The future of privacy certification in Europe: an exploration of options under article 42 of the GDPR
R Rodrigues, D Barnard-Wills, P De Hert… - … Review of Law …, 2016 - Taylor & Francis
The EU faces substantive legislative reform in data protection, specifically in the form of the
General Data Protection Regulation (GDPR). One of the new elements in the GDPR is its …
General Data Protection Regulation (GDPR). One of the new elements in the GDPR is its …
The determinants of individuals' perceived e-security: Evidence from Malaysia
Despite the critical role of individuals' perceived security in an online environment, previous
research has not attempted to comprehensively study the influences and interrelations …
research has not attempted to comprehensively study the influences and interrelations …
Do security and privacy policies in B2B and B2C e-commerce differ? A comparative study using content analysis
Security and privacy policies address consumer concerns related to security and privacy in e-
commerce websites. As these policies represent only the vendor's perspective, often there …
commerce websites. As these policies represent only the vendor's perspective, often there …
Privacy assurance: bridging the gap between preference and practice
Personal identifying information is released without much control from the end user to
service providers. We describe a system to scrutinize the stated claims of a service provider …
service providers. We describe a system to scrutinize the stated claims of a service provider …
[KİTAP][B] The impact of e-commerce privacy policy statements on consumer willingness to disclose personal information
JW Weber - 2008 - search.proquest.com
The Internet has simplified how consumers purchase goods and services. However,
consumers have become concerned about how online merchants use their information after …
consumers have become concerned about how online merchants use their information after …
Requirements for identity management from the perspective of multilateral interactions
S Pötzsch, K Borcea-Pfitzmann, M Hansen… - Digital Privacy: PRIME …, 2011 - Springer
22 Requirements for Identity Management from the Perspective of Multilateral Interactions Page
1 22 Requirements for Identity Management from the Perspective of Multilateral Interactions …
1 22 Requirements for Identity Management from the Perspective of Multilateral Interactions …
Security and privacy in e-consumer protection in Victoria, Australia
H Ha - Trust Management V: 5th IFIP WG 11.11 International …, 2011 - Springer
Governments in many countries have actively promoted both regulatory and self-regulatory
approaches to govern e-commerce and to protect e-consumers. Nevertheless, the desired …
approaches to govern e-commerce and to protect e-consumers. Nevertheless, the desired …
Current Measures to Protect E-Consumers' Privacy in Australia
H Ha, K Coghill - Online Consumer Protection: Theories of Human …, 2009 - igi-global.com
The current measures to protect e-consumers' privacy in Australia include (i)
regulation/legislation;(ii) guidelines;(iii) codes of practice; and (iv) activities of consumer …
regulation/legislation;(ii) guidelines;(iii) codes of practice; and (iv) activities of consumer …
[PDF][PDF] Ontologies as a means for develo** Information Systems Security Management Practices
B Tsoumas - Ανάκτηση Σεμπτέμβριος, 2007 - infosec.aueb.gr
Μετά το τέλος μιας ερευνητικής προσπάθειας με σεβαστή χρονική διάρκεια, ο δρών συνήθως
δεν πιστεύει ότι ήρθε η στιγμή για τη συγγραφή αυτής της ενότητας. Εκτιμώντας ότι η …
δεν πιστεύει ότι ήρθε η στιγμή για τη συγγραφή αυτής της ενότητας. Εκτιμώντας ότι η …