Nothing Special   »   [go: up one dir, main page]

Schoonmaker, 2016 - Google Patents

Proactive privacy for a driverless age

Schoonmaker, 2016

Document ID
10088321355997373657
Author
Schoonmaker J
Publication year
Publication venue
Information & Communications Technology Law

External Links

Snippet

Autonomous vehicles are on the cusp of disrupting the entire transportation industry and current privacy legislation is not yet equipped to deal with the changes being spurred by this innovation. This paper enumerates and elucidates on the various privacy concerns that are …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking

Similar Documents

Publication Publication Date Title
Schoonmaker Proactive privacy for a driverless age
Damjanovic-Behrendt A digital twin-based privacy enhancement mechanism for the automotive industry
Karnouskos Symbiosis with artificial intelligence via the prism of law, robots, and society
Barrett Herbie fully downloaded: Data-driven vehicles and the automobile exception
Andraško et al. Sustainable data governance for cooperative, connected and automated mobility in the European Union
Balboni et al. Designing Connected and Automated Vehicles around Legal and Ethical Concerns: Data Protection as a Corporate Social Responsibility.
Bollinger The security and privacy in your car act: Will it actually protect you?
Sanguino et al. Cybersecurity certification and auditing of automotive industry
Bryans The Internet of Automotive Things: vulnerabilities, risks and policy implications
Dukarski Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles
Mlada et al. Protection of personal data in autonomous vehicles and its data categorization
Taeihagh et al. Towards autonomous vehicles in smart cities: Risks and risk governance
Barber et al. Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles.
Pape et al. A Systematic Approach for Automotive Privacy Management
Dunphy Ensuring Location Data Privacy in Connected and Automated Vehicles (CAVs)
Peacher Regulating data privacy of connected vehicles: How automotive giants can protect themselves and their golden goose
DiSipio Global Positioning Systems and Social Media-Anathemas to Privacy
Kalloniatis et al. Towards the design of an assurance framework for increasing security and privacy in connected vehicles
Charalambous et al. A digital decision support system for efficient policing in urban security in a community policing context
Dowthwaite et al. Privacy preferences in automotive data collection
Liu et al. The Connected and Autonomous Vehicle Trade-Off: Functional Benefits versus Security Risks
Platon Exploring Vehicle Security Improvement Framework in the Safety Messaging System to Protect Against Hackers
Quinlan et al. Connected vehicles: a privacy analysis
Raciti et al. Up-to-Date Threat Modelling for Soft Privacy on Smart Cars
Brady Data privacy and automated vehicles: Navigating the privacy continuum