Schoonmaker, 2016 - Google Patents
Proactive privacy for a driverless ageSchoonmaker, 2016
- Document ID
- 10088321355997373657
- Author
- Schoonmaker J
- Publication year
- Publication venue
- Information & Communications Technology Law
External Links
Snippet
Autonomous vehicles are on the cusp of disrupting the entire transportation industry and current privacy legislation is not yet equipped to deal with the changes being spurred by this innovation. This paper enumerates and elucidates on the various privacy concerns that are …
- 238000005516 engineering process 0 abstract description 54
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Schoonmaker | Proactive privacy for a driverless age | |
Damjanovic-Behrendt | A digital twin-based privacy enhancement mechanism for the automotive industry | |
Karnouskos | Symbiosis with artificial intelligence via the prism of law, robots, and society | |
Barrett | Herbie fully downloaded: Data-driven vehicles and the automobile exception | |
Andraško et al. | Sustainable data governance for cooperative, connected and automated mobility in the European Union | |
Balboni et al. | Designing Connected and Automated Vehicles around Legal and Ethical Concerns: Data Protection as a Corporate Social Responsibility. | |
Bollinger | The security and privacy in your car act: Will it actually protect you? | |
Sanguino et al. | Cybersecurity certification and auditing of automotive industry | |
Bryans | The Internet of Automotive Things: vulnerabilities, risks and policy implications | |
Dukarski | Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles | |
Mlada et al. | Protection of personal data in autonomous vehicles and its data categorization | |
Taeihagh et al. | Towards autonomous vehicles in smart cities: Risks and risk governance | |
Barber et al. | Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles. | |
Pape et al. | A Systematic Approach for Automotive Privacy Management | |
Dunphy | Ensuring Location Data Privacy in Connected and Automated Vehicles (CAVs) | |
Peacher | Regulating data privacy of connected vehicles: How automotive giants can protect themselves and their golden goose | |
DiSipio | Global Positioning Systems and Social Media-Anathemas to Privacy | |
Kalloniatis et al. | Towards the design of an assurance framework for increasing security and privacy in connected vehicles | |
Charalambous et al. | A digital decision support system for efficient policing in urban security in a community policing context | |
Dowthwaite et al. | Privacy preferences in automotive data collection | |
Liu et al. | The Connected and Autonomous Vehicle Trade-Off: Functional Benefits versus Security Risks | |
Platon | Exploring Vehicle Security Improvement Framework in the Safety Messaging System to Protect Against Hackers | |
Quinlan et al. | Connected vehicles: a privacy analysis | |
Raciti et al. | Up-to-Date Threat Modelling for Soft Privacy on Smart Cars | |
Brady | Data privacy and automated vehicles: Navigating the privacy continuum |