Abstract
Why isn't IT regulated, when it can have such substantial impacts on people's lives?
- Adaptable Security https://adaptablesecurity.org/.Google Scholar
- California Consumer Privacy Act https://www.caprivacy.org/.Google Scholar
- Cybersecurity Information Sharing Act https://www.congress.gov/bill/114th-congress/senate-bill/754.Google Scholar
- Cybersecurity Enhancement Act of 2014 https://www.congress.gov/bill/113th-congress/senate-bill/1353/text.Google Scholar
- Federal Exchange Data Breach Notification Act of 2015 https://www.congress.gov/bill/114th-congress/house-bill/555.Google Scholar
- General Data Protection Regulation https://eugdpr.org/.Google Scholar
- Global Cyber Alliance https://www.globalcyberalliance.org/.Google Scholar
- National Cybersecurity Protection Advancement Act of 2015 https://www.congress.gov/bill/114th-congress/house-bill/1731.Google Scholar
- National Cyber Security Alliance https://staysafeonline.org/.Google Scholar
- Telecommunications Act of 1996 https://transition.fcc.gov/Reports/tcom1996.pdf.Google Scholar
- Mark Zuckerberg: The Internet needs new rules. Let's start in these four areas, The Washington Post, March 30, 2019 https://wapo.st/2R3hYlg.Google Scholar
Index Terms
- Regulating information technology
Recommendations
Privacy in information technology: designing to enable privacy policy management in organizations
Special isssue: HCI research in privacy and security is critical nowAs information technology continues to spread, we believe that there will be an increasing awareness of a fundamental need to address privacy concerns, and that doing so will require an understanding of policies that govern information use accompanied ...
Information and Technology Implementation Issues in AAL Solutions
With the population ageing effect, the technological developments, and pressure to reduce the cost with healthcare, are reunited the conditions for the development of Ambient Assisted Living AAL solutions. This work is a revision of the current state of ...
Regulating Drones in Restricted Spaces
HotMobile '19: Proceedings of the 20th International Workshop on Mobile Computing Systems and ApplicationsCommercial and end-user drones come equipped with a wide array of sensors. Unregulated use of such drones in public airspaces poses a serious threat to the privacy of citizens. We make the case for restricted spaces for drones, which are geographic ...
Comments