2017
DOI: 10.1007/s12553-017-0211-5
|View full text |Cite|
|
Sign up to set email alerts
|

Interrogating “privacy” in a world brimming with high political entanglements, surveillance, interdependence & interconnections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…Systemic interoperability points at the ability of complex systems to interact, share, and exchange information. The latter focuses on the coordination of practices, including human behaviour, organisational structures, tools, languages, and techniques (Kun et al 2008;Mathews 2017;Casanovas et al 2017b). Both dimensions should be analytically distinguished for a co-integration of the computational and social dimensions into the specific ecosystems created through this mutual interface.…”
Section: Semantic and Systemic Interoperabilitymentioning
confidence: 99%
“…Systemic interoperability points at the ability of complex systems to interact, share, and exchange information. The latter focuses on the coordination of practices, including human behaviour, organisational structures, tools, languages, and techniques (Kun et al 2008;Mathews 2017;Casanovas et al 2017b). Both dimensions should be analytically distinguished for a co-integration of the computational and social dimensions into the specific ecosystems created through this mutual interface.…”
Section: Semantic and Systemic Interoperabilitymentioning
confidence: 99%
“…11 It cannot be limited just to privacy and security issues -these could be deemed starting points. As underlined by Mathews (2017) what is required now to match civilization requirements is a holistic view bridging systemic and semantic interoperability. All dimensions covered by statutes, regulations, policies, best practices and protocols should be faced through this lens.…”
Section: Context and Law In The Digital Agementioning
confidence: 99%
“…The network security detection system (ZJXD-S), known as the network information detection system [1][2][3][4], mainly carries out work through the Internet and manages the computers connected with the interconnection network safely [5][6][7][8], so as to avoid computer users from accessing illegal websites [9][10][11][12], transmitting and publishing illegal information [13][14][15]. To prevent the abuse of network resources, leakage of sensitive information and other violations from happening in the future, it is also a necessary approach to detect Behavior and content of computer users.…”
Section: Introductionmentioning
confidence: 99%