Academic Journals Database
Disseminating quality controlled scientific knowledge

Chain-computerisation and privacy Keteninformatisering en privacy

ADD TO MY LIST
 
Author(s): M. van der Veen

Journal: Journal of Chain-Computerisation
ISSN 1879-9523

Volume: 3;
Date: 2012;
Original page

Keywords: privacy | privacy by design | collection limitation | use limitation | remarks | chain-computerisation

ABSTRACT
This article is only available in Dutch1. Chain-computerisation strengthens the protection of privacy. This is one of the social benefits of practicing the theory;2. Chain-computerisation contributes to privacy by design, since privacy is a fundamental part from the early design of the information-architecture up to and including the actual processing of data;3. Chain-computerisation limits undesired exchange of information and interweaving of chains of information using data collection limitation and barriers between chains. This is done using number systems, reference indexes and verification systems;4. On the base level of a chain the positive outcomes coming from using chain-computerisation are under pressure. Possible negative effects should be mitigated.Dit artikel is alleen beschikbaar in het Nederlands1. Keteninformatisering draagt bij aan de bescherming van privacy. Het is één van de maatschappelijke effecten van toepassing van het leerstuk;2. Keteninformatisering draagt bij aan 'privacy by design'1, doordat privacy onderdeel is van het ontwerp van een informatie-infrastructuur voor de verwerking van persoonsgegevens;3. Keteninformatisering belemmert ongewenste informatie-uitwisseling en ketenvervlechting door dataminimalisatie en waterscheidingen tussen ketens met nummerstelsels, verwijsindexen en verificatieregisters;4. De positieve effecten van Keteninformatisering staan vooral op het grondvlak onder druk.This article is only available in DutchChain-computerisation and privacy1. Chain-computerisation strengthens the protection of privacy. This is one of the social benefits of practicing the theory;2. Chain-computerisation contributes to privacy by design, since privacy is a fundamental part from the early design of the information-architecture up to and including the actual processing of data;3. Chain-computerisation limits undesired exchange of information and interweaving of chains of information using data collection limitation and barriers between chains. This is done using number systems, reference indexes and verification systems;4. On the base level of a chain the positive outcomes coming from using chain-computerisation are under pressure. Possible negative effects should be mitigated.
Affiliate Program      Why do you need a reservation system?