Explore chapters and articles related to this topic
Managing CRM with Fabric Hyperledger blockchain technology
Published in Massimo Ragnedda, Giuseppe Destefanis, Blockchain and Web 3.0, 2019
Dario Puligheddu, Roberto Tonelli, Michele Marchesi
From the perspective of customers or central (state or international) guaranty units, the data acquired by enterprises and business societies can be a real social risk, in particular when data protection is not granted or correctly taken into account, especially nowadays, where data on customers are collected and maintained in decentralized structures accessible from the network, like cloud repositories of web servers. As a consequence, the more recent legal regulations impose the approach of “privacy by design” for CRM of any exposed business enterprise, as in the GDPR (General Data Protection Regulation). The enhanced attention on the privacy normative pushed vendors to create new products for granting security and privacy, but since the service and the applications were already designed and working, were introduced as intermediate layers between the application and the rest of the network as an add-on, such as firewalls, intrusion detection systems, intrusion prevention systems, web application firewalls, next generation firewalls and, ultimately, artificial intelligence.
Organization Privacy
Published in G. K. Awari, Sarvesh V. Warjurkar, Ethics in Information Technology, 2022
G. K. Awari, Sarvesh V. Warjurkar
To prevent a Section 5 breach, the FTC recommends that enterprises implement a “privacy by design” policy, simplify data options for businesses and customers, and increase openness of activities. The privacy by design philosophy allows businesses to think about future privacy and data protection concerns early in the production of their organization, product, or service. Furthermore, the baseline privacy by design guideline is supported by two applied principles: Data confidentiality, fair collection limits, good preservation and recycling procedures, and data integrity can all be part of a company’s privacy policies. Throughout the life cycle of their goods and services, businesses should maintain robust data-processing procedures.
US cybersecurity and privacy regulations
Published in Abbas Moallem, Human-Computer Interaction and Cybersecurity Handbook, 2018
Further, ideally, the audit or assessment is not the first time a company has considered how its actions affect its customers, employees, and vendors. Privacy by design is a movement to imbed privacy considerations into products and services at the onset, rather than as an add-on layer after the design is completed or even after lawsuits or government prosecution yields a consent decree mandating privacy and security be added.
ChatGPT: More Than a “Weapon of Mass Deception” Ethical Challenges and Responses from the Human-Centered Artificial Intelligence (HCAI) Perspective
Published in International Journal of Human–Computer Interaction, 2023
Alejo José G. Sison, Marco Tulio Daza, Roberto Gozalo-Brizuela, Eduardo C. Garrido-Merchán
The different ways to engage with these issues are well known. Behind the foundational issues of sentience and AGI is anthropomorphism, the tendency to project human agency onto things for a semblance of understanding (e.g., “the doll smiles because it likes me”). In the case of machines, it is called the “Eliza effect,” named after a 1960s chatbot (Weizenbaum, 1966). Developers have to be transparent about how their models are designed (i.e., interpretability, inherent capability to explain, independent data, interactive learning, and inquisitiveness) (Wahde and Virgolin, 2023) and contribute to increasing public AI literacy. Privacy concerns can be addressed through “privacy by design” (Cavoukian, 2009) and practices such as data minimization, encryption, and informed consent. Legal disputes regarding copyrighted materials can be avoided if companies adopt the three C’s: credit, compensation, and consent (Clark, 2023a). Companies should also adhere to the doctrine of “fair use,” which permits reproducing copyrighted materials in certain circumstances (Wiggers, 2023).
Translating Privacy Design Principles Into Human-Centered Software Lifecycle: A Literature Review
Published in International Journal of Human–Computer Interaction, 2023
Marco Saltarella, Giuseppe Desolda, Rosa Lanzilotti, Vita Santa Barletta
These principles represent the foundation of the Privacy by Design approach aiming at embedding privacy and security into Information and Communications Technology (ICT) processes and architectures. Under this paradigm, privacy should be conceived as an integral part of the information systems meaning that systems architecture must be designed to consider not only technical but also security and privacy requirements. The concept of Privacy by Design is strictly related to the one of Security by Design, which is an older paradigm mostly based on purely technical principles: Confidentiality, Integrity and Availability (CIA), which means that only authorized entities should be able to access information (confidentiality), information should be protected against unauthorized modification or erasure (integrity), and information should always be available when requested by an authorized entity (availability). According to Cavoukian and Chanliau, privacy and security by default paradigms should converge into a single concept given that these paradigms complement and mutually reinforce each other (Cavoukian & Chanliau, 2013).
Mobility-as-a-service: insights to policymakers and prospective MaaS operators
Published in Transportation Letters, 2022
Ioanna Pagoni, Marco Gatto, Ioannis Tsouros, Athena Tsirimpa, Amalia Polydoropoulou, Giuseppe Galli, Tito Stefanelli
Given its role of intermediary between passengers and service providers, the MaaS operator can optimize transport supply and demand based on real-time network conditions and users’ preferences (Hill et al. 2017). Data from infrastructure are therefore a key asset in the MaaS business, and clear and transparent rules for data control are crucial for establishing a structured approach in terms of data security and privacy (Goddard 2017). The EU General Data Protection Regulation (GDPR) 2016/679 (EU, 2016) has unified personal data regulations and requirements for data handling across EU member states, introducing a ‘privacy by design’ approach in software development. No particular issues concerning data protection for transport operators should emerge as long as they have access only to anonymized data. Some risks could emerge for on-demand services, as these might require the personalization of data and the possibility of identification of the service recipient even if only a user identification code is used.