Privacy, trust and policy-making: Challenges and responses
نویسندگان
چکیده
منابع مشابه
Obstacles and Challenges of Policy-making based on Gender Equity
Gender equity is a controversial social issue and now with its incorporation into the Sixth Development Plan, policy-making for gender equity is essential. To this end, allocation of more resources and opportunities and implementation of affirmative action policies to achieve gender equity are not sufficient. Women's empowerment in various fields, and not just the economy and employment, is ess...
متن کاملA Review of Trust Management, Security and Privacy Policy Languages
Policies are a well-known approach to protecting security and privacy of users as well as for flexible trust management in distributed environments. In the last years a number of policy languages were proposed to address different application scenarios. In order to help both developers and users in choosing the language best suiting her needs, policy language comparisons were proposed in the li...
متن کاملUnderstanding the Security, Privacy and Trust Challenges of Cloud Computing
The overall objective of this paper is to understand the Security, Privacy and Trust Challenges and to advise on policy and other interventions which should be considered in order to ensure that Indian users of cloud environments are offered appropriate protections, and to underpin Indian cloud ecosystem. Cloud computing is increasingly subject to interest from policymakers and regulatory autho...
متن کاملSemantic Web Public Policy Challenges: Privacy, Provenance, Property and Personhood
The growing inferencing and knowledge linking power of the Semantic Web will, we all hope, make the world a better place: enrich democratic discourse, support more rapid scientific discovery, enable new forms of personal communication and culture, and generally enhance critical analysis of information. However, with this greater inferencing power comes daunting social and public policy question...
متن کاملUsability Challenges in Security and Privacy Policy-Authoring Interfaces
Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of authoring methods has received limited treatment from usability experts. With the rise in networked applications, distributed data storage, and pervasive computing, authoring comprehensive and accurate policies is increasingly impo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Law & Security Review
سال: 2009
ISSN: 0267-3649
DOI: 10.1016/j.clsr.2008.11.004