[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

Dynamic consent: a patient interface for twenty-first century research networks

J Kaye, EA Whitley, D Lund, M Morrison… - European journal of …, 2015 - nature.com
Biomedical research is being transformed through the application of information
technologies that allow ever greater amounts of data to be shared on an unprecedented …

Information security applications in smart cities: A bibliometric analysis of emerging research

T Poleto, TCC Nepomuceno, VDH De Carvalho… - Future Internet, 2023 - mdpi.com
This paper aims to analyze the intellectual structure and research fronts in application
information security in smart cities to identify research boundaries, trends, and new …

Making transparency transparent: The evolution of observation in management theory

ES Bernstein - Academy of Management Annals, 2017 - journals.aom.org
Observation is key to management scholarship and practice. Yet a holistic view of its role in
management has been elusive, in part due to shifting terminology. The current popularity of …

Broad consent versus dynamic consent in biobank research: is passive participation an ethical problem?

KS Steinsbekk, B Kåre Myskja, B Solberg - European Journal of Human …, 2013 - nature.com
In the endeavour of biobank research there is dispute concerning what type of consent and
which form of donor–biobank relationship meet high ethical standards. Up until now, a …

Human-data interaction: The human face of the data-driven society

R Mortier, H Haddadi, T Henderson, D McAuley… - arXiv preprint arXiv …, 2014 - arxiv.org
The increasing generation and collection of personal data has created a complex
ecosystem, often collaborative but sometimes combative, around companies and individuals …

Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

APH de Gusmão, MM Silva, T Poleto, LC e Silva… - International Journal of …, 2018 - Elsevier
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which
are among the main issues caused by the extensive use of networks in industrial control …

COVID-19, policy change, and post-pandemic data governance: a case analysis of contact tracing applications in East Asia

VQT Li, L Ma, X Wu - Policy and Society, 2022 - academic.oup.com
In an era of digitalization, governments often turn to digital solutions for pressing policy
issues, and the use of digital contact tracing and quarantine enforcement for COVID-19 is no …

Will users keep using mobile payment? It depends on trust and cognitive perspectives

LAM Nelloh, AS Santoso, MW Slamet - Procedia Computer Science, 2019 - Elsevier
The rapid growth of mobile payment as the part of Financial Technology (FinTech) could
lead to empirical problems (eg hacker attacks, privacy violation, etc) that results low …

Transition pathways towards design principles of self-sovereign identity

J Sedlmeir, J Huber, TJ Barbereau, L Weigl… - Proceedings of the 43rd …, 2022 - orbilu.uni.lu
[en] Society's accelerating digital transformation during the COVID-19 pandemic highlighted
clearly that the Internet lacks a secure, efficient, and privacy-oriented model for identity. Self …