PDSs are an emerging business model that seeks to facilitate users’ exercise of their personal data ownership rights and give users more options to control their data in terms of permissions to access them and generation of value (Bolychevsky and Worthington, 2018). What would efficient data ...
The analysis (Section 4) will make an effort to describe the fundaments of both rights and analyze in how far they would conflict with granting legal persons and their interest (partial) protection. Both with regard to the right to privacy and the right to data protection, this contribution ...
So, as far as I can see, it should be fine. dcsw2mentioned this issueMay 18, 2023 CollaboratorAuthor griff-reescommentedMay 24, 2023 griff-reesmentioned this issueMay 25, 2023 griff-reesassignedAoifeHughesJun 30, 2023 CollaboratorAuthor ...
Rights and permissions Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source,...
Rights and permissions Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source,...
(i) if the cross-border transfer of personal information is legal and necessary; (ii) if the protective measures adopted are legal, effective, and match the risks; and (iii) the impacts on the rights and interests of re...
Rights and permissions Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source,...
This is critical if we are to democratise our data rights and perhaps be kept safe from data related crimes. Importantly, we see shadow and counter accounts as an important complement to the arguments we make in this paper, because as many scholars have pointed out, these can be very ...
https://doi.org/10.1016/j.digbus.2021.100010Get rights and content Under a Creative Commons license open accessAbstract Firms are collecting more data—about their operations, customers, and markets—in order to improve performance. Some of this data has value beyond a firm's boundary and thus ...
Bank transactions are highly confidential. As a result, there are no real public data sets that can be used to investigate and compare anti-money laundering (AML) methods in banks. This severely limits research on important AML problems such as efficienc