Privacy Protection Schemes against Easy Information Access

Article Preview

Abstract:

Information technology greatly facilitates our lives, and at the same time, people are able to invade personal privacy more easily than never before with the aid of recent technological advances. Reasons for this are discussed. Different protection models to meet the challenge are compared and a proper and improved one is proposed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2152-2157

Citation:

Online since:

June 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Robert G. Boehmer and Todd S. Palmer, The 1992 EC Data Protection Proposal: An Examination of Its Implications for U.S. Business and U.S. Privacy Law, 31 Am. Bus. L.J. 265 (1993).

DOI: 10.1111/j.1744-1714.1993.tb00682.x

Google Scholar

[2] Laura Pincus and Clayton Trotter, The Disparity between Public and Private Sector Employee Privacy Protections: A Call for Legitimate Privacy Rights for Private Sector Workers, 33 Am. Bus. L.J. 51 (1995).

DOI: 10.1111/j.1744-1714.1995.tb00260.x

Google Scholar

[3] Greg Tucker, Personal Information Transfers Abroad, unpublished manuscript (1994).

Google Scholar

[4] Sun yi, The protection of personal information is imminent, Informatiom Security and technology, (2010).

Google Scholar