全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Chain-computerisation and privacy Keteninformatisering en privacy

Keywords: privacy , privacy by design , collection limitation , use limitation , remarks , chain-computerisation

Full-Text   Cite this paper   Add to My Lib

Abstract:

This article is only available in Dutch 1. Chain-computerisation strengthens the protection of privacy. This is one of the social benefits of practicing the theory; 2. Chain-computerisation contributes to privacy by design, since privacy is a fundamental part from the early design of the information-architecture up to and including the actual processing of data; 3. Chain-computerisation limits undesired exchange of information and interweaving of chains of information using data collection limitation and barriers between chains. This is done using number systems, reference indexes and verification systems; 4. On the base level of a chain the positive outcomes coming from using chain-computerisation are under pressure. Possible negative effects should be mitigated. Dit artikel is alleen beschikbaar in het Nederlands 1. Keteninformatisering draagt bij aan de bescherming van privacy. Het is één van de maatschappelijke effecten van toepassing van het leerstuk; 2. Keteninformatisering draagt bij aan 'privacy by design'1, doordat privacy onderdeel is van het ontwerp van een informatie-infrastructuur voor de verwerking van persoonsgegevens; 3. Keteninformatisering belemmert ongewenste informatie-uitwisseling en ketenvervlechting door dataminimalisatie en waterscheidingen tussen ketens met nummerstelsels, verwijsindexen en verificatieregisters; 4. De positieve effecten van Keteninformatisering staan vooral op het grondvlak onder druk. This article is only available in Dutch Chain-computerisation and privacy 1. Chain-computerisation strengthens the protection of privacy. This is one of the social benefits of practicing the theory; 2. Chain-computerisation contributes to privacy by design, since privacy is a fundamental part from the early design of the information-architecture up to and including the actual processing of data; 3. Chain-computerisation limits undesired exchange of information and interweaving of chains of information using data collection limitation and barriers between chains. This is done using number systems, reference indexes and verification systems; 4. On the base level of a chain the positive outcomes coming from using chain-computerisation are under pressure. Possible negative effects should be mitigated.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133