scholarly debates towards a more comprehensive and refined
understanding of the concept of control by questioning its legal and technical
implications on data subject\^as agency
Human Resource Information Systems for Competitive Advantage: Interviews with Ten Leaders
[Excerpt] Increasingly, today\u27s organizations use computer technology to manage human resources (HR). Surveys confirm this trend (Richards-Carpenter, 1989; Grossman and Magnus, 1988; Human Resource Systems Professionals 1988; KPMGPeat Marwick, 1988). HR professionals and managers routinely have Personnel Computers (PCs) or computer terminals on their desks or in their departments. HR computer applications, once confined to payroll and benefit domains, now encompass incentive compensation, staffing, succession planning, and training. Five years ago, we had but a handful of PC-based software applications for HR management. Today, we find a burgeoning market of products spanning a broad spectrum of price, sophistication, and quality (Personnel Journal, 1990). Top universities now consider computer literacy a basic requirement for students of HR, and many consulting firms and universities offer classes designed to help seasoned HR professionals use computers in their work (Boudreau, 1990). Changes in computer technology offer expanding potential for HR management (Business Week, 1990; Laudon and Laudon, 1988)
- …