Show simple item record

dc.contributor.authorPORCEDDA, Maria Grazia
dc.date.accessioned2013-02-05T13:29:20Z
dc.date.available2013-02-05T13:29:20Z
dc.date.issued2012
dc.identifier.citationAgusti CERRILLO I MARTÍNEZ, Miquel PEGUERA, Ismael PEÑA-LÓPEZ, Maria José PIFARRÉ DE MONER and Mònica VILASAU SOLANA (eds), Challenges and Opportunities of Online Entertainment. Proceedings of the 8th International Conference on Internet, Law & Politics. Universitat Oberta de Catalunya, Barcelona 9-10 July, 2012, Barcelona, UOC-Huygens Editorial, 2012, 485-506en
dc.identifier.isbn9788469541234
dc.identifier.urihttps://hdl.handle.net/1814/25714
dc.description.abstractThe online entertainment industry has thrived thanks to unprecedented technical innovations and responsive organizational changes, whose combination is challenging privacy and data protection in two respects. Firstly, they are affected by those business models based on the provision of seemingly free services, in the subtle exchange for as much personal information as possible. Secondly, the multiplication of online devices, users and services, cloud computing and big data raise issues of technical security, i.e. cybercrimes and cyber-security, and affect privacy and data protection when personal information is affected. Moreover, due to the relevance of Critical Information Infrastructure to the national economy and security, governments are starting to tackle cyber-challenges. Yet, the policy debate is focussing excessively on traditional crimes committed by electronic means, which are quite different from novel crimes possible only in the online environment, and on surveillance measures. This may bias the choice of the best means to tackle cyber-crimes and further challenge privacy and data protection, mostly seen as an obstacle to investigations. However, I maintain that, in theory, the adoption of cyber-security policies represent more an opportunity to revive privacy and data protection than a threat. Not only is privacy built into classic computer security paradigms, but the data protection regime also contains provisions whose implementation in a cyber-security policy may act as a proxy to reduce cyber threats, provided that a number of conditions are respected. Part of the problem, and therefore the solution, may lie in appropriately redistributing responsibility and accountability online.
dc.language.isoenen
dc.relation.urihttp://www.huygens.es/ebooks/IDP_2012_web.pdfen
dc.titleReviving Privacy: the Opportunity of Cyber-securityen
dc.typeContribution to booken


Files associated with this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record