Open Access
Subscription Access
A Case Study on Privacy Vs Security with Reference to Online Transactions
In today's society, we are surrounded by various forms of technology that could be used for many different purposes. There are many theories that the government monitors our use of technology to gather information about citizens and to keep track of any suspicious activity. Although this may invade personal privacy, it provides more safety for citizens.
User
Font Size
Information
- • Assembly, U. G. (1948). Universal declaration of human rights. UN General Assembly.
- • Breaux, T., &Antón, A. (2008). Analyzing regulatory rules for privacy and security requirements. IEEE transactions on software engineering, 34(1), 5-20.
- • Campbell, H. (1990). Black’s law dictionary. St Paul Minn: West Publishing Co.
- • Cavoukian, A. (2011). Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policymakers.
- • Flaherty, D. H. (1989). Protecting privacy in surveillance societies (p. 306). Chapel Hill: University of North Carolina Press.
- • Flavián, C., &Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: three basic elements of loya lty to a web sit e . Industri a l Management & Data Systems, 106(5), 601-620.
- • Nissenbaum, H. (2004). Privacy as contextual integrity. Wash. L. Rev., 79, 119. 25
- • Pfleeger, C. P., &Pfleeger, S. L. (2002). Security in computing. Prentice Hall Professional Technical Reference.
- • Udo, G. J. (2001). Privacy and security concerns as major barriers for ecommerce: a survey study. Information Management & Computer Security, 9(4), 165-174.
- • Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.
Abstract Views: 497
PDF Views: 216