Views
Graph
Explorer
Focus
Down
Load 1 level
Load 2 levels
Load 3 levels
Load 4 levels
Load all levels
All
Dagre
Focus
Down
Load 1 level
Load 2 levels
Load 3 levels
Load 4 level
Load all levels
All
Tree
SpaceTree
Focus
Expanding
Load 1 level
Load 2 levels
Load 3 levels
Down
All
Down
Radial
Focus
Expanding
Load 1 level
Load 2 levels
Load 3 levels
Down
All
Down
Box
Focus
Expanding
Down
Up
All
Down
Page ✓
Article
Outline
Document
Down
All
Canvas
Time
Timeline
Calendar
Request email digest
Past 24 hours
Past 2 days
Past 3 days
Past week
Add
Add page
Add comment
Add citation
Edit
Edit page
Delete page
Share
Link
Bookmark
Embed
Social media
Login
Member login
Register now for a free account
🔎
Requirements
Protagonist
1
#278329
Immediately related elements
How this works
-
Big Data »
Big Data
Big Data☜Definitions Taxonomy, Reference Architectures, Requirements, and Security☜F1CEB7
■
Requirements
Requirements☜☜D3B8AB
●
1. Intrusion upon seclusion »
1. Intrusion upon seclusion
1. Intrusion upon seclusion ☜An invasion into a persons privacy and solitude - has a legal response if a reasonable person would agree with the threat. ☜FFB597
●
2. Public Discloser of Private Facts »
2. Public Discloser of Private Facts
2. Public Discloser of Private Facts☜Anything private which may or may not be true, if a reasonable person would be harmed by the information release without having been released publicly before. ☜FFB597
●
3. False or Publicity »
3. False or Publicity
3. False or Publicity☜Wide publishing of facts or fiction defamation of a persons reputation. ☜FFB597
●
4. Misappropriation of name or likeness »
4. Misappropriation of name or likeness
4. Misappropriation of name or likeness☜each of us has a right to protect our public image in commercial context☜FFB597
●
Technology - As Designed »
Technology - As Designed
Technology - As Designed ☜Big Data doesnt have the existing features used and needed for records managementTherefore, the perception appears well intended without the capabilities of a true records management solution. Example; Hadoop doesnt have the ability to do fine grain access and the risk would be true version control or workflow automation. ☜FFB597
►
Privacy »
Privacy
Privacy☜Protecting privacy relates to a persons ability to maintain their dignity. Data is the technology format of information broken into each word as an entity. Information, Content, and Knowledge are more aligned with people and their understanding of data used in context. ☜FFFACD
◄
Privacy versus Big Data ROI »
Privacy versus Big Data ROI
Privacy versus Big Data ROI☜The balance between privacy and utility needs to be thoroughly analyzed. Big Data is most useful when it can be analyzed for information. However, privacy would restrict the form and availability of data to analytics technologies.Dimensions like a persons name or birthdate and ethnic characterstics are more than privacy issues, these are racial profiling and reputation threats. Behavioral analytics based on a content id, without the ability to introduce bias is true sta☜FFFACD
◄
Privacy »
Privacy
Privacy☜Protecting privacy relates to a persons ability to maintain their dignity. Data is the technology format of information broken into each word as an entity. Information, Content, and Knowledge are more aligned with people and their understanding of data used in context. ☜FFFACD
◄
Privacy »
Privacy
Privacy☜Protecting privacy relates to a persons ability to maintain their dignity. Data is the technology format of information broken into each word as an entity. Information, Content, and Knowledge are more aligned with people and their understanding of data used in context. ☜FFFACD
Heading
Summary
Click the button to enter task scheduling information
Open
Details
Enter task details
Message text
Select assignee(s)
Due date (click calendar)
RadDatePicker
RadDatePicker
Open the calendar popup.
Calendar
Title and navigation
Title and navigation
<<
<
November 2024
>
<<
November 2024
S
M
T
W
T
F
S
44
27
28
29
30
31
1
2
45
3
4
5
6
7
8
9
46
10
11
12
13
14
15
16
47
17
18
19
20
21
22
23
48
24
25
26
27
28
29
30
49
1
2
3
4
5
6
7
Reminder
No reminder
1 day before due
2 days before due
3 days before due
1 week before due
Ready to post
Copy to text
Enter
Cancel
Task assignment(s) have been emailed and cannot now be altered
Lock
Cancel
Save
Comment graphing options
Choose comments:
Comment only
Whole thread
All comments
Choose location:
To a new map
To this map
New map options
Select map ontology
Options
Standard (default) ontology
College debate ontology
Hypothesis ontology
Influence diagram ontology
Story ontology
Graph to private map
Cancel
Proceed
+Kommentare (
0
)
- Kommentare
Kommentar hinzufügen
Newest first
Oldest first
Show threads
+Verweise (
16
)
- Verweise
Hinzufügen
List by:
Citerank
Map
Link
[1]
Protecting Privacy from Arieal Surveilance
Zitieren:
Jay Stanley and Catherine Crump
Publication date:
December 2011
Zitiert von:
Lisa Martinez
11:46 PM 28 May 2016 GMT
URL:
https://www.aclu.org/files/assets/protectingprivacyfromaerialsurveillance.pdf
Link
[2]
Notice of Privacy Practices in Healthcare
Zitieren:
Ethics and Compliance Officer - Santa Clara County Valley Health System
Publication date:
January 2014
Zitiert von:
Lisa Martinez
0:16 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/0im6ryaywdw6cy5/10.%20Privacy%20Policy%20Review%20Checklist.pdf?dl=0
Link
[3]
Privacy Policy Checklist
Zitieren:
NIEM DOJ - This project was supported by Grant No. 2009-DB-BX-K105 awarded by the Bureau of Justice Assistance, Office of Justice Programs, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative and the U.S. Department of Homeland Security. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the U.S. Department of Justice or the U.S. Department of Homeland Security.
Publication date:
6 September 2011
Zitiert von:
Lisa Martinez
0:18 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/0im6ryaywdw6cy5/10.%20Privacy%20Policy%20Review%20Checklist.pdf?dl=0
Link
[4]
Seven steps to privacy, civil rights and civil liberties
Zitieren:
DOJ NIEM
Publication date:
6 September 2011
Zitiert von:
Lisa Martinez
0:20 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/gsw6q4f6ecfawvm/7%20steps%20to%20a%20privacy%2C%20civil%20rights%2C%20and%20civil%20liberties%20policy.pdf?dl=0
Link
[5]
UNGA HLM on the 25th Anniversary on CRC Dealing with teaching
Zitieren:
Georges RADJOU, BIRD CEO, MBA, DUPEBH HEAD OF DELEGATION
Publication date:
29 October 2014
Zitiert von:
Lisa Martinez
0:25 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/gz3w07xtbmdegny/UNICEF-UNGA%20HLM%2025%20ANNIVERSARY%20OF%20CRC.pdf?dl=0
Link
[6]
ACA Womens Health Infographic
Zitieren:
Health and Human Services
Publication date:
2014
Zitiert von:
Lisa Martinez
0:28 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/qj2n4yim5cww4jl/ACA-infographic-600px.jpg?dl=0
Link
[7]
IEPD Submission Niem
Zitieren:
Lisa Martinez
Publication date:
2014
Zitiert von:
Lisa Martinez
0:28 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/lh3m4o9dpn4v6bs/IEPD_Submission_NEIM.doc?dl=0
Link
[8]
Ethical Research with Children about Domestic Violence
Zitieren:
Anita Morris, Kelsey Hegarty and Cathy Humphreys
Publication date:
6 February 2012
Zitiert von:
Lisa Martinez
0:31 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/3ng9x40w34boixy/Research%20Ethics-2012-Morris-125-39.pdf?dl=0
Link
[9]
Return-On-Investment for Using Data Standards: A Case Study of New York State’s Data System
Zitieren:
Bob Davis
Publication date:
4 February 2004
Zitiert von:
Lisa Martinez
0:33 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/cdxh9yvn7965w3r/ROI4UDS.pdf?dl=0
Link
[10]
DV Funding
Zitieren:
Grant Funded By DOJ - i According to analyses done by U.S. Senator Tom Harkin (D-IA), the U.S. Office of Budget and Management., available at
http://www.harkin.sena...
’s report calculated the impact of an 8% cut; these numbers were adjusted to reflect a 5% cut. ii According to analysis done by the Department of Justice, as reported at
http://www.huffingtonp...
’s impact on victims receiving services under VAWA, and it also does not include the number of service providers who would not receive vital training to respond to domestic violence if sequestration goes into effect.
Publication date:
2013
Zitiert von:
Lisa Martinez
0:37 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/1les5wp7scrwz7k/DV_Funding_OnePager.pdf?dl=0
Link
[11]
Intro the state of global connectivity
Zitieren:
blank - No author stated, report passed from Rob as part of the financing for development objective
Publication date:
15 February 2015
Zitiert von:
Lisa Martinez
0:44 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/tkvsol0ccfbfbiz/Intro%20re%20State%20of%20Global%20Connectivity.pdf?dl=0
Link
[12]
The effect of education on cognitive ability
Zitieren:
Torberg Falch, Sofia Sandgren
Publication date:
September 2006
Zitiert von:
Lisa Martinez
0:47 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/who6iphy9sjs5q5/FULLTEXT01.pdf?dl=0
Link
[13]
NNEDV_CellPhoneLocationTracking_Tipsheet_2011
Zitieren:
Grant
Publication date:
2011
Zitiert von:
Lisa Martinez
0:49 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/i832wgma36clpmc/NNEDV_CellPhoneLocationTracking_Tipsheet_2011.pdf?dl=0
Link
[14]
NNEDV_FindingLawsToChargeForTechMisuse_2011
Zitieren:
Grant
Publication date:
2011
Zitiert von:
Lisa Martinez
0:49 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/55yvx2ossnodgf9/NNEDV_FindingLawsToChargeForTechMisuse_2011.pdf?dl=0
Link
[15]
NNEDV_Sexting_2011
Zitieren:
grant
Publication date:
2011
Zitiert von:
Lisa Martinez
0:50 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/ft1i2y5a90710me/NNEDV_Sexting_2011.pdf?dl=0
Link
[16]
Chart 2013 State Limitations on address privacy for victims
Zitieren:
Grant
Publication date:
2013
Zitiert von:
Lisa Martinez
0:51 AM 29 May 2016 GMT
URL:
https://www.dropbox.com/s/5f1e9yb4nfwo3qd/NNEDV_ACPChart_2013_statelimitationsonaddressprivacy.pdf?dl=0
+About
- About
Eingabe von:
Lisa Martinez
NodeID:
#278329
Node type:
Protagonist
Eingabedatum (GMT):
7/11/2013 1:36:00 AM
Zuletzt geändert am (GMT):
7/11/2013 1:36:00 AM
Show other editors
Eingehende Kreuzverbindungen
3
Abgehende Kreuzverbindungen
1
Durchschnittsbewertung
0
by
0
Nutzer
x
Select file to upload