Managing personal data flows to third countries.
Jo GreenfieldGraham PearcePublished in: Comput. Law Secur. Rev. (1998)
Keyphrases
- personal data
- personal information
- privacy preserving
- service providers
- data collection
- third party
- privacy protection
- data privacy
- privacy concerns
- protection mechanisms
- identity theft
- data protection
- web content
- e government
- privacy preserving data mining
- sensitive data
- information systems
- database management systems
- private information
- wireless sensor networks
- user interface
- web services
- privacy preservation