Complying with the GDPR when vulnerable people use smart devices
The number of smart home devices is increasing. They are used by vulnerable people regardless of whether they are designed specifically for them or for the general population (for example, smart door locks, smart alarms or voice assistants). This PhD focusses on children and inherently vulnerable ad...
| Main Author: | Piasecki, Stanislaw |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/69888/ |
Similar Items
Living with interpersonal data: observability and accountability in the age of pervasive ICT
by: Goulden, Murray, et al.
Published: (2017)
by: Goulden, Murray, et al.
Published: (2017)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Understanding and protecting vulnerable financial consumers
by: Cartwright, Peter
Published: (2015)
by: Cartwright, Peter
Published: (2015)
Towards user centric regulation: exploring the interface between information technology law and human computer interaction
by: Urquhart, Lachlan
Published: (2017)
by: Urquhart, Lachlan
Published: (2017)
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
by: Uwadiegwu, Inyama Victor
Published: (2019)
by: Uwadiegwu, Inyama Victor
Published: (2019)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Tariff agent: interacting with a future smart energy system at home
by: Alan, Alper T., et al.
Published: (2016)
by: Alan, Alper T., et al.
Published: (2016)
Understanding the challenges of using personal data in media experiences
by: Sailaja, Neelima
Published: (2020)
by: Sailaja, Neelima
Published: (2020)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Toward a Revolution in Australian Children’s Data and Privacy
by: Leaver, Tama, et al.
Published: (2023)
by: Leaver, Tama, et al.
Published: (2023)
Avoiding the internet of insecure industrial things
by: Urquhart, Lachlan, et al.
Published: (2018)
by: Urquhart, Lachlan, et al.
Published: (2018)
A day in the life of things in the home
by: Crabtree, Andy, et al.
Published: (2016)
by: Crabtree, Andy, et al.
Published: (2016)
Income poverty and well-being among vulnerable households: a study in Malaysia
by: Ahmad, Nor Fairani, et al.
Published: (2016)
by: Ahmad, Nor Fairani, et al.
Published: (2016)
Safe spaces, support, social capital: a critical analysis of artists working with vulnerable young people in educational contexts
by: Sellman, Edward
Published: (2015)
by: Sellman, Edward
Published: (2015)
Harnessing the digital records of everyday things
by: Darzentas, Dimitrios, et al.
Published: (2016)
by: Darzentas, Dimitrios, et al.
Published: (2016)
Energy-efficient clock synchronization technique for IoT
by: Onyeka, Ezema Ernest
Published: (2019)
by: Onyeka, Ezema Ernest
Published: (2019)
Internet of things and industrial applications for precision machining
by: Benardos, Panorios, et al.
Published: (2017)
by: Benardos, Panorios, et al.
Published: (2017)
Identity management policy and unlinkability: a comparative case study of the US and Germany
by: Rosner, Gilad L.
Published: (2014)
by: Rosner, Gilad L.
Published: (2014)
Poverty, vulnerability, and child labour: evidence from Uganda
by: Angemi, Diego
Published: (2008)
by: Angemi, Diego
Published: (2008)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
An empirical comparison of commercial and open‐source web vulnerability scanners
by: Amankwah, Richard, et al.
Published: (2020)
by: Amankwah, Richard, et al.
Published: (2020)
Developments in the right to be forgotten
by: McGoldrick, Dominic
Published: (2013)
by: McGoldrick, Dominic
Published: (2013)
Data work: how energy advisors and clients make IoT data accountable
by: Fischer, Joel E., et al.
Published: (2017)
by: Fischer, Joel E., et al.
Published: (2017)
A security transmission and storage solution about sensing image for blockchain in the internet of things
by: Li, Yunfa, et al.
Published: (2020)
by: Li, Yunfa, et al.
Published: (2020)
Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
by: Ibrahim, Mohammed
Published: (2021)
by: Ibrahim, Mohammed
Published: (2021)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
The lives of objects: designing for meaningful things
by: Darzentas, Dimitrios Paris
Published: (2018)
by: Darzentas, Dimitrios Paris
Published: (2018)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Becoming smart: exploring tourism suppliers’ perspectives on smart tourism destination engagement
by: Johnson, Abbie-Gayle
Published: (2021)
by: Johnson, Abbie-Gayle
Published: (2021)
Accountable Internet of things?: outline of the IoT Databox model
by: Crabtree, Andy, et al.
Published: (2017)
by: Crabtree, Andy, et al.
Published: (2017)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Digitally enhanced consumer packaged goods: a data-inspired ideation approach
by: Berumen Salazar, Jose Gustavo
Published: (2022)
by: Berumen Salazar, Jose Gustavo
Published: (2022)
Building accountability into the Internet of Things: the
IoT Databox model
by: Crabtree, Andy, et al.
Published: (2018)
by: Crabtree, Andy, et al.
Published: (2018)
New directions in information technology law: learning from human–computer interaction
by: Urquhart, Lachlan, et al.
Published: (2017)
by: Urquhart, Lachlan, et al.
Published: (2017)
The value of vulnerability: the transformative capacity of risky trust
by: Bruni, Luigino, et al.
Published: (2017)
by: Bruni, Luigino, et al.
Published: (2017)
Protecting vulnerable consumers from aggressive commercial practices
by: Kaprou, Eleni
Published: (2018)
by: Kaprou, Eleni
Published: (2018)
Similar Items
-
Living with interpersonal data: observability and accountability in the age of pervasive ICT
by: Goulden, Murray, et al.
Published: (2017) -
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016) -
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006) -
Understanding and protecting vulnerable financial consumers
by: Cartwright, Peter
Published: (2015) -
Towards user centric regulation: exploring the interface between information technology law and human computer interaction
by: Urquhart, Lachlan
Published: (2017)