20 research outputs found

    Electronic data safes as an infrastructure for transformational government? A case study

    Full text link
    This article introduces and explores the potential of an active electronic data safe (AEDS) serving as an infrastructure to achieve transformational government. An AEDS connects individuals and organizations from the private and the public sector to exchange information items related to business processes following the user-managed access paradigm. To realize the transformational government’s vision of user-centricity, fundamental changes in the service provision and collaboration of public and private sector organizations are needed. Findings of a user study with a prototype of an AEDS are used to identify four barriers for the adoption of an AEDS in the light of transformational government: (1.) offering citizens unfamiliar services having the character of experience-goods; (2.) failing to fulfill common service expectations of the customers; (3.) failing to establish contextual integrity for data sharing, and, (4.) failing to establish and run an AEDS as a multi-sided platform providing an attractive business model

    Implementing GDPR in the Charity Sector: A Case Study

    Get PDF
    Due to their organisational characteristics, many charities are poorly prepared for the General Data Protection Regulation (GDPR). We present an exemplar process for implementing GDPR and the DPIA Data Wheel, a DPIA framework devised as part of the case study, that accounts for these characteristics. We validate this process and framework by conducting a GDPR implementation with a charity that works with vulnerable adults. This charity processes both special category (sensitive) and personally identifiable data. This GDPR implementation was conducted and devised for the charity sector, but can be equally applied in any organisation that needs to implement GDPR or conduct DPIAs

    Balance or Trade-off? Online Security Technologies and Fundamental Rights

    No full text
    In this contribution I argue that the image of the balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought I will explore the relationship between online security technologies and fundamental rights, notably privacy, non-discrimination, freedom of speech and due process. After discriminating between three types of online security technologies I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to an inquiry into the metaphor of the scale, building on the triple test regarding the justification of the limitation of fundamental rights such as privacy. The conclusion will be that in the case of a trade-off, infringing measures will have to be balanced by effective safeguards. No trade-off without balanc
    corecore