8,547 research outputs found

    EU Privacy seals project: Inventory and analysis of privacy certification schemes

    Get PDF
    The objective of this report is to comprehensively inventory and analyse privacy and related certification schemes in the European Union and, where relevant, at the international level. The report will provide insights into the importance of privacy seal schemes and present information on the operational aspects of these schemes. The report will also help understand the privacy and data protection elements of the analysed schemes and provide and initial analysis of their shortcomings. The report specifically aims to understand whether (if at all) the analysed schemes address the requirements proposed under the GDPR. It will highlight the main convergences and differences between the schemes, who benefits from such schemes and what the impact of such schemes is.JRC.G.7-Digital Citizen Securit

    Multinational perspectives on information technology from academia and industry

    Get PDF
    As the term \u27information technology\u27 has many meanings for various stakeholders and continues to evolve, this work presents a comprehensive approach for developing curriculum guidelines for rigorous, high quality, bachelor\u27s degree programs in information technology (IT) to prepare successful graduates for a future global technological society. The aim is to address three research questions in the context of IT concerning (1) the educational frameworks relevant for academics and students of IT, (2) the pathways into IT programs, and (3) graduates\u27 preparation for meeting future technologies. The analysis of current trends comes from survey data of IT faculty members and professional IT industry leaders. With these analyses, the IT Model Curricula of CC2005, IT2008, IT2017, extensive literature review, and the multinational insights of the authors into the status of IT, this paper presents a comprehensive overview and discussion of future directions of global IT education toward 2025

    Offshore education : offshore education in the wider context of internationalisation and ICT: experiences and examples from Dutch higher education

    Get PDF
    This report presents a study on offshore education conducted by a consortium of Dutch higher education researchers and commissioned by the Digital University (DU). The study explored the extent to which Dutch higher education institutions are involved in offering their educational services abroad (offshore education). After thoroughly embedding offshore education in the wider contexts of internationalisation and ICT policies, the study particularly explores the practical experiences with a number of real-life offshore activities of Dutch higher education. As a warm-up to this report, a few interesting cases are briefly touched upon below

    De-perimeterisation as a cycle: tearing down and rebuilding security perimeters

    Get PDF
    If an organisation wants to secure its IT assets, where should the security mechanisms be placed? The traditional view is the hard-shell model, where an organisation secures all its assets using a fixed security border: What is inside the security perimeter is more or less trusted, what is outside is not. Due to changes in technologies, business processes and their legal environments this approach is not adequate anymore.\ud This paper examines this process, which was coined de-perimeterisation by the Jericho Forum.\ud In this paper we analyse and define the concepts of perimeter and de-perimeterisation, and show that there is a long term trend in which de-perimeterisation is iteratively accelerated and decelerated. In times of accelerated de-perimeterisation, technical and organisational changes take place by which connectivity between organisations and their environment scales up significantly. In times of deceleration, technical and organisational security measures are taken to decrease the security risks that come with de-perimeterisation, a movement that we call re-perimeterisation. We identify the technical and organisational mechanisms that facilitate de-perimeterisation and re-perimeterisation, and discuss the forces that cause organisations to alternate between these two movements

    Trustworthy Privacy Indicators: Grades, Labels, Certifications, and Dashboards

    Get PDF
    Despite numerous groups’ efforts to score, grade, label, and rate the privacy of websites, apps, and network-connected devices, these attempts at privacy indicators have, thus far, not been widely adopted. Privacy policies, however, remain long, complex, and impractical for consumers. Communicating in some short-hand form, synthesized privacy content is now crucial to empower internet users and provide them more meaningful notice, as well as nudge consumers and data processors toward more meaningful privacy. Indeed, on the basis of these needs, the National Institute of Standards and Technology and the Federal Trade Commission in the United States, as well as lawmakers and policymakers in the European Union, have advocated for the development of privacy indicator systems. Efforts to develop privacy grades, scores, labels, icons, certifications, seals, and dashboards have wrestled with various deficiencies and obstacles for the wide-scale deployment as meaningful and trustworthy privacy indicators. This paper seeks to identify and explain these deficiencies and obstacles that have hampered past and current attempts. With these lessons, the article then offers criteria that will need to be established in law and policy for trustworthy indicators to be successfully deployed and adopted through technological tools. The lack of standardization prevents user-recognizability and dependability in the online marketplace, diminishes the ability to create automated tools for privacy, and reduces incentives for consumers and industry to invest in privacy indicators. Flawed methods in selection and weighting of privacy evaluation criteria and issues interpreting language that is often ambiguous and vague jeopardize success and reliability when baked into an indicator of privacy protectiveness or invasiveness. Likewise, indicators fall short when those organizations rating or certifying the privacy practices are not objective, trustworthy, and sustainable. Nonetheless, trustworthy privacy rating systems that are meaningful, accurate, and adoptable can be developed to assure effective and enduring empowerment of consumers. This paper proposes a framework using examples from prior and current attempts to create privacy indicator systems in order to provide a valuable resource for present-day, real world policymaking. First, privacy rating systems need an objective and quantifiable basis that is fair and accountable to the public. Unlike previous efforts through industry self-regulation, if lawmakers and regulators establish standardized evaluation criteria for privacy practices and provide standards for how these criteria should be weighted in scoring techniques, the rating system will have public accountability with an objective, quantifiable basis. If automated rating mechanisms convey to users accepted descriptions of data practices or generate scores from privacy statements based on recognized criteria and weightings rather than from deductive conclusions, then this reduces interpretive issues with any privacy technology tool. Second, rating indicators should align with legal principles of contract interpretation and the existing legal defaults for the interpretation of silence in privacy policy language. Third, a standardized system of icons, along with guidelines as to where these should be located, will reduce the education and learning curve now necessary to understand and benefit from many different, inconsistent privacy indicator labeling systems. And lastly, privacy rating evaluators must be impartial, honest, autonomous, and financially and operationally durable in order to be successful

    Perspective study: governance for C2C

    Get PDF
    This perspective study will serve as frame of reference for follow-up activities and exchanges both within and outside the Cradle to Cradle Network (C2CN) and it aims to reflect the current challenges and opportunities associated with implementing a Cradle to Cradle approach. In total, four perspective studies have been written, in the areas on industry, area spatial development, governance and on the build theme

    Boosting productivity in the services sector: 2nd interim report - competition and ICT topics

    Get PDF
    Contains questions, findings and recommendations important to raising services-sector productivity in New Zealand, focusing on the adoption of information and communications technology by service firms. Overview: This is the Productivity Commission’s 2nd interim report as part of its inquiry Boosting Productivity in the Services Sector. The report focuses on two topics that are significant to raising productivity in the services sector: stimulating a more competitive environment in the services sector; and the successful application of information and communications technology (ICT) by New Zealand service firms. The inquiry’s 1st interim report – released in July 2013 – focused on developing a better understanding of the services sector, its recent performance, and its role in the New Zealand economy. That report sets out the vital role that services play in the New Zealand economy. For example: services account for nearly three-quarters of GDP; and the competitiveness of exports depends critically on the performance of the services sector. This is because the services sector contributes more than half the country’s exports, primarily through embodiment in exported goods. Services-sector productivity, therefore, strongly affects the productivity of the economy as a whole and the wellbeing of New Zealanders. Yet the sector has underperformed relative to the best international performers. Productivity growth in the US services sector and that of some European countries has driven aggregate productivity growth in those countries. Most services industries in New Zealand have not experienced the same growth in productivity. Growth has been neither strong nor broad-based enough to achieve any significant productivity catch-up in the economy when compared with leading OECD countries. The productivity levels of most New Zealand services industries are below those in Australia and the United Kingdom

    E-health, social media and the law in South Africa can ethical concerns in e-health practice be addressed through regulation?

    Get PDF
    Includes abstract.This dissertation explores the various legal and ethical difficulties faced by health practitioners and patients alike in the application and practice of ehealth. These include informed consent, the relationship between the doctor and patient, accuracy of online content, confidentiality, privacy, data security and licensure. The existing and proposed legislation in place in South Africa and internationally to potentially address these issues is discussed. The broader question that is posed is whether greater e-health regulation is required in a developing country such as South Africa and if so what the regulations should address
    corecore