scholarly journals Automated Text Similarities Approach: GDPR and Privacy by Design Principles

Author(s):  
Boštjan Brumen

Respect for privacy is not a modern phenomenon as it has been around for centuries. Recent advances in technologies led to the rise of awareness of the importance of privacy, and to the development of principles for privacy protection to guide the engineering of information systems on one side, and on using the principles to draft legal texts protecting privacy on the other side. In this paper, we analyze how respect for privacy has been implemented in GDPR by automated comparison of the similarity of GDPR’s articles and the text of seven principles of Privacy by Design. We have compared the specific text of GDPR’s first 50 core privacy-protecting articles and the GDPR’s remaining provisions to establish independent supervisory authorities. The first half is observing the privacy by design principles, each of them considerably more than the second half. Our findings show that automated similarity comparison can highlight portions of legal texts where principles were observed. The results can support drafting legal texts to check whether important legal (or other) principles were adequately addressed.

Author(s):  
Maria N. Koukovini ◽  
Eugenia I. Papagiannakopoulou ◽  
Georgios V. Lioudakis ◽  
Nikolaos L. Dellas ◽  
Dimitra I. Kaklamani ◽  
...  

Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.


Author(s):  
Maria N. Koukovini ◽  
Eugenia I. Papagiannakopoulou ◽  
Georgios V. Lioudakis ◽  
Nikolaos L. Dellas ◽  
Dimitra I. Kaklamani ◽  
...  

Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.


Author(s):  
Maria N. Koukovini ◽  
Eugenia I. Papagiannakopoulou ◽  
Georgios V. Lioudakis ◽  
Nikolaos L. Dellas ◽  
Dimitra I. Kaklamani ◽  
...  

Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.


Author(s):  
Zouhaier Brahmia ◽  
Fabio Grandi ◽  
Barbara Oliboni ◽  
Rafik Bouaziz

In information systems, not only do data change over time, but also database schemata evolve frequently as a response to evolving application requirements. In the literature, schema evolution and schema versioning are the two techniques that were proposed to support schema changes in a DBMS, without loss of extant data and with continued support of legacy applications. After applying schema changes, schema evolution keeps only the current schema version and retains the data which are adapted to such a schema. On the other hand, each time schema changes are applied, schema versioning creates a new schema version, while preserving old schema versions and their corresponding data. With schema versioning, data access through any schema version is supported, which avoids applications developed with past schemata to become obsolete. The main goal of this chapter is to present the recent research proposals that deal with schema versioning and to discuss the recent advances on schema versioning support in mainstream DBMSs.


Author(s):  
Zouhaier Brahmia ◽  
Fabio Grandi ◽  
Barbara Oliboni ◽  
Rafik Bouaziz

In information systems, not only do data change over time, but also database schemata evolve frequently as a response to evolving application requirements. In the literature, schema evolution and schema versioning are the two techniques that were proposed to support schema changes in a DBMS, without loss of extant data and with continued support of legacy applications. After applying schema changes, schema evolution keeps only the current schema version and retains the data which are adapted to such a schema. On the other hand, each time schema changes are applied, schema versioning creates a new schema version, while preserving old schema versions and their corresponding data. With schema versioning, data access through any schema version is supported, which avoids applications developed with past schemata to become obsolete. The main goal of this chapter is to present the recent research proposals that deal with schema versioning and to discuss the recent advances on schema versioning support in mainstream DBMSs.


Author(s):  
Ali Shirzad ◽  
Shaban Mohammadi ◽  
Hamedesmaeili Oghaz

Dependence on information and rapidly changing technology can be seen in many organizations, with proper security and intelligence systems to protect themselves. But success in providing security depends on the awareness of managers and employees. The accounting information systems in organizations are the most important element. One of the factors threatening their system is virus. Malware are computer viruses that can cause a variety of disorders, including loss of data and accounting information systems are impaired in such case. On the other hand, one of the main objectives of the viruses is to steal financial information. In this paper, one of the main factors threatening the security of accounting information systems, the viruses are described.


Proceedings ◽  
2020 ◽  
Vol 47 (1) ◽  
pp. 55
Author(s):  
Shan Zhang

By applying the concept of natural science to the study of music, on the one hand, we can understand the structure of music macroscopically, on the other, we can reflect on the history of music to a certain extent. Throughout the history of western music, from the classical period to the 20th century, music seems to have gone from order to disorder, but it is still orderly if analyzed carefully. Using the concept of complex information systems can give a good answer in the essence.


2021 ◽  
Author(s):  
Saikat Kumar Manna ◽  
Tapas Kumar Achar ◽  
Sanchita Mondal

In this minireview, we have comprehensively discussed recent advances in the design principles and sensing mechanisms of developed probes and their biological/environmental applications in selective formaldehyde detection.


Sign in / Sign up

Export Citation Format

Share Document