Home > Research > Publications & Outputs > Consent, risk and compliance

Links

Text available via DOI:

View graph of relations

Consent, risk and compliance: Technologies and processes

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Close
Publication date23/03/2016
Host publicationProceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016
EditorsAntonio J. Jara, Makoto Takizawa, Yann Bocchi, Leonard Barolli, Tomoya Enokido
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages617-621
Number of pages5
ISBN (electronic)9781509018574
<mark>Original language</mark>English
Event30th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016 - Crans-Montana, Switzerland
Duration: 23/03/201625/03/2016

Conference

Conference30th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016
Country/TerritorySwitzerland
CityCrans-Montana
Period23/03/1625/03/16

Publication series

NameProceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016

Conference

Conference30th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016
Country/TerritorySwitzerland
CityCrans-Montana
Period23/03/1625/03/16

Abstract

Information about us is increasingly interesting to those who wish to understand our persona, our interests, and the context within which we lives our lives. Regulation follows with the aim to maintain our privacy in modern times. However, such regulation doesn't prescribe the detail of the processes needed to support the intended objectives of regulation. Nor, do we understand the requirement of the technologies which may assist in the enforcement and management of information processes to support regulation. This paper explores recent multidisciplinary research which has been anticipating the changing regulatory landscape with regard to data protection and provides some insight into how we may implement supporting technologies and processes using risk based approaches.