Electronic Privacy Annotated Bibiliography
Electronic Privacy
Name
Institution Affiliation
Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth?.The Journal of Legal Studies, 42(2), 249-274.
The authors are PhD holders with several years of experience writing paper as well as practicing Law. They are able to highlight the value of having data and information privacy in all sphere of life. They offer an example of the legal profession whereby they are able to denote not only the value of electronic privacy, but the worth it comes with implementing information privacy in electronic domain. In addition, the article deduces the importance of storing data or information electronically. Moreover, challenges faced by legal industry in storing data electronically is also noted in the paper. Therefore, the above source is credible as offer literal understanding of the worthiness of electronic privacy. In addition, the article is credible because it informs the reader the importance of electronic privacy and data privacy in general.
Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of biomedical informatics, 46(3), 541-562.
The authors are very experienced individuals whose works have been published in most journals. Each of them has contributed to the diverse Information Technology and Computer Science journals around the world hence their choice proofs to be outstanding. In this article they offer a long literature review about electronic privacy. They share credible information about privacy in electronic health care records. In addition, the pose security challenges that come with implementing electronic privacy in health care record. In addition, the article informs the reader about the various solutions to challenges in electronic privacy especially in health care records. Hence, this article offers significant information on electronic privacy. The article is important for this research since it gives necessary literature in electronic privacy.
Haas, S., Wohlgemuth, S., Echizen, I., Sonehara, N., & Müller, G. (2011). Aspects of privacy for electronic health records. International journal of medical informatics, 80(2), e26-e31.
The authors who wrote this article are experienced in medical recording hence share this information to the public. They share that the medical records are centrally located in a health care setting in order to ease accessibility and availability of patients’ information. However, the article later discloses that such information is prone to various security challenges. Due to the security challenges noted, the authors propose that health care record call for privacy protection in electronic module. Despite the fact that this article is underlying issue in health care it offers a deliberate understanding that all information whether personal or industrial should be secured electronically to avoid loss of data due to security hitch. This article, is worth to be considered I the study due to its diverse literature on electronic privacy.
Lugaresi, N. (2010). Electronic privacy in the workplace: Transparency and responsibility. International Review of Law, Computers & Technology, 24(2), 163-173.
The author is a PhD holder hence has a lot of experience in computer science and technology. The article talks about the use of internet and email in the workplace changes the culture of many organizations. He states that the employees’ expectations of electronic privacy collides with employer online monitoring needs. The article also adds that despite the fact that electronic privacy policy helps in creating balance in the workplace it’s not sufficient enough to uphold the needs of information and data privacy. The aim of the article was to allude the ethical and legal issues arising from daily contrast between workplace needs and information privacy. This article is important to the study as it will add value to the research.
Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on (pp. 693-702). IEEE.
Both authors are well known individuals with vast experience in computer science and technology especially in cloud computing. This article written by them offers a clear understanding about electronic security and privacy in cloud computing. It informs the reader that electronic privacy not only incorporates data storage security but also data trust issues. The article states that electronic privacy in cloud computing is critical as it is a large scale infrastructure that hold a lot of data. Thus, the article indicates that it is important to note that electronic privacy mechanisms are no longer adequate but needs to be reevaluated to meet contemporary standards. The author also alludes that cloud computing firms should ensure the date they store is subjected to alternative electronic back up. This article is vital in the research as it provides credible information in electronic privacy in cloud computing (largest data storage infrastructure).
Robison, W. J. (2010). Free at what cost? Cloud computing privacy under the stored communications act. Georgetown Law Journal, 98(4).
The author experience in cloud computing and data privacy is a facet towards his research. The article states that the cost of data privacy in electronic sphere is of great debate. The real equation on the price or cost of electronic privacy is hitting hard the cloud computing industry. The article deduces that due to high cost of electronic privacy various individuals and companies are not part of this technological innovation. In addition, the article states that various institutions offering electronic data privacy are not considerate in cost hence monopolizing electronic privacy market. The article also depicts that as a result of the monopoly individuals are not able to secure their information electronically leading to reduced information privacy. However, the authors acknowledges that electronic privacy of information is not adequate because the frameworks needed are not all set in a proper manner. He further states that this has brought a huge gap in electronic privacy. Therefore, this article is important in this study since it build on fine details about IT and electronic privacy.
Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing. Computer Law & Security Review, 26(4), 391-397.
The authors are experts in computer legislation and security science. They contribution to information privacy has built intense pressure on electronic privacy literature. The article is a critique of electronic privacy literature. It informs the public that information or data on electronic storage is not secure and will never be secure. The article later states that cloud computing companies pose risks to information privacy. The authors second the idea that the internet is never a “safe heaven” since it is prone to various security problem. The article is a credible source because it offers critique on the already available literature creating a debate about previous research credibility. The article is important as it creates a unique overview in research.