Open Access Open Access  Restricted Access Subscription Access

A Case Study on Privacy Vs Security with Reference to Online Transactions


Affiliations
1 MBA Department Adarsh Institute of Management & Information Technology, India
2 Adarsh Institute of Management & Information Technology, India
 

In today's society, we are surrounded by various forms of technology that could be used for many different purposes. There are many theories that the government monitors our use of technology to gather information about citizens and to keep track of any suspicious activity. Although this may invade personal privacy, it provides more safety for citizens.
User
Notifications
Font Size

  • • Assembly, U. G. (1948). Universal declaration of human rights. UN General Assembly.
  • • Breaux, T., &Antón, A. (2008). Analyzing regulatory rules for privacy and security requirements. IEEE transactions on software engineering, 34(1), 5-20.
  • • Campbell, H. (1990). Black’s law dictionary. St Paul Minn: West Publishing Co.
  • • Cavoukian, A. (2011). Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policymakers.
  • • Flaherty, D. H. (1989). Protecting privacy in surveillance societies (p. 306). Chapel Hill: University of North Carolina Press.
  • • Flavián, C., &Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: three basic elements of loya lty to a web sit e . Industri a l Management & Data Systems, 106(5), 601-620.
  • • Nissenbaum, H. (2004). Privacy as contextual integrity. Wash. L. Rev., 79, 119. 25
  • • Pfleeger, C. P., &Pfleeger, S. L. (2002). Security in computing. Prentice Hall Professional Technical Reference.
  • • Udo, G. J. (2001). Privacy and security concerns as major barriers for ecommerce: a survey study. Information Management & Computer Security, 9(4), 165-174.
  • • Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.

Abstract Views: 497

PDF Views: 216




  • A Case Study on Privacy Vs Security with Reference to Online Transactions

Abstract Views: 497  |  PDF Views: 216

Authors

Divya Bansal
MBA Department Adarsh Institute of Management & Information Technology, India
Emil Suresh
Adarsh Institute of Management & Information Technology, India

Abstract


In today's society, we are surrounded by various forms of technology that could be used for many different purposes. There are many theories that the government monitors our use of technology to gather information about citizens and to keep track of any suspicious activity. Although this may invade personal privacy, it provides more safety for citizens.

References





DOI: https://doi.org/10.21095/ajmr%2F2018%2Fv11%2Fi1%2F139601