Javascript must be enabled to continue!
ICT Omnipresence and the Rights to Privacy
View through CrossRef
The development of technology and online communication has also led to the appearance of what seem to be certain new types of criminal activity. Cyber security faced difficulties as a result of the rise in criminal behavior and the potential for the creation of new types of criminal activity online. This study evaluates the value of cyber security in an effort to stop cybercrimes based on this assumption. The research methodology used in this work is triangulation, which entails using many approaches to corroborate findings. The goal of this essay is to strike a balance between the requirement for cybersecurity and cybercrimes prevention and the right to privacy.
Penerbit Universiti Kebangsaan Malaysia (UKM Press)
Title: ICT Omnipresence and the Rights to Privacy
Description:
The development of technology and online communication has also led to the appearance of what seem to be certain new types of criminal activity.
Cyber security faced difficulties as a result of the rise in criminal behavior and the potential for the creation of new types of criminal activity online.
This study evaluates the value of cyber security in an effort to stop cybercrimes based on this assumption.
The research methodology used in this work is triangulation, which entails using many approaches to corroborate findings.
The goal of this essay is to strike a balance between the requirement for cybersecurity and cybercrimes prevention and the right to privacy.
Related Results
On the Status of Rights
On the Status of Rights
Photo by Patrick Tomasso on Unsplash
ABSTRACT
In cases where the law conflicts with bioethics, the status of rights must be determined to resolve some of the tensions. ...
Influence of ICT integration on content preparation by ICT and Non-ICT trained teachers in secondary schools in Machakos County, Kenya
Influence of ICT integration on content preparation by ICT and Non-ICT trained teachers in secondary schools in Machakos County, Kenya
The use of Information Communication Technology (ICT) in teaching and learning has become a necessity and an opportunity for improving and enhancing acquisition of knowledge by lea...
Global ICT‐ethics: the case of privacy
Global ICT‐ethics: the case of privacy
PurposeThe world wide use of information and communication technology (ICT) is one aspect of globalisation. In the ethical discussion of the implications of ICT the right to privac...
Bioethics-CSR Divide
Bioethics-CSR Divide
Photo by Sean Pollock on Unsplash
ABSTRACT
Bioethics and Corporate Social Responsibility (CSR) were born out of similar concerns, such as the reaction to scandal and the restraint ...
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash
Abstract
This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Re Application by the Northern Ireland Human Rights Commission for Judicial Review (Northern Ireland); Reference by Court of Appeal in Northern Ireland Pursuant to Paragraph 33 of Schedule 10 to the Northern Ireland Act 1998 (Abortion) (Northern Ireland)
Re Application by the Northern Ireland Human Rights Commission for Judicial Review (Northern Ireland); Reference by Court of Appeal in Northern Ireland Pursuant to Paragraph 33 of Schedule 10 to the Northern Ireland Act 1998 (Abortion) (Northern Ireland)
531Human rights — Rights of women in Northern Ireland — Pregnant women and girls — Autonomy and bodily integrity — Right to respect for private and family life — Rights of persons ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...

