Privacy Research    Healthcare/Pharma

Privacy in India: Attitudes and Awareness V 2.0

Written by Ponnurangam (PK) Kumaraguru and Niharika Sachdeva of the research group PreCog, this study aims to better understand how Indians’ view their own privacy, particularly given advances in technology and government projects such as Unique ID. The survey involved interviews with 20 participants, four focus group discussions of 31 participants and a survey that elicited responses from 10,427 individuals.

The PII Problem: Privacy and a New Concept of Personally Identifiable Information

Written by Paul Schwartz and Daniel Solove, this article explores the importance of personally identifiable information (PII) in privacy law and the challenges stemming from the lack of a uniform definition for the term. The authors outline a new approach to PII and show how existing approaches impede effective regulation of behavioral marketing.

What Google Knows: Privacy and Internet Search Engines

In this article, Omer Tene explores Google’s evolution from “a benevolent giant seeking to do no evil” into “an informational gatekeeper harboring previously unimaginable riches of personal data.” Tene writes, “Google's access to and storage of vast amounts of personal data create a serious
privacy problem,” and goes on to explore whether those privacy fears are valid, what rules should govern access to Google's database and what are the legal protections currently in place.

“I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy

This essay by Daniel Solove discusses the “nothing to hide” argument. Solove introduces the argument and examines frequent ways of responding to the argument; discusses his work on conceptualizing privacy, and explains why existing theories of privacy have been unsatisfactory, have led to confusion, and have impeded the development of effective legal and policy responses to privacy problems.

Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents

This paper by Ira S. Rubinstein and Nathaniel Good offers a comprehensive analysis of engineering and usability principles specifically relevant to privacy. It derives relevant principles, illustrates them by referencing 10 recent privacy incidents involving Google and Facebook and concludes that all ten privacy incidents might have been avoided by the application of these privacy engineering and usability principles.

Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool

Written by Khaled El Emam and Ontario Information and Privacy Commissioner Ann Cavoukian, this paper aims to illustrate the importance of de-identifying personal information before it is used or disclosed and, at times, prior to its collection.

De-identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Dataset

Written by Khaled El Emam, PhD; Luk Arbuckle, MSc; Gunes Koru, PhD; Benjamin Eze, MSc; Lisa Gaudette, MSc; Emilio Neri, BEng; Sean Rose, MSc; Jeremy Howard; Jonathan Gluck, this paper explores the privacy concerns of open health data by de-identifying the claims data used in the HHP competition and ensuring that it meets the requirements in the U.S. Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule.

Everyone’s nightmare: Privacy and data breach risks

This Edwards Wildman whitepaper discusses the growing body of law that governs data security and breach response, the types of exposure and liabilities these present and the lines of insurance potentially affected. The whitepaper also discusses privacy issues arising out of new technologies, the increasing use of social media and the growth of regulatory scrutiny of companies’ collection and usage of information about individuals.

2012 Consumer Study on Data Breach Notification

Conducted by the Ponemon Institute and sponsored by Experian, this study aims to understand consumers’ perceptions about the importance and value of receiving notification when their sensitive personal information has been lost or stolen.

Rethinking Personal Data

Created by Vodaphone, this white paper explores the balance between sustaining end-user trust through new trust frameworks and enabling governments and industry to create new economic and social value from personal data.

The Personal Network: A New Trust Model and Business Model for Personal Data

Created by Open Identity Exchange, this whitepaper explores the "personal network," which has emerged through the growth of online social networks. It explains the legal and economic reasons personal networks differ from social networks and introduces the Respect Trust Framework, the first trust framework designed expressly for personal data.

How Boards & Senior Executives Are Managing Cyber Risks

This is the third biennial survey that Carnegie Mellon CyLab has conducted on how boards of directors and senior management are governing the security of their organizations' information, applications and networks. The survey is based upon results received from 108 respondents at the board or senior executive level from Forbes Global 2000 companies.

Rethinking Personal Data: Strengthening Trust

As part of its Rethinking Personal Data initiative, the World Economic Forum created this report in collaboration with the Boston Consulting Group. The report proposes questions and recommends steps for stakeholders in efforts to restore trust in organizations' and governments' ability to secure data.

Risk and Responsibility in a Hyperconnected World: Pathways to Global Cyber Resilience

As part of its Rethinking Personal Data initiative, the World Economic Forum created this report in collaboration with Deloitte, to examine some of the key threats posed by hyperconnectivity and what should be done about them. The report provides a multistakeholder perspective on ways to deal with increasing cyber attacks and to improve corporate governance.

Big Data: The next frontier for innovation, competition and productivity

This study by MGI and McKinsey's Business Technology Office explores Big Data within U.S. healthcare, the European public sector, U.S. retail and manufacturing and personal-location data globally seeking to understand the state of digital data, how different domains can use large datasets to create value, the potential value across stakeholders and the implications for the leaders of private- and public-sector organizations, as well as for policy makers.

Page 5 of 7 pages ‹ First  < 3 4 5 6 7 >