Privacy in Cyberspace: Implementation of a Legal-Technological Strategy to Protect Personal Data

Authors

Keywords:

Privacidad, Tecnología, Derecho

Abstract

This article will address the role it has in handling personal information through digital platforms and its potential legal effects. In addition to addressing this problem from a purely legal position, it is intended to analyze the collaborative context between technology and Law (typical of Legal Informatics), to provide a potential solution to a problem that concerns both areas.

Downloads

Download data is not yet available.

Author Biography

  • Jesús Manuel Niebla Zatarain, Universidad Autónoma de Sinaloa

    Doctorante en Derecho por la Universidad de Edimburgo, Escocia 2013. Becario CONACYT número 453974. Miembro del Programa Doctores Jóvenes de la Universidad Autónoma de Sinaloa. jmniebla@gmail.con y J.Niebla@ed.ac.uk.

References

Al-Fedaghi, Sabah S., Gunar Fiedler, and Bernhard Thalheim. “Privacy enhanced information systems”. Frontiers in Artificial Intelligence and Applications 136, 2006. Bélanger, France, and Robert E. Crossler. “Privacy in the digital age: a review of information privacy research in information systems”. MIS quarterly 35, no. 4.2011. 28 Bennett, Colin J., and Charles D. Raab. The governance of privacy: Policy instruments in global perspective. 2006.

Berners-Lee,Tim, Mark Fischetti, and Michael L. Foreword ByDertouzos. Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor. HarperInformation, 2000.

Cámara de Diputados. “Constitución Política de los Estados Unidos Mexicanos”, art 16 párrafo Segundo. México: Cámara de diputados, 2012.

Cámara de Diputados. “Constitución Política de los Estados Unidos Mexicanos”. art 6 párrafo Segundo. México: Cámara de diputados, 2012.

Cámara de Diputados del H. Congreso de la Unión. Ley General de Protección de Datos Personales en Posesión de Sujetos Obligados.

Cámara de Diputados del H. Congreso de la Unión. Ley Federal de Protección de Datos Personales en Posesión de los Particulares. Art. 3 apartado V. México: Cámara de diputados, 2010.

Cámara de Diputados del H. Congreso de la Unión. Ley Federal de Protección de Datos Personales en Posesión de los Particulares. Art. 22. México: Cámara de diputados, 2010.

Cámara de Diputados del H. Congreso de la Unión. Ley Federal de Protección de Datos Personales en Posesión de los Particulares. Capítulo III, Art. 7. México: Cámara de diputados, 2010.

Cavoukian, Ann. “Privacy by Design: Origins, Meaning, and Prospects”. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards: Aspects and Standards, 2011.

Cavoukian, A. “Privacy by Design: The 7 foundational principles. Information and Privacy Commissioner of Ontario (Canada)”, 2012. “General Data Protection Regulation (GDPR) of the European Parliament and of the Council of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC”. Art 23.

Friedman, Batya. “Value-sensitive design”. Interactions 3, no. 6, 1996.

Gomez, J., T. Pinnick, and A. Soltani. “Know privacy: The current state of web privacy, data collection, and information sharing”. Berkeley, CA: UC Berkeley School of Information, 2009.

Giirses, Seda, Carmela Troncoso, and Claudia Diaz. “Engineering privacy by design”. Computers, Privacy & Data Protection 14, no. 3, 201.

Junglas, Iris A, Norman A. Johnson, and Christiane Spitzmiiller. “Personality traits and concern for privacy: an empirical study in the context of location-based services”. European Journal of Information Systems 17, no. 4, 2008.

Koops, Bert-Jaap, and Ronald Leenes. “Privacy regulation cannot be hardcoded. A critical comment on the ‘privacy by design’provision in data-protection law”. International Review of Law, Computers & Technology 28, no. 2, 2014, pp 159-171.

Lessig, Lawrence.Code: And other Ilaws of - cyberspace. ReadHowYouWant.com, 2009.

Malone, Paul, Mark McLaughlin, Ronald Leenes, Pierfranco Ferronato, Nick Lockett, Pedro Bueso Guillen, Thomas Heistracher, and Giovanni Russello. “ENDORSE: a legal technical framework for privacy preserving data management”. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, pp. 27-34. ACM, 2010.

McCrae, Robert R., and Paul T. Costa. “Validation of the five-factor model of personality across instruments and observers”. Journal of personality and social psychology 52, no. 1, 1987.

Mount, Michael K., Murray R. Barrick, Steve M. Scullen, and James Rounds. “Higher-order dimensions of the big five personality traits and the big six vocational interest types”. Personnel Psychology 58, no. 2, 2005.

Palen, Leysia, and Paul Dourish. “Unpacking privacy for a networked world”. In Proceedings of the SIGCHI conference on Human factors in computing systems, 2003. United Kingdom's Data Protection Act of 1998.

Schiller, Jochen, and Agnés Voisard, eds. Location-based services. Elsevier, 2004.

Smith, H. Jeff, Tamara Dinev, and Heng Xu. “Information privacy research: an interdisciplinary review”. MIS quarterly 35, no. 4, 2011.

Smith, H. Jeff, Sandra J. Milberg, and Sandra J. Burke. “Information privacy: measuring individuals' concerns about organizational practices”. MIS quarterly, 1996.

Solove, Daniel J.The digital person: Technology and privacy in the information age. NyU Press, 2004. Statista. “Number of Social Media Users Worldwide from 2010 to 2020 (in — billions)”. Statista. Available at: https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users, Last accessed: February 12t 2017.

Xu, Heng, Tamara Dinev, Jeff Smith, and Paul Hart. “Information privacy concerns: Linking individual perceptions with institutional privacy assurances”. Journal of the Association for Information

Privacidad en Ciberespacio Implementación de una Estrategia Jurídico - Tecnológica para Protege.png

Downloads

Published

2017-06-30

How to Cite

Niebla Zatarain, J. M. (2017). Privacy in Cyberspace: Implementation of a Legal-Technological Strategy to Protect Personal Data. JUS Revista Jurídica, 1(3), 7-32. https://revistas.uas.edu.mx/index.php/JUS/article/view/22

Most read articles by the same author(s)

<< < 4 5 6 7 8 9 10 11 12 > >>