As a product of the information age, e commerce platform not only changes peoples daily life, but also brings unprecedented impact and infection to users personal data privacy. Under the influence of various factors, the phenomenon of data privacy infringement emerges in endlessly and becomes more and more common. Strengthening the protection of data privacy has become an urgent problem to be solved. At present, China has initially established laws and systems on the protection of personal data privacy, but they are not enough to effectively deal with many problems that have emerged. There is still a lack of comprehensive and systematic legal provisions and specific and effective implementation measures in legislation, law enforcement and justice. How to further control the violation of users personal data privacy has become a new challenge we need to face. Based on the relevant laws and regulations such as the e commerce law and the civil code, this paper analyzes the value, current situation, problems and other specific contents of the personal data privacy right of the users of e commerce platform, points out the current situation of the legal protection of the rights and interests of the users of e commerce platform, and further analyzes its shortcomings, Based on this, this paper leads to the e commerce platform users personal privacy, so as to put forward countermeasures and measures, and put forward the path to improve the legal system construction. The author thinks that we should innovate the concept of data privacy protection, learn from foreign advanced experience, strengthen domestic legal protection, improve the law enforcement means and the internal governance mechanism of the platform, so as to improve the legal system of personal data privacy of e commerce platform users in China, maintain the order of e commerce platform, and promote the sustainable and healthy development of data economy. Changjun Wu | Xinru Wang "Research on Legal Protection of Personal Data Privacy of E-Commerce Platform Users" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44956.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/44956/research-on-legal-protection-of-personal-data-privacy-of-ecommerce-platform-users/changjun-wu
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...YogeshIJTSRD
In the era of big data, the contradiction between e commerce platform and consumers is becoming more and more serious with the popularization of the Internet. Consumer personal data is not protected, and the platform takes advantage of the advances in big data to capture consumer data and generate revenue. The purpose of this paper is to clarify the responsibility to protect for e commerce platforms. Inform consumers of their obligations and protect their rights and interests. Resolving data privacy disputes between e commerce platforms and consumers. For the phenomenon of consumer data leakage, the platform has no clear protection mechanism, consumers themselves in the use of the process, their own lack of protection awareness. And there are a few problems with that. The main content of this paper is to protect the rights and interests of consumers from the point of view of consumers, to improve the relevant legal provisions, to ease the contradictions between consumers and e commerce platform. To protect consumers’ data rights and interests from three aspects First, to perfect the platforms privacy protection regulations and preventive measures to avoid risks, and to minimize the risks after data leakage. Second, to enhance consumers’ awareness of protecting their own data rights and interests, we should cooperate with the data protection of e commerce platform and find an effective way when privacy data is violated. Third, from the governments point of view, monitoring the use of e commerce platform data. Protecting consumer data from a legal perspective. The platform, the consumer, the network supervises the department tripartite coordination, establishes the complete legal safeguard system, promotes the data information economy the development. Changjun Wu | Defeng Li "Research on Electronic Commerce Platform Consumer Data Rights and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44954.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/44954/research-on-electronic-commerce-platform-consumer-data-rights-and-legal-protection/changjun-wu
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsYogeshIJTSRD
With the advent of the era of big data, the utilization rate of data in business activities is getting higher and higher, and the competition is also getting bigger and bigger, and the disputes about data among operators of e commerce platform are also increasing. At present, there is a relative lack of laws and regulations on data rights and interests of e commerce platform operators in China. E commerce platform operators do not have specific and in depth clarity on data collation, collection and processing, which is not comprehensive. With the rapid development of big data in European and American countries in the 20th century, the corresponding laws and regulations and theoretical academic research also appear. China can study the similarities, which has great reference significance for the development of big data and the improvement of laws and regulations in China. This paper will investigate and study the data rights and interests of e commerce platform operators, and deeply analyze the characteristics, attributes, protection mode and basic principles of data rights and interests, especially the legal regulation of e commerce platform operators data rights and interests. Combined with the law of e commerce, the law of data security, the law of network security, the law of personal information protection and other relevant legal theories, this paper analyzes the data rights and interests of e commerce platform operators, discusses the legal protection and implementation practice of the data rights and interests, and puts forward some countermeasures to improve the legislation, law enforcement and judicial protection. For the boundary coordination between operator data and user data of e commerce platform, this paper analyzes and divides the boundary, and puts forward relevant improvement countermeasures. China needs to speed up the improvement of e commerce platform operators data rights and interests protection legislation, improve the regulation of e commerce platform operators unfair competition behavior Improve the legal regulation of data monopoly of e commerce platform operators, bring enterprise data into the adjustment scope of anti monopoly law, and investigate the legal responsibility after data monopoly The data rights of the operators of e commerce platform should be given clearly Improve the allocation of data legal liability of operators of e commerce platform. Changjun Wu | Wenyu Wei "Research on Legal Protection of Data Rights of E-Commerce Platform Operators" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44955.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/44955/research-on-legal-protection-of-data-rights-of-ecommerce-platform-operators/changjun-wu
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...Andrea Omicini
Large-scale socio-technical systems (STS) inextricably inter-connect individual – e.g., the right to privacy –, social – e.g., the effectiveness of organisational processes –, and technology issues —e.g., the software engineering process. As a result, the design of the complex software infrastructure involves also non-technological aspects such as the legal ones—so that, e.g., law-abidingness can be ensured since the early stages of the software engineering process. By focussing on contact centres (CC) as relevant examples of knowledge-intensive STS, we elaborate on the articulate aspects of anonymisation: there, individual and organisational needs clash, so that only an accurate balancing between legal and technical aspects could possibly ensure the system efficiency while preserving the individual right to privacy. We discuss first the overall legal framework, then the general theme of anonymisation in CC. Finally we overview the technical process developed in the context of the BISON project.
Project presentation @ DMI, Università di Catania, Italy, 25 July 2016
This document discusses several legal issues related to technology. It identifies data security, privacy concerns with big data, and evolving contract and licensing issues with cloud computing as significant concerns. It also notes challenges around compliance with open source licenses, liability for mobile payments, risks of social media use, regulation of virtual currencies, and responsibility for remote automation and control technologies.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
This document discusses issues around data ownership on e-commerce platforms in China. It begins by providing background on data rights regulations in China and how they are addressed across various laws. It then analyzes the current status of legislation, law enforcement, and judicial practices regarding data rights protection on e-commerce platforms. Several issues are identified in China's legal protection of data ownership, including a lack of clear entitlement norms, potential for data leakage, and unclear legal use of data rights. The document argues that China's legal system for data rights protection needs improvement and proposes developing comprehensive regulations tailored for China's e-commerce context.
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
Cédric Laurant: Presentation at the SecureWorld Web Conference: "Incident Response: Clean Up on Aisle Nine" (29 Nov. 2012)
Presentation can be downloaded at http://cedriclaurant.com/about/presentations/, http://blog.cedriclaurant.org and http://security-breaches.com.
Information governance a_necessity_in_toAnne ndolo
1) Information governance is becoming a necessity for businesses today as they operate in an environment dominated by information. IG helps businesses improve operations, compliance, risk management, and customer service.
2) Implementing IG presents challenges for businesses, including issues with roles and responsibilities, policy implementation, information security, and compliance. Flexible IG systems and automated information management can help address these challenges.
3) Measuring the effectiveness of IG policies through evaluation allows businesses to ensure objectives are met and policies remain up to date with changing needs. Flexible policies that involve employees lead to more effective long-term governance.
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...YogeshIJTSRD
In the era of big data, the contradiction between e commerce platform and consumers is becoming more and more serious with the popularization of the Internet. Consumer personal data is not protected, and the platform takes advantage of the advances in big data to capture consumer data and generate revenue. The purpose of this paper is to clarify the responsibility to protect for e commerce platforms. Inform consumers of their obligations and protect their rights and interests. Resolving data privacy disputes between e commerce platforms and consumers. For the phenomenon of consumer data leakage, the platform has no clear protection mechanism, consumers themselves in the use of the process, their own lack of protection awareness. And there are a few problems with that. The main content of this paper is to protect the rights and interests of consumers from the point of view of consumers, to improve the relevant legal provisions, to ease the contradictions between consumers and e commerce platform. To protect consumers’ data rights and interests from three aspects First, to perfect the platforms privacy protection regulations and preventive measures to avoid risks, and to minimize the risks after data leakage. Second, to enhance consumers’ awareness of protecting their own data rights and interests, we should cooperate with the data protection of e commerce platform and find an effective way when privacy data is violated. Third, from the governments point of view, monitoring the use of e commerce platform data. Protecting consumer data from a legal perspective. The platform, the consumer, the network supervises the department tripartite coordination, establishes the complete legal safeguard system, promotes the data information economy the development. Changjun Wu | Defeng Li "Research on Electronic Commerce Platform Consumer Data Rights and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44954.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/44954/research-on-electronic-commerce-platform-consumer-data-rights-and-legal-protection/changjun-wu
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsYogeshIJTSRD
With the advent of the era of big data, the utilization rate of data in business activities is getting higher and higher, and the competition is also getting bigger and bigger, and the disputes about data among operators of e commerce platform are also increasing. At present, there is a relative lack of laws and regulations on data rights and interests of e commerce platform operators in China. E commerce platform operators do not have specific and in depth clarity on data collation, collection and processing, which is not comprehensive. With the rapid development of big data in European and American countries in the 20th century, the corresponding laws and regulations and theoretical academic research also appear. China can study the similarities, which has great reference significance for the development of big data and the improvement of laws and regulations in China. This paper will investigate and study the data rights and interests of e commerce platform operators, and deeply analyze the characteristics, attributes, protection mode and basic principles of data rights and interests, especially the legal regulation of e commerce platform operators data rights and interests. Combined with the law of e commerce, the law of data security, the law of network security, the law of personal information protection and other relevant legal theories, this paper analyzes the data rights and interests of e commerce platform operators, discusses the legal protection and implementation practice of the data rights and interests, and puts forward some countermeasures to improve the legislation, law enforcement and judicial protection. For the boundary coordination between operator data and user data of e commerce platform, this paper analyzes and divides the boundary, and puts forward relevant improvement countermeasures. China needs to speed up the improvement of e commerce platform operators data rights and interests protection legislation, improve the regulation of e commerce platform operators unfair competition behavior Improve the legal regulation of data monopoly of e commerce platform operators, bring enterprise data into the adjustment scope of anti monopoly law, and investigate the legal responsibility after data monopoly The data rights of the operators of e commerce platform should be given clearly Improve the allocation of data legal liability of operators of e commerce platform. Changjun Wu | Wenyu Wei "Research on Legal Protection of Data Rights of E-Commerce Platform Operators" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44955.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/44955/research-on-legal-protection-of-data-rights-of-ecommerce-platform-operators/changjun-wu
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...Andrea Omicini
Large-scale socio-technical systems (STS) inextricably inter-connect individual – e.g., the right to privacy –, social – e.g., the effectiveness of organisational processes –, and technology issues —e.g., the software engineering process. As a result, the design of the complex software infrastructure involves also non-technological aspects such as the legal ones—so that, e.g., law-abidingness can be ensured since the early stages of the software engineering process. By focussing on contact centres (CC) as relevant examples of knowledge-intensive STS, we elaborate on the articulate aspects of anonymisation: there, individual and organisational needs clash, so that only an accurate balancing between legal and technical aspects could possibly ensure the system efficiency while preserving the individual right to privacy. We discuss first the overall legal framework, then the general theme of anonymisation in CC. Finally we overview the technical process developed in the context of the BISON project.
Project presentation @ DMI, Università di Catania, Italy, 25 July 2016
This document discusses several legal issues related to technology. It identifies data security, privacy concerns with big data, and evolving contract and licensing issues with cloud computing as significant concerns. It also notes challenges around compliance with open source licenses, liability for mobile payments, risks of social media use, regulation of virtual currencies, and responsibility for remote automation and control technologies.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
This document discusses issues around data ownership on e-commerce platforms in China. It begins by providing background on data rights regulations in China and how they are addressed across various laws. It then analyzes the current status of legislation, law enforcement, and judicial practices regarding data rights protection on e-commerce platforms. Several issues are identified in China's legal protection of data ownership, including a lack of clear entitlement norms, potential for data leakage, and unclear legal use of data rights. The document argues that China's legal system for data rights protection needs improvement and proposes developing comprehensive regulations tailored for China's e-commerce context.
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
Cédric Laurant: Presentation at the SecureWorld Web Conference: "Incident Response: Clean Up on Aisle Nine" (29 Nov. 2012)
Presentation can be downloaded at http://cedriclaurant.com/about/presentations/, http://blog.cedriclaurant.org and http://security-breaches.com.
Information governance a_necessity_in_toAnne ndolo
1) Information governance is becoming a necessity for businesses today as they operate in an environment dominated by information. IG helps businesses improve operations, compliance, risk management, and customer service.
2) Implementing IG presents challenges for businesses, including issues with roles and responsibilities, policy implementation, information security, and compliance. Flexible IG systems and automated information management can help address these challenges.
3) Measuring the effectiveness of IG policies through evaluation allows businesses to ensure objectives are met and policies remain up to date with changing needs. Flexible policies that involve employees lead to more effective long-term governance.
This document discusses extending the Technology Acceptance Model (TAM) to better explain consumer adoption of e-shopping in Turkey. The extended model adds factors like perceived trust, enjoyment, information quality, system quality and service quality to the core TAM constructs of perceived usefulness and ease of use. The extended model is tested using survey data from 606 Turkish internet users. The results support the original TAM findings but also show the added external factors help explain e-shopping adoption. Security concerns were a major reason cited by Turkish consumers for not engaging in e-shopping.
Lessons for interoperability remedies from UK Open Bankingblogzilla
The UK’s Open Banking programme is a world-leading experiment in requiring banks to open up customer accounts (with their explicit consent) to third-party providers. What lessons can be learnt from this case for legislation that would require dominant platforms to provide similar functionality?
This document summarizes research on the adoption of e-procurement in Hong Kong. It begins by defining e-procurement and describing how it is changing procurement practices. It then reviews literature on the benefits of e-procurement such as reduced costs and increased efficiency. The document presents results from the authors' empirical study on the critical success factors and barriers to adopting e-procurement in Hong Kong. It finds that educating companies on both long and short-term benefits can encourage adoption. Critical success factors include financial support, compatibility with existing systems, management support, understanding company priorities, and security systems. The framework developed from this study can help other countries implement successful e-procurement policies and strategies.
Ethics of Computing in Pharmaceutical ResearchAshwani Dhingra
Computing ethics is a set of moral principles that regulate the use of computers. In pharmaceutical research computers, computing technology, and consequent information system has produced ethical challenges and conflicts.
This document discusses Google's collection and use of personal data through its various products and services. While Google claims to "do no evil", its vast data processing raises legal and ethical concerns regarding individual privacy and rights. States have struggled to regulate corporations like Google to balance privacy protections with allowing for innovation. The author aims to analyze different regulatory models and how states and regional regimes have addressed issues around personal data protection during processing by large technology companies.
Protecting Patient Health Information in the HITECH EraRapid7
The document discusses how the HITECH Act strengthened enforcement of HIPAA regulations regarding the privacy and security of patient health information. It established much higher penalties for non-compliance in an effort to incentivize healthcare providers to improve practices for protecting electronic personal health records. The HITECH Act also expanded the scope of HIPAA to cover business associates of healthcare organizations and allow state attorneys general to pursue legal action on behalf of individuals affected by privacy or security violations. Overall, the legislation aims to increase adoption of health information technology while maintaining patient trust through more rigorous auditing and enforcement of standards for securing electronic patient data.
The document provides an overview of ethics, legislation, and privacy issues related to big data. It discusses the necessity of regulating big data and the differences between privacy and data protection. It also provides details on the General Data Protection Regulation (GDPR), including its goals, requirements for companies, and individual rights it aims to protect.
The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...IJMIT JOURNAL
Today e-commerce has become crucial element to transform some of the world countries into an information society. Business to consumer (B2C) in the developing countries is not yet a normalcy as compared to the developed countries. Consumer behaviour research has shown disappointing results regarding the overall use of the Web for online shopping, despite its considerable promise as a channel for commerce. As the use of the Internet continues to grow in all aspects of daily life, there is an increasing need to better understand what trends of internet usage and to study the barriers and problem of ecommerce adoption. Hence, the purpose of this research is to define how far Technology Acceptance Model (TAM) contributed in e-commerce adoption. Data for this study was collected by the means of a survey conducted in Malaysia in 2010. A total of 611 questionnaire forms were delivered to respondents. The location of respondents was within Penang state. By studying this sample, conclusions would be drawn to generalize the interests of the population.
Trust in E-Business based on Website Quality, Brand Name, and Security and Pr...IRJET Journal
This document summarizes a research study that examined factors influencing consumer trust in e-business and online shopping. The study used a survey questionnaire to collect data from internet users on how website quality, brand name, security, and privacy policies affect consumer trust.
The study found that consumers' belief in online vendors and the presence of security/privacy regulations positively impact consumer trust in online shopping. Additionally, greater consumer web experience is correlated with higher perceived trust. However, protecting privacy, exposure to familiar brands, website quality, and customization did not have significant effects on consumer trust.
Relationship between data protection and m&a (1)Ashish vishal
Ricky chopra is one of the best lawyer in Mumbai, he has good knowledge of law. he has experience and he know how to handle case, it may help you to find out way in any legal issue, He is serving for more than three and a half decades. https://www.rickychopra.co/
Data protection for Lend.io - legal analysis by Bird and BirdCoadec
New EU data protection rules are coming, with the General Data Protection Regulation likely to be agreed in the next few months. It will have a massive impact on digital businesses
To bring this rather dry subject to life, Coadec working together with techUK has commissioned a leading data protection law firm to look at what current drafts of the new law would mean for a fintech startup we invented, Lend.io.
According to Analysts, the Higher Education sector is the most breached of any industry. This white paper outlines key reasons why universities are more affected by security issues and how they can better prepare themselves to address IT security and vulnerability management challenges.
Rapid7 Report: Data Breaches in the Government SectorRapid7
Rapid7, the leading provider of security risk intelligence solutions, analyzed data collected and categorized by the Privacy Rights Clearinghouse Chronology of Data Breaches. Using this data, the company outlined patterns for government data breaches, including year, month, location and breach type patterns. This information and tips for protecting infrastructure can ensure that government IT environments stay protected against malicious attacks and unintended disclosure.
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
The document summarizes an IBM breakfast briefing on data protection, security, and regulatory updates. The briefing covered the changing EU General Data Protection Regulations and implications for organizations, including increased fines for noncompliance. It also discussed privacy rights for individuals, such as the "right to be forgotten" and access to their own data. The briefing addressed how analytics can help adhere to new rules and regulations.
1. The document discusses the legal implications for foreign data center providers moving data centers or servers to Romania. It notes that Romanian data protection law may apply if equipment processing personal data is located in Romania.
2. It provides recommendations for determining whether Romanian law applies, noting that for EU controllers the law of the country where they are established would apply, while for non-EU controllers Romanian law would govern.
3. The document also discusses how the rules differ if a foreign provider is a data processor rather than a controller, with the main point being they would need to comply indirectly with Romanian law if their customer is a Romanian controller.
Big data is generated from various sources producing huge volumes of data every minute, including blog posts, YouTube videos, searches, and social media activity. Big data can provide businesses several benefits like instant insights, improved analytics, vast data management, and better decision making. It allows understanding customers better, reducing costs, and increasing operating margins. Big data has applications in many industries like banking for fraud detection, healthcare for personalized medicine, retail for inventory optimization, and transportation for traffic control. Government uses it for claims processing and insurance uses it for customer insights, pricing, and fraud detection.
The document discusses the GDPR requirements for data masking and pseudonymization. It provides context on the GDPR and how it aims to update privacy laws for a modern, digital world. The GDPR introduces legal definitions for pseudonymization, which refers to approaches like data masking that secure personal data in a way that indirect identities are still protected. It highlights how data masking technologies can help companies comply with the GDPR while maintaining data quality for analysis. Companies that fail to implement appropriate measures like pseudonymization could face fines up to 4% of global turnover under the GDPR.
E-marketing is a process of planning and executing the conception, distribution, promotion, and pricing of products and services in a computerized, networked environment, such as the Internet and the World Wide Web, to facilitate exchanges and satisfy customer demands.
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCEVARUN KESAVAN
This is the era of data revolution. Data is being traded as a commodity and has even been dubbed "the new oil". Almost 2.5 quintillion bytes of data are created daily, and that number is only going up. With this rapid proliferation of data, instances of data misuse are rising. Instant information sharing has both saved and endangered lives. These polar opposite outcomes have sparked debate on data management and governance, with many seeing regulation as a threat to business.
For example, Facebook's recent data breach, if found to violate the EU General Data Protection Regulation (GDPR), could cost them 4% of their global revenue (or $1.63 billion) in fines. This resonated as a warning shot to enterprises across the globe. As concerns grow, it will serve enterprises well to remember how valuable consumer trust is to them. That is precisely why the threat of punitive action could, in fact, be enterprises' biggest ally in this data revolution.
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
This survey examines accountability, trust, consent, tracking, security and privacy mechanisms used by online service providers. It analyzed these features at various private and public organizations through anonymous online surveys and desk research. While practices vary, some trends emerged. Many organizations lack coherent privacy strategies and request guidance on privacy impact assessments. Commercial companies aim to balance privacy and marketing goals, but assurance of long-term anonymous data storage needs improvement. Overall more awareness of privacy concepts is needed to maintain user trust in EU online services.
This document discusses electronic commerce (e-commerce), including its definition, history, types, processes, advantages, disadvantages, and laws governing it. Some key points:
- E-commerce involves buying and selling of goods/services over electronic networks like the internet. It facilitates online transactions including marketing, sales, delivery, and payments.
- Early forms of e-commerce included EDI in the 1960s. Amazon was one of the first major online retailers in the 1990s.
- The UNCITRAL Model Law on e-commerce from 1997 provides guidelines to regulate e-commerce and promote uniformity across jurisdictions. The Indian IT Act of 2000 was based on this.
- E-
This document discusses extending the Technology Acceptance Model (TAM) to better explain consumer adoption of e-shopping in Turkey. The extended model adds factors like perceived trust, enjoyment, information quality, system quality and service quality to the core TAM constructs of perceived usefulness and ease of use. The extended model is tested using survey data from 606 Turkish internet users. The results support the original TAM findings but also show the added external factors help explain e-shopping adoption. Security concerns were a major reason cited by Turkish consumers for not engaging in e-shopping.
Lessons for interoperability remedies from UK Open Bankingblogzilla
The UK’s Open Banking programme is a world-leading experiment in requiring banks to open up customer accounts (with their explicit consent) to third-party providers. What lessons can be learnt from this case for legislation that would require dominant platforms to provide similar functionality?
This document summarizes research on the adoption of e-procurement in Hong Kong. It begins by defining e-procurement and describing how it is changing procurement practices. It then reviews literature on the benefits of e-procurement such as reduced costs and increased efficiency. The document presents results from the authors' empirical study on the critical success factors and barriers to adopting e-procurement in Hong Kong. It finds that educating companies on both long and short-term benefits can encourage adoption. Critical success factors include financial support, compatibility with existing systems, management support, understanding company priorities, and security systems. The framework developed from this study can help other countries implement successful e-procurement policies and strategies.
Ethics of Computing in Pharmaceutical ResearchAshwani Dhingra
Computing ethics is a set of moral principles that regulate the use of computers. In pharmaceutical research computers, computing technology, and consequent information system has produced ethical challenges and conflicts.
This document discusses Google's collection and use of personal data through its various products and services. While Google claims to "do no evil", its vast data processing raises legal and ethical concerns regarding individual privacy and rights. States have struggled to regulate corporations like Google to balance privacy protections with allowing for innovation. The author aims to analyze different regulatory models and how states and regional regimes have addressed issues around personal data protection during processing by large technology companies.
Protecting Patient Health Information in the HITECH EraRapid7
The document discusses how the HITECH Act strengthened enforcement of HIPAA regulations regarding the privacy and security of patient health information. It established much higher penalties for non-compliance in an effort to incentivize healthcare providers to improve practices for protecting electronic personal health records. The HITECH Act also expanded the scope of HIPAA to cover business associates of healthcare organizations and allow state attorneys general to pursue legal action on behalf of individuals affected by privacy or security violations. Overall, the legislation aims to increase adoption of health information technology while maintaining patient trust through more rigorous auditing and enforcement of standards for securing electronic patient data.
The document provides an overview of ethics, legislation, and privacy issues related to big data. It discusses the necessity of regulating big data and the differences between privacy and data protection. It also provides details on the General Data Protection Regulation (GDPR), including its goals, requirements for companies, and individual rights it aims to protect.
The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Ap...IJMIT JOURNAL
Today e-commerce has become crucial element to transform some of the world countries into an information society. Business to consumer (B2C) in the developing countries is not yet a normalcy as compared to the developed countries. Consumer behaviour research has shown disappointing results regarding the overall use of the Web for online shopping, despite its considerable promise as a channel for commerce. As the use of the Internet continues to grow in all aspects of daily life, there is an increasing need to better understand what trends of internet usage and to study the barriers and problem of ecommerce adoption. Hence, the purpose of this research is to define how far Technology Acceptance Model (TAM) contributed in e-commerce adoption. Data for this study was collected by the means of a survey conducted in Malaysia in 2010. A total of 611 questionnaire forms were delivered to respondents. The location of respondents was within Penang state. By studying this sample, conclusions would be drawn to generalize the interests of the population.
Trust in E-Business based on Website Quality, Brand Name, and Security and Pr...IRJET Journal
This document summarizes a research study that examined factors influencing consumer trust in e-business and online shopping. The study used a survey questionnaire to collect data from internet users on how website quality, brand name, security, and privacy policies affect consumer trust.
The study found that consumers' belief in online vendors and the presence of security/privacy regulations positively impact consumer trust in online shopping. Additionally, greater consumer web experience is correlated with higher perceived trust. However, protecting privacy, exposure to familiar brands, website quality, and customization did not have significant effects on consumer trust.
Relationship between data protection and m&a (1)Ashish vishal
Ricky chopra is one of the best lawyer in Mumbai, he has good knowledge of law. he has experience and he know how to handle case, it may help you to find out way in any legal issue, He is serving for more than three and a half decades. https://www.rickychopra.co/
Data protection for Lend.io - legal analysis by Bird and BirdCoadec
New EU data protection rules are coming, with the General Data Protection Regulation likely to be agreed in the next few months. It will have a massive impact on digital businesses
To bring this rather dry subject to life, Coadec working together with techUK has commissioned a leading data protection law firm to look at what current drafts of the new law would mean for a fintech startup we invented, Lend.io.
According to Analysts, the Higher Education sector is the most breached of any industry. This white paper outlines key reasons why universities are more affected by security issues and how they can better prepare themselves to address IT security and vulnerability management challenges.
Rapid7 Report: Data Breaches in the Government SectorRapid7
Rapid7, the leading provider of security risk intelligence solutions, analyzed data collected and categorized by the Privacy Rights Clearinghouse Chronology of Data Breaches. Using this data, the company outlined patterns for government data breaches, including year, month, location and breach type patterns. This information and tips for protecting infrastructure can ensure that government IT environments stay protected against malicious attacks and unintended disclosure.
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
The document summarizes an IBM breakfast briefing on data protection, security, and regulatory updates. The briefing covered the changing EU General Data Protection Regulations and implications for organizations, including increased fines for noncompliance. It also discussed privacy rights for individuals, such as the "right to be forgotten" and access to their own data. The briefing addressed how analytics can help adhere to new rules and regulations.
1. The document discusses the legal implications for foreign data center providers moving data centers or servers to Romania. It notes that Romanian data protection law may apply if equipment processing personal data is located in Romania.
2. It provides recommendations for determining whether Romanian law applies, noting that for EU controllers the law of the country where they are established would apply, while for non-EU controllers Romanian law would govern.
3. The document also discusses how the rules differ if a foreign provider is a data processor rather than a controller, with the main point being they would need to comply indirectly with Romanian law if their customer is a Romanian controller.
Big data is generated from various sources producing huge volumes of data every minute, including blog posts, YouTube videos, searches, and social media activity. Big data can provide businesses several benefits like instant insights, improved analytics, vast data management, and better decision making. It allows understanding customers better, reducing costs, and increasing operating margins. Big data has applications in many industries like banking for fraud detection, healthcare for personalized medicine, retail for inventory optimization, and transportation for traffic control. Government uses it for claims processing and insurance uses it for customer insights, pricing, and fraud detection.
The document discusses the GDPR requirements for data masking and pseudonymization. It provides context on the GDPR and how it aims to update privacy laws for a modern, digital world. The GDPR introduces legal definitions for pseudonymization, which refers to approaches like data masking that secure personal data in a way that indirect identities are still protected. It highlights how data masking technologies can help companies comply with the GDPR while maintaining data quality for analysis. Companies that fail to implement appropriate measures like pseudonymization could face fines up to 4% of global turnover under the GDPR.
E-marketing is a process of planning and executing the conception, distribution, promotion, and pricing of products and services in a computerized, networked environment, such as the Internet and the World Wide Web, to facilitate exchanges and satisfy customer demands.
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCEVARUN KESAVAN
This is the era of data revolution. Data is being traded as a commodity and has even been dubbed "the new oil". Almost 2.5 quintillion bytes of data are created daily, and that number is only going up. With this rapid proliferation of data, instances of data misuse are rising. Instant information sharing has both saved and endangered lives. These polar opposite outcomes have sparked debate on data management and governance, with many seeing regulation as a threat to business.
For example, Facebook's recent data breach, if found to violate the EU General Data Protection Regulation (GDPR), could cost them 4% of their global revenue (or $1.63 billion) in fines. This resonated as a warning shot to enterprises across the globe. As concerns grow, it will serve enterprises well to remember how valuable consumer trust is to them. That is precisely why the threat of punitive action could, in fact, be enterprises' biggest ally in this data revolution.
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
This survey examines accountability, trust, consent, tracking, security and privacy mechanisms used by online service providers. It analyzed these features at various private and public organizations through anonymous online surveys and desk research. While practices vary, some trends emerged. Many organizations lack coherent privacy strategies and request guidance on privacy impact assessments. Commercial companies aim to balance privacy and marketing goals, but assurance of long-term anonymous data storage needs improvement. Overall more awareness of privacy concepts is needed to maintain user trust in EU online services.
This document discusses electronic commerce (e-commerce), including its definition, history, types, processes, advantages, disadvantages, and laws governing it. Some key points:
- E-commerce involves buying and selling of goods/services over electronic networks like the internet. It facilitates online transactions including marketing, sales, delivery, and payments.
- Early forms of e-commerce included EDI in the 1960s. Amazon was one of the first major online retailers in the 1990s.
- The UNCITRAL Model Law on e-commerce from 1997 provides guidelines to regulate e-commerce and promote uniformity across jurisdictions. The Indian IT Act of 2000 was based on this.
- E-
an analysis of the personal and property security obligations and correspondi...ijtsrd
As a new law, the Electronic Commerce Law has attracted the attention of the public since its inception. The legislative process concerning the second paragraph of Article 38 of this law has triggered heated discussions. The original joint liability has been changed to supplementary liability. In the end, it was changed to corresponding responsibilities. After many revisions and evaluations, the legislator finally determined it as the existing clause. This is an innovative and highly compromised product established by many parties after several trade offs. Its formulation has a major impact on the construction of the current e commerce platform and has great research value. In this article, the author tries to analyze this article by layer. First, starting from the subject of the corresponding liability , analyze the objects regulated by the law e commerce platform operators, and the objects of its protection damaged consumers. The second is to analyze the content of the regulations. First, it analyzes the concept, origin and standards of the personal safety guarantee obligations stipulated by the law, as well as the specific circumstances in which they are applied then, analyzes the corresponding responsibilities that violate the security obligations. Concepts and origins, and conduct a comparative analysis of the applicable content and applicable methods of the associated joint and several liabilities and supplementary liabilities, and further analyze the applicable conditions of the corresponding responsibility , and select typical cases related to the corresponding responsibility for research , To determine its impact on the e commerce platform. Finally, it analyzes related existing cases and discusses the problems arising from the practical operation of judicial trials from three aspects legislation, law enforcement, and justice system design construction and improvement of corresponding responsibilities legal system plan And system law enforcement mechanism and proposed to optimize the corresponding responsibility judicial application system, and finally put forward suggestions on the improvement of the corresponding responsibility system. Changjun Wu | Yaoting Cheng "An Analysis of the Personal and Property Security Obligations and "Corresponding Responsibilities" of E-Commerce Platform Operators" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32982.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32982/an-analysis-of-the-personal-and-property-security-obligations-and-corresponding-responsibilities-of-ecommerce-platform-operators/changjun-wu
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
This document summarizes 20 research papers on the topics of IoT, big data, and AI applications in law enforcement and the legal system. It begins with an abstract that overviews how these emerging technologies are transforming the legal system in unprecedented ways. The document then reviews the literature on these topics, analyzing their applications in areas like litigation, data privacy, cybersecurity, and the development of legal expert systems. Overall, the document aims to explore how IoT, big data, and AI are being used in the legal system and their impact on legal proceedings.
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
This document summarizes 20 research papers on the topics of IoT, big data, and AI applications in law enforcement and the legal system. It begins with an abstract that introduces the purpose of reviewing literature on how these technologies are transforming the legal system. The document then provides a detailed literature review process and analyzes the contributions and key findings of each paper. It concludes by identifying trends and opportunities, as well as areas for future research.
How does the data protection reform strengthen citizens rights? - Mark - Fullbright
The document summarizes proposed reforms to strengthen data protection for EU citizens. It notes that a 2011 security breach compromised personal data of 77 million customers, and it took a week for the company to notify customers. It argues individuals need more protection as new technologies have changed how people share data online. The proposed reforms would ensure individuals receive clear information about how their data is used and require explicit consent when needed. It would also guarantee access to personal data and make it easier to transfer data between service providers. The reforms aim to increase trust in online services so individuals can benefit from new technologies and an internal market while having robust data protection.
New criminal laws— Future of criminal justice system in Indiaaakash malhotra
The three new criminal laws, the Bharatiya Nyaya Sanhita, the Bharatiya Nagarik Suraksha Sanhita, and the Bharatiya Sakshya Adhiniyam, which replace the Indian Penal Code (IPC), the Code of Criminal Procedure (CrPC), and the Indian Evidence Act respectively, will come into force from 1 July this year
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
The document describes an Intelligent Policies Analysis Mechanism (IPAM) that is part of the ADVOCATE framework. IPAM uses machine learning methods like Fuzzy Cognitive Maps and Extreme Learning Machines to identify potentially conflicting rules or consents from a user that could lead to personal data collection and profiling without consent. The framework aims to help users maintain control over their personal data as required by GDPR regulations. IPAM simulates how smart devices collect personal data and identifies rules that may enable profiling, training on example data to learn how to detect such instances.
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...IJMIT JOURNAL
Electronic businesses are witnessing enormous growth as more and more people are switching to online platforms. The widespread use of Internet has opened new channels to operate trade for many businesses. Also electronic marketing has become a proven channel of passing on the word to the customers. Legal and ethical issues quickly become an area of concern. In this research recommendations are made to harmonize IT and Internet Laws. A novel approach is proposed to promote legal risk management culture in organizations. It begins with revising current state of regulations surrounding e-Businesses and electronic marketing. The proposed approach offers risk management by considering risk mitigation strategy, educating people and use of information technology. Monitoring compliance requirements are met by reviewing the latest changes in regulations and rewarding the employees who ensures the successful implementation of the strategy.
For today’s digital businesses, being prepared to meet new compliance requirements when storing and managing consumer data will not only minimize risk, but also enable more valued and trusted customer experiences that drive increased loyalty, engagement and revenue. To gain better perspective on this important issue, it’s important to understand:
- The trends driving governmental regulatory shifts and the basic tenets of these new laws
- The challenges faced by executives across the enterprise when managing privacy compliance for consumer data
- The emergence of cloud-based solutions that help businesses manage privacy compliance by acting as end-to-end customer data storage and management solutions that are far more scalable and flexible than legacy systems
This document summarizes a research study about customer perceptions of ethics in online retailing. The study was conducted in Trinidad and Tobago and examined how factors like security, reliability, and trust influence customer perceptions of an online retailer's ethics. The researchers developed a model to evaluate these perceptions and their relationship to customer loyalty. They found that issues of security and reliability were most important to customers' views of a site's ethics. The study also provided empirical support that positive customer perceptions of a retailer's ethics are directly linked to greater customer loyalty. This research aims to provide useful insights for online retailers seeking to appeal to Caribbean customers.
Critical Analysis of Technology Law in India with Reference to Foreign Mechanismijtsrd
During the past few decades, we have witness some of the most exponential growth in our field of technology, whether it is a matter of law, social framework, economic or any other manner in which it has intersected various disciplines. Starting from the UN General Assembly Resolution leading to the approval of the Information Technology Act, further leading to the enactment of the Modern Electronic Trade Law. In reference to which we observed that how the right to privacy modified by the growth of information technology, and after which the technology has changed its contents for the protection of their legal interests. In this technologically evolved world, data is the new currency. As India, has no comprehensive data protection legislation and privacy legislation. The existing policies and laws are, in essence, sectoral in nature. These Sectoral Laws pertain to the IT Law, 2000. It is also observed that how the amendment to the Information Technology Act which entered into force in February 2009 with the presidential assent, has made a crucial impact in India in reference to the IT Laws, stated that information confidentiality constitutes as a part of our privacy right and stated that confidentiality included the right to preserve the personal identify. Jyotirmoy Banerjee | Pooja Banerjee "Critical Analysis of Technology Law in India with Reference to Foreign Mechanism" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49462.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/other/49462/critical-analysis-of-technology-law-in-india-with-reference-to-foreign-mechanism/jyotirmoy-banerjee
Defragmentation of indian legal cases withijfcstjournal
The main aim of this research paper is to develop a rule based knowledge database for legal expert system
for consumer protection act, a domain within the Indian legal system which is often in demand. A
knowledge database developed here will further help the legal expert system to determine type of case with
respect to the Indian Judicial System. In this paper a rule based knowledge database will be developed to
determine the type of the case. The main aim of the study is to build a prototype which will rule based in
nature. The rule based knowledge database development is the first phase in the development of
comprehensive rule based legal expert system for consumer protection act which will be of great help in
process of solving consumer related cases.
ONLINE LEGAL SERVICE: THE PRESENT AND FUTUREijcsit
To find a lawyer becomes a headache for business organization or general people. Sometimes people face many difficulties to find proper lawyer as their requirements, because of information gap. In addition, it is also difficult to find experienced lawyer. Usually, in order to hire a lawyer people need to meet him physically which is time-consuming and expensive. The delivery of legal services remains largely fragmented, outdated, and inefficient.The main purpose of this paper is to do empirical research about how the Internet is currently failing laypeople who are searching online for the legal help to their life problems and what a future agenda of user-centered standards and practices for better legal help on the Internet could be. It initially looks at the existing literature about how the Internet can best be used as legal asset and the situation quo of lawful help websites. Then it metering and looks at negative client reports and Investigates of legal help websites. Finally, it presents the primary study of how people search for resources to solve a legal problem, how they scorn and counts legal aid services online, and their recompose on which existing lawful help websites they consider to be the most usable, the most faithful, and the most valued. This data is necessary to propose new best exercises about how these tech-based services can best serve people, in terms of usability, characteristic of service, and safeguard of the users' interests. It also ensures the importance of the Internet as a lawful help service and highlights the need for more experiment and development on better online legal service help websites that fit general people needs and preferences.
To find a lawyer becomes a headache for business organization or general people. Sometimes people face many difficulties to find proper lawyer as their requirements, because of information gap. In addition, it is also difficult to find experienced lawyer. Usually, in order to hire a lawyer people need to meet him physically which is time-consuming and expensive. The delivery of legal services remains largely fragmented, outdated, and inefficient.The main purpose of this paper is to do empirical research about how the Internet is currently failing laypeople who are searching online for the legal help to their life problems and what a future agenda of user-centered standards and practices for better legal help on the Internet could be. It initially looks at the existing literature about how the Internet can best be used as legal asset and the situation quo of lawful help websites. Then it metering and looks at negative client reports and Investigates of legal help websites. Finally, it presents the primary study of how people search for resources to solve a legal problem, how they scorn and counts legal aid services online, and their recompose on which existing lawful help websites they consider to be the most usable, the most faithful, and the most valued. This data is necessary to propose new best exercises about how these tech-based services can best serve people, in terms of usability, characteristic of service, and safeguard of the users' interests. It also ensures the importance of the Internet as a lawful help service and highlights the need for more experiment and development on better online legal service help websites that fit general people needs and preferences
Data protection is all about respecting an
individual’s right to privacy and the new data
protection regulations, currently going
through final review by the European
parliament, will provide organizations with
the momentum they need to manage their
data more effectively. But what do you need
to do in order to ensure your organization
complies with data protection legislation
while increasing customer satisfaction?
The document discusses several key issues regarding ethics in electronic marketing:
1) It addresses legal and ethical concerns around topics like intellectual property ownership, data collection and use, and protecting children online.
2) It also examines issues around fraud, privacy, and how marketing practices can be regulated through self-regulation, government regulation, or a combination.
3) Finally, it outlines specific ethical guidelines and legal frameworks around protecting consumers, sellers, and digital property like copyrights, trademarks and patents in an online context.
Current State of Personal Data Protection in Electronic Voting: Criteria and ...TELKOMNIKA JOURNAL
The document discusses personal data protection in electronic voting in Indonesia. It provides background on legal regulations related to personal data protection and issues with previous elections. It also discusses criteria and indicators for effective implementation of electronic voting, including robustness against fraud, consistency, security, privacy measures, and transparency. The document calls for simplified legal requirements and new technical solutions to design effective personal data protection in electronic voting.
This document provides an overview of cosmetic science, summarizing different types of cosmetics including skin, hair, face, eye, and nail cosmetics. It describes key ingredients and formulations for different cosmetic products like moisturizers, cleansers, hair conditioners, mascara, lipstick, and nail polish. The document also discusses trends in cosmetic use throughout history and how cosmetics help beautify and care for skin, hair, nails, and facial features.
Standardization and Formulations of Calotropis ProceraYogeshIJTSRD
Plants growing in arid regions have elicited increased attention, because the hostile environment, in which these plants survive, forces them to develop chemical protective systems through adaptation which is rarely found in vegetation of other ecosystems. Furthermore, many of the plants grow in areas, where the dependence on traditional, plant based medicines over industrially produced pharmaceuticals persists to this day. The two plants, Calotopris Procera giant milkweed, also named C. Persica and Calotropis gigantea crown ower , have been used widely in traditional medicine in North Africa, the Middle East, and South and South East Asia. This has led to extensive research on the chemical constituents of the plants. Both plants are known to be sources of cardenolides, and newer research has yielded a number of interesting cancer active constituents. In addition, extracts of both plants have remarkable nematocidal, molluscidal and insecticidal activities. In many regions, the wood of Calotropis plants has been used as a building material and as a source of fuel. In addition, certain parts of the plants have been used as feed for livestock. In other regions, Calotropis plants are seen as invasive species that threaten local plant life and that due to their toxicity also pose a threat to grazing eld animals. Jaffar Khan | Pankaj Chasta | Dr. Gaurav Kumar Sharma | Dr. Kaushal Kishore Chandrul "Standardization and Formulations of Calotropis Procera" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45145.pdf Paper URL: https://www.ijtsrd.com/pharmacy/other/45145/standardization-and-formulations-of-calotropis-procera/jaffar-khan
Review of the Diagnosis and Treatment of ParalysisYogeshIJTSRD
Paralysis is a complete loss of motor power in any muscle group. When paralysis affects all four extremities, it is called quadriplegia when it affects only the lower extremities, paraplegia and when it affects the extremities on one side of the body, hemiplegic. For this reason, the term paralysis is generally reserved for more focal, less stereotyped weakness, for instance, affecting all the muscles innervated by a peripheral nerve. Many different anatomical lesions and etiologies can cause paralysis and determine its treatment. Bikash Debsingha | Dr. Gourav Kr. Sharma | Dr. Kausal Kishore Chandrul "Review of the Diagnosis and Treatment of Paralysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45108.pdf Paper URL: https://www.ijtsrd.com/pharmacy/pharmacology-/45108/review-of-the-diagnosis-and-treatment-of-paralysis/bikash-debsingha
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...YogeshIJTSRD
Cooling towers make use of evaporation whereby some of the water is evaporated into a moving air stream and subsequently discharged into the atmosphere which results in cooling of the remainder water. The current research reviews various studies conducted on cooling tower using experimental and numerical techniques. Different design configuration and operating conditions on cooling towers are evaluated by various researchers. Significant findings from researches have shown new and improved design of cooling tower with much better performance as compared to conventional design. Neetish Kumar Sao | Dr. Surendra K. Dwivedi "Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods: A Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45100.pdf Paper URL: https://www.ijtsrd.com/engineering/mechanical-engineering/45100/comparative-analysis-of-forced-draft-cooling-tower-using-two-design-methods-a-review/neetish-kumar-sao
Criminology Educators Triumphs and StrugglesYogeshIJTSRD
This document summarizes a research study about the triumphs and struggles of criminology educators in the Philippines. It finds that most respondents enjoy seeing their students succeed but find grading and dealing with difficult students stressful. Financially, only one respondent felt stable while others said their salaries were just enough to get by. Respondents did not initially intend to become teachers but stayed for reasons like family and valuing the teaching profession. While teaching had rewards, low salaries and qualifications impacted job satisfaction for some. Overall, the study provides insights into criminology educators' experiences in the Philippines.
A Review Herbal Drugs Used in Skin DisorderYogeshIJTSRD
The human bodys skin is an organ that allows it to interact with the environment while also shielding it from harmful external influences. People of all ages suffer from skin diseases all over the world. Its vital to keep your skin in good form for a healthy physique. Plants have been employed in some form or another since the beginning of time. This research has highlighted some prevalent skin disease issues, as well as the herbals utilized in disease therapy and the various formulations accessible in the pharmaceutical industry. Some medicinal plants have been shown to be quite effective in removing or reducing skin infection disorders. Chandramita Borah | Dr. Gaurav Kumar Sharma | Dr. Kaushal Kishore Chandrul "A Review: Herbal Drugs Used in Skin Disorder" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45118.pdf Paper URL: https://www.ijtsrd.com/pharmacy/other/45118/a-review-herbal-drugs-used-in-skin-disorder/chandramita-borah
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...YogeshIJTSRD
The aim of information retrieval systems is to retrieve relevant information according to the query provided. The queries are often vague and uncertain. Thus, to improve the system, we propose an Automatic Query Expansion technique, to expand the query by adding new terms to the user s initial query so as to minimize query mismatch and thereby improving retrieval performance. Most of the existing techniques for expanding queries do not take into account the degree of semantic relationship among words. In this paper, the query is expanded by exploring terms which are semantically similar to the initial query terms as well as considering the degree of relationship, that is, “fuzzy membership- between them. The terms which seemed most relevant are used in expanded query and improve the information retrieval process. The experiments conducted on the queries set show that the proposed Automatic query expansion approach gave a higher precision, recall, and F measure then non fuzzy edge weights. Tarun Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectivity Measures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45074.pdf Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/45074/automatic-query-expansion-using-word-embedding-based-on-fuzzy-graph-connectivity-measures/tarun-goyal
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...YogeshIJTSRD
This paper proposes a Smartphone based system for the detection of drowsiness in automotive drivers. The proposed system uses three stage drowsiness detection technique. The first stage uses the percentage of eyelid closure PERCLOS which is obtained by capturing images with the front camera of the Smartphone with a modified eye state classification method. The system uses near infrared lighting for illuminating the face of the driver during night driving. The second step uses the voiced to the unvoiced ratio VUR obtained from the speech data from the microphone, in the event PERCLOS crosses the threshold. The VUR is also compared with a threshold and if it is a value greater than that of the threshold, it moves on to the next verification stage. In the final verification stage, touch response is required within the stipulated time to declare whether the driver is drowsy or not and subsequently sound an alarm. To awake the driver, a vibrating mechanism is done and also the live GPS location is also sent to an emergency contact. We have studied eight other reference papers for the literature review. The system has three advantages over existing drowsiness detection systems. First, the three stage verification process makes the system more reliable. The second advantage is its implementation on an Android smart phone, which is readily available to most drivers or cab owners as compared to other general purpose embedded platforms. The third advantage is the use of SMS service to inform the control room as well as the passenger regarding the loss of attention of the driver. Abishek K Biju | Godwin Jolly | Asif Mohammed C A | Dr. Paul P Mathai | Derek Joseph "A New Proposal for Smartphone-Based Drowsiness Detection and Warning System for Automotive Drivers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45083.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/45083/a-new-proposal-for-smartphonebased-drowsiness-detection-and-warning-system-for-automotive-drivers/abishek-k-biju
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are trying to modify the existing algorithm or even develop new algorithms that help to increase security with a little encryption time. Here in this paper, we have furnished a new technology to modify the AES algorithm which gives more security with a little encryption time and which can be used to encrypt using 128 bit key. Theoretical analysis on the proposed algorithm with the existing reveals the novelty of our work. Here we have proposed a technique to randomize the key and hidden the key data into an encrypted digital image using the basics concept of cryptography and also using the concept of digital watermarking, the concept of key hide has also been encrypted. We have also proposed a new technique to reposition the pixels to break the correlation between them. So, the proposed scheme offers a more secure and cost effective mechanism for encryption. Next on the AES criteria list good performance. Widespread market adoption will require reasonably good performance on a variety of platforms, ranging from easy tocrack smart cards to the largest servers. Good algorithm performance includes speed for the encryption and decryption process as well as the key schedule. Prateek Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Data Security by AES (Advanced Encryption Standard)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45073.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/45073/data-security-by-aes-advanced-encryption-standard/prateek-goyal
Antimicrobial and Phytochemical Screening of Phyllantus NiruriYogeshIJTSRD
Theorigin of Phyllanthus niruri is tropical America from there it spread as a weed to other tropic and sub tropics. It is a tropical annual herb shrub which grows as weed in moist humid waste land. Phyllanthus niruri is among more than 500 Phyllanthus species that are widely spread in temperate and tropical climates region Lizuka et al., 2007. It grows 30 40 cm in height, has small leaves and yellow flowers the stem has green capsule, and blooms with flowers with 5 white sepals and apical acute anther.38g of Mueller Hinton Agar was dissolved in 1000ml distilled water in a conical flask, the mouth of the conical flask was plugged with cotton woo wrapped in aluminium foil. This was sterilized in an autoclave at 121oC for 15mns. The media was removed and allowed to cool to 45oC, later poured into a sterilized plastic petri plates which were appropriately labeled. The present study revealed the antimicrobial activity and phytochemical screening of phyllanthus niruri. The antimicrobial activity of phyllanthus niruri shows great significant against pathogens which are responsible for common infections of skin, respiratory, urinary and gastrointestinal tracts. The phytochemical screening of oxalate, terpenoids, tannins, phenols, quinones, flavonoids, alkaloids, saponins and steroids were all found to be active within the plant. This bioactive phytochemicals present in P. niruri can be useful for further researches on the plant P. nururi since the phytochemicals have shown preclinical efficacies for treating human diseases’ which include hepatitis and HIV AIDS. This work has compiled the chemical constituents present and can be useful for further researches Dr. Mohammed Musa Lawan | Yusuf Sale Baba "Antimicrobial and Phytochemical Screening of Phyllantus Niruri" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44948.pdf Paper URL: https://www.ijtsrd.com/chemistry/other/44948/antimicrobial-and-phytochemical-screening-of-phyllantus-niruri/dr-mohammed-musa-lawan
There is a need for temperature drop in a buried pipeline based on the media and process. Need of some methodology and design requirement for a set of conditions by reducing pipeline surface temperature and the temperature drops to atmospheric temperature at a particular distance of pipeline. Based on the conduction principle, desire reduction up to atmospheric temperature can be possible. Let us understand by below methods and design of Heat sink for buried pipe line. Natvarbhai Prabhudas Gajjar "Heat Sink for Underground Pipe Line" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45117.pdf Paper URL: https://www.ijtsrd.com/engineering/other/45117/heat-sink-for-underground-pipe-line/natvarbhai-prabhudas-gajjar
Newly Proposed Multi Channel Fiber Optic Cable CoreYogeshIJTSRD
Fiber optic cables have single core and multiple core options, but single and multiple core fiber cable -˜s core design need to be updated. Newly proposed design gives facilities to multiple usage than traditional design of cable core. Cable core design needs improvement by using present technology for decreasing material and cost and by improving efficiency of cable. Research need to be carried out in this direction. What do you think Natvarbhai Prabhudas Gajjar "Newly Proposed Multi Channel Fiber-Optic Cable Core" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45116.pdf Paper URL: https://www.ijtsrd.com/engineering/other/45116/newly-proposed-multi-channel-fiberoptic-cable-core/natvarbhai-prabhudas-gajjar
Security Sector Reform toward Professionalism of Military and PoliceYogeshIJTSRD
The need to understand and at the same time give prescriptions for the direction of security reform in Third world countries after the end of World War II has prompted the emergence of a big project called the study of security reform SSR . Within this framework emerge various theories and strategies for security reform, with various variations, including ideological variations that underlie these theories. The reform of the structural aspect is a reform of the institutional and structure of an institution, the instrumental reform includes the reform of the system, laws and regulations, while the reform of the cultural aspect is a reform of the habits or organizational culture in institutions in general and in particular the Timor Leste’s security institutions, both military and police. Arquimino Ramos "Security Sector Reform toward Professionalism of Military and Police" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45061.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/political-science/45061/security-sector-reform-toward-professionalism-of-military-and-police/arquimino-ramos
Stress An Undetachable Condition of LifeYogeshIJTSRD
Stressful life events affects human body, which may lead to cardiovascular diseases and effect metabolism and immune system. Recent studies showed increase in stress levels in developing countries. This study aimed to determine the stress levels in MBBS students. The objectives of the study are a To determine the current stress level, b To assess relation between stress level and lifestyle of college students. The present study was carried out in Ahmedabad City of Gujarat State. A total of 400 medical students were included in the study, which were selected using multi stage sampling aged between 18 years to 25 years. Students were questioned regarding their socioeconomic and life style parameters. The results showed that physical activity such as walking, exercise, yoga, meditation etc. were associated to stress levels. College students showed high stress levels with more satisfaction were mostly smokers. Their major reason for eating junk food and smoking was, increase in stress. Conclusion Majority of students suffered from moderate stress levels. Despite of having stress they were happy and satisfied with life with less no internet addiction. Spirituality and stress scales had a positive correlation as most of the students were averagely highly spiritual. Discriminant function can be used to determine the stress level of a person using age, BMI, internet addiction, spirituality, happiness scale and life satisfaction scale of that person. Jayshree N. Tolani | Dr. Nitinkumar D. Shah "Stress: An Undetachable Condition of Life" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45054.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/45054/stress-an-undetachable-condition-of-life/jayshree-n-tolani
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...YogeshIJTSRD
The study sought to determine the extent to which the usage of social media in the marketing of agricultural products in South West Nigeria can enhance farmers turnover. It employed the survey research design to collect data with the help of a structured questionnaire to elicit information from respondents selected from six 6 south western states. Research data were analysed using structural equation modelling. The results showed that the use of social media WhatsApp and Facebook in marketing of agricultural products significantly enhances farmers turnover. The managerial implication is that use of Whatsapp and Facebook in the marketing of agricultural products for the enhancement of farmers’ turnover was found to have significant influence on the enhancement in farmers’ turnover from agricultural products. Policy makers in government should provide the enabling environment for the telecommunication companies to enhance their reach by installing their facilities across the length and breadth of the country so that the network coverage will be strong at all times so that the benefits of social media usage will not be constrained. Egejuru, Leonard O | Akubugwo, Emmanuel I | Ugorji, Beatrice N "Comparative Studies of Diabetes in Adult Nigerians: Lipid Profile and Antioxidants Vitamins (A and C)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45021.pdf Paper URL: https://www.ijtsrd.com/biological-science/biochemistry/45021/comparative-studies-of-diabetes-in-adult-nigerians-lipid-profile-and-antioxidants-vitamins-a-and-c/egejuru-leonard-o
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...YogeshIJTSRD
The severity and mortality of COVID 19 cases has been associated with the Three category such as vaccination status, severity of disease and outcome. Objective presently study was aimed to assess the severity and mortality among covid 19 patients. Methods Using simple lottery random method 100 samples were selected. From these 100 patients, 50 patients were randomly assigned to case group and 50 patients in control group after informed consents of relative obtained. Patients in the case group who being died after got COVID 19 whereas 50 patients in the control group participated who were survive after got infected from COVID 19 patients. Result It has three categories such as a Vaccination status For the vaccination status we have seen 59 patients were not vaccinated and 41 patients was vaccinated out of 100. b Incidence There were 41 patients were vaccinated whereas 59 patients were not vaccinated. c Severity In the case of mortality we selected 50 patients who were died from the Corona and I got to know that out of 50 patients there were 12 24 patients were vaccinated whereas 38 76 patients were non vaccinated. Although for the 50 control survival group total 29 58 patients were vaccinated and 21 42 patients was not vaccinated all graph start. Conclusion we have find out that those people who got vaccinated were less infected and mortality rate very low. Prof. (Dr) Binod Kumar Singh | Dr. Saroj Kumar | Ms. Anuradha Sharma "To Assess the Severity and Mortality among Covid-19 Patients after Having Vaccinated: A Retrospective Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45065.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/45065/to-assess-the-severity-and-mortality-among-covid19-patients-after-having-vaccinated-a-retrospective-study/prof-dr-binod-kumar-singh
Novel Drug Delivery System An OverviewYogeshIJTSRD
In present scenario evolution of an existing drug molecule from a old form to a novel delivery system can significantly improve its performance in terms of patient compliance, safety and efficacy. In the form of a control drug delivery system an existing drug molecule can get a new life. An appropriately designed Novel Drug Delivery System can be a major advance for solving the problems related towards the release of the drug at specific site with specific rate. The porpuse for delivering drugs to patients efficiently and with fewer side effects has prompted pharmaceutical companies to engage in the development of new drug delivery system. This article covers the basic information regarding Novel Drug Delivery Systems and also advantages, factor etc. Chiranjit Barman | Dr. Gaurav Kumar Sharma | Dr. Kausal Kishore Chandrul "Novel Drug Delivery System: An Overview" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45068.pdf Paper URL: https://www.ijtsrd.com/pharmacy/novel-drug-delivery-sys/45068/novel-drug-delivery-system-an-overview/chiranjit-barman
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo
Comparative Analysis of Different Numerical Methods for the Solution of Initi...YogeshIJTSRD
A mathematical equation which involves a function and its derivatives is called a differential equation. We consider a real life situation, from this form a mathematical model, solve that model using some mathematical concepts and take interpretation of solution. It is a well known and popular concept in mathematics because of its massive application in real world problems. Differential equations are one of the most important mathematical tools used in modeling problems in Physics, Biology, Economics, Chemistry, Engineering and medical Sciences. Differential equation can describe many situations viz exponential growth and de cay, the population growth of species, the change in investment return over time. We can solve differential equations using classical as well as numerical methods, In this paper we compare numerical methods of solving initial valued first order ordinary differential equations namely Euler method, Improved Euler method, Runge Kutta method and their accuracy level. We use here Scilab Software to obtain direct solution for these methods. Vibahvari Tukaram Dhokrat "Comparative Analysis of Different Numerical Methods for the Solution of Initial Value Problems in First Order Ordinary Differential Equations" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45066.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/45066/comparative-analysis-of-different-numerical-methods-for-the-solution-of-initial-value-problems-in-first-order-ordinary-differential-equations/vibahvari-tukaram-dhokrat
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentYogeshIJTSRD
Bituminous mixes are most commonly used all over the world in flexible pavement construction. It consists of asphalt or bitumen used as a binder and mineral aggregate which are mixed together, laid down in layers and then compacted. Under normal circumstances, conventional bituminous pavements if designed and executed properly perform quite satisfactorily but the performance of bituminous mixes is very poor under various situations. Today’s asphaltic concrete pavements are expected to perform better as they are experiencing increased volume of traffic, increased loads and increased variations in daily or seasonal temperature over what has been experienced in the past. In addition, the performance of bituminous pavements is found to be very poor in moisture induced situations. Considering this a lot of work has been done on use of additives in bituminous mixtures and as well as on modification of bitumen. Research has indicated that the addition of polymers to asphalt binders helps to increase the interfacial cohesiveness of the bond between the aggregate and the binder which can enhance many properties of the asphalt pavements to help meet these increased demands. However, the additive that is to be used for modification of mix or binder should satisfy both the strength requirements as well as economical aspects. Naveen Kumar | Ms. Shivani "Evaluation of Different Paving Mixes Using Optimum Stabilizing Content" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45089.pdf Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/45089/evaluation-of-different-paving-mixes-using-optimum-stabilizing-content/naveen-kumar
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD44956 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 784
privacy, formulating the supervision methods and
legal regulation means of e-commerce platform users'
personal data privacy, and strengthening the
awareness and ability construction of users' personal
information protection.
In the era of big data, human beings are always
coerced in the turbulent wave of electronic
information technology. Our daily life and big data
are interrelated and inseparable. With the Internet as
the media, the extensive use of personal information
has become an important part of people's
communication. In the process of compiling the civil
code of the people's Republic of China (hereinafter
referred to as the civil code), we have fully
considered the background of the era of big data. In
order to fully meet the needs of social reality, our
legislature has proposed a new system: personal
information protection system. This move shows that
the state attaches great importance to the privacy of
personal data of public platform users. However, at
this critical period of great development, great change
and great adjustment, its legal status is not clear.
Therefore, scholars in China's legal circles have
launched a heated discussion based on the "e-
commerce law of the people's Republic of China"
(hereinafter referred to as the "e-commerce law"), To
guide judicial practice with legal theory and provide
comprehensive legal protection for users' personal
data privacy. Based on the civil code, the e-commerce
law and the data security law, this paper takes the
privacy and legal protection of personal data of users
of e-commerce platform as the research object,
analyzes and discusses the theory and practice of the
privacy and legal protection of personal data of users
of e-commerce platform combined with relevant legal
theories, and puts forward some suggestions on
improving the legislative system, law enforcement
and legal protection The Countermeasures of judicial
protection system aim to improve the theoretical
analysis of personal data privacy and legal protection
of e-commerce platform users, so as to better protect
the implementation of civil code, e-commerce law
and relevant laws and regulations.
A. Background of topic selection
This paper relies on big data technology as the
background, as a mass of data aggregation, came into
being a new way of data analysis beyond people's
imagination. In our real life, e-commerce platform is
the product of demand in the context of big data. It
provides an extremely convenient communication
channel for e-commerce transactions and promotes
the rapid development of e-commerce. But in recent
years, while electronic information technology
provides convenience for people, personal data
information is also facing the risk of being mined,
disclosed and processed. At present, the existing
forms and systems of personal information protection
cannot keep up with the new situation of the rapid
development of digital industry in the data era. The
fragmentation of relevant laws and regulations, the
lack of supervision, and the weak self-protection
awareness of citizens are very prominent. It is still a
long way to go to maintain the privacy and security of
personal data of users of e-commerce platform.
B. Research significance
1. Theoretical significance
First, further deepen the theoretical research on the
right of personal data privacy of e-commerce
platform users, excavate the theoretical basis of the
"e-commerce law" on the right of personal data
privacy of e-commerce platform users, and improve
the research field of the right of personal data privacy
of e-commerce platform users combined with the
specific content of the "Civil Code". Secondly, it
summarizes the close relationship between the civil
code, e-commerce law and other domestic laws and
regulations, explores the basic concept of personal
data privacy of e-commerce platform users, and
promotes the construction and improvement of the
theoretical framework and structure. According to the
legislative concept of "e-commerce law" and the
needs of social reality, this paper explores new
research fields in the era of big data. This topic
further expands the theoretical research on the
personal data privacy of e-commerce platform users,
explores and demonstrates the basic principles,
concepts and scientific framework of the personal
data privacy of e-commerce platform users.
2. Practical significance
In the field of legislation, it provides legislative ideas
for improving the legal protection of users' personal
data privacy in e-commerce platform, and promotes
the judicial interpretation of users' personal data
privacy in e-commerce platform, so as to
continuously improve the construction of China's
legal system. In the judicial field, starting from the
relevant concepts of the "e-commerce law" and
combining with the relevant laws and regulations at
home and abroad, this paper further defines the
personal data privacy right of users of e-commerce
platform, so as to provide valuable reference for the
court to settle disputes and stop disputes, so as to
further ensure the fairness and justice of the case trial
and maintain the judicial justice and order. In the field
of law enforcement, we should pay more attention to
the infringement of users' personal data privacy by
strengthening the e-commerce platform, strengthen
the supervision and management of e-commerce
3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD44956 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 785
platform, refine the implementation of law
enforcement steps, and improve the law enforcement
quality and level of administrative law enforcement
personnel. This topic and related research results or
conclusions can provide scientific basis for the legal
protection of personal data privacy of e-commerce
platform users, provide scientific countermeasures for
relevant legislation, law enforcement, justice and e-
commerce enterprise platform governance, and put
forward legal, reasonable and feasible legal system
construction and improvement scheme.
II. Status quo of legal protection of personal
data privacy of e-commerce platform users
E-commerce platform refers to the legal person or
unincorporated organization that provides relevant
information services for the main body in the e-
commerce transaction business for the main body to
carry out the transaction business independently. E-
commerce platform is the backbone of participating
in the regulation of market economy, and its unique
data advantage constantly stimulates the main bodyof
e-commerce platform to have a sense of attachment to
it. Therefore, e-commerce platform has gradually
become an important choice and basis for the trading
body to carry out e-commerce activities. However, at
the same time, the virtual platform also has the
derivative problems of consumer data privacy
protection and related rights abuse. In recent years,
with the rapid development of Internet, there are a
large number of managers, operators and consumers
in e-commerce platform, with a wide range of
distribution and strong concealment of illegal acts,
which continue to threaten the healthy development
of e-commerce industry. With the continuous
improvement of the core technology of e-commerce
platform, its influence and control on operators and
consumers are increasingly strong. The "e-commerce
law" promulgated in early 2019 defines e-commerce
platform as "operator" and stipulates responsibilities
and obligations, which indicates that e-commerce
platform has acquired the status of "managed subject"
in the legal sense. However, in real life, e-commerce
platform as the main body does not always play the
role of being managed. Because it also has some
functions of economic management, it is difficult to
be fully covered by the legal identity of "operator". It
can be seen that e-commerce platform is in urgent
need of further carding and adjustment at the legal
level due to its special subject status.
A. E-commerce law and the status quo of user's
personal data privacy protection
1. The subject of registration is not clear
Before the implementation of the "E-commerce
Law", business license is not required to engage in
trading activities on the e-commerce platform, and all
independent entities can operate on their own
according to their needs. Since the promulgation of
the "e-commerce law", online operators must register
with the designated industrial and commercial
departments according to the regulations. This rigid
regulation not only standardizes the subject identity
of China's online operators, but also provides many
offline operators with opportunities for fair
competition. However, this requirement does not
specify the registration subject of e-commerce
platform, which also makes the subject status of many
personal business activities such as purchasing agent
unclear. Because these operators are not clear about
their subject identity, they have to choose to publish
relevant product information on Wechat, microblog
and other public social networking platforms for
online transactions, which greatly increases the risk of
infringement on the personal data privacy of platform
users. As China's "e-commerce law" does not provide
for the registration of this type of business entities,
individual business activities do not need to be
registered in industry and commerce. With its low
price and convenient procedures, this behavior
continues to attract a large number of consumers in
China. The network fraud, fake and shoddy product
transactions, personal data privacy leakage and other
phenomena caused by the rise of a large number of e-
commerce platform users suffer, but it is difficult to
get effective rights protection. With the rapid
development of online social media in China, similar
e-commerce platforms are widely known and
downloaded by the public. If such business entities
are not regulated by law, the legitimate rights and
interests of China's e-commerce market and e-
commerce platform users will be difficult to be
effectively protected.
2. There are some oversight in the supervision of
unfair competition
With the passage of time, many operators on e-
commerce platform have good reputation, high
reputation and good product quality. Because they
have been operating on e-commerce platform for a
long time, they have strong competitiveness. But the
Internet environment is complex, such as good
business status of users often face the invasion of
unscrupulous business unfair competition. After
receiving the fees, some "professional evaluators"
will make these e-commerce platform users who
participate in normal trading behavior suffer from the
adverse impact of negative evaluation by means of
excessive bad evaluation. At the same time, operators
who do not have outstanding business status and
effect will choose to employ "professional reviewers"
to make false beautification evaluation on their
4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD44956 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 786
products, and cheat consumers to trade by deception,
which seriously affects the healthy and normal
operation of e-commerce platform. Although the E-
commerce Law has made rigid provisions to stop the
system of false comments, there are still many such
unfair competition behaviors that have not been
involved and standardized, so it is difficult to
effectively supervise such behaviors.
B. The legal system of tort liability and the status
quo of the protection of users' personal data
privacy
Although e-commerce platform provides people with
a faster and more convenient wayof transaction, there
is no clear provision on the tort liability of Internet
platform subject to tort The relevant provisions in the
tort liability section of the civil code have filled this
gap, which provides a strong support for whether to
bear the tort liabilityof e-commerce platform. Among
them, the division of the relevant standards of tort
liability, Chinese scholars will be summarized into
the following two provisions, first, prompt provisions
or "notice and delete" provisions. If the main body of
e-commerce platform wants to avoid taking
corresponding responsibilities, it needs to take timely
and effective measures after receiving reports or
complaints. Second, know the rules. That is to say, if
the manager of the e-commerce platform knows that
the user of the e-commerce platform divulges other
people's data privacy or invades other people's
legitimate rights by using his Internet system, and
fails to stop the loss in time, and takes effective
measures to stop the loss, he shall bear the
corresponding joint and several liability with the user.
Although these two rules provide the principle
guidance for the assumption of Internet tort liability,
it is obviously not enough to deal with the complex
and changeable Internet environment, and it is still
necessary to conduct in-depth discussion.
C. The status quo of the protection of users'
personal data privacy in "network security
law"
First of all, "Network Security Law" has carried on
the detailed stipulation to each link of network
security protection. The network operation,
information security, supervision and punishment and
other aspects are provided with general and special
provisions. The responsibilities, obligations and
corresponding punishment measures of different
subjects are also clarified. Secondly, "Network
Security Law" has carried on the concrete elaboration
to the basic principle. With the promulgation and
implementation of the law, the information
governance requirements scattered in various
regulations, policies and documents have been clearly
and systematically elaborated, which further affirms
the guiding concept of network security from the
perspective of legal theory. Finally, the "Network
Security Law" has made significant innovations in
specific measures. This fills in the defects of unclear
responsibility of information security supervision and
management of Internet platform for a long time in
China, solves the problems of mutual shirking
responsibility in the past to a certain extent, and
strengthens the supervision and management of
network transactions. The law has different types of
supervision methods, which reduces the negligence
and abuse of power of the staff of the supervision
department, and improves the implementation
efficiency of the management department. These
detailed regulations provide effective legal support
for the security protection of users' personal data
privacy.
III. The existing problems of the legal
guarantee system of the privacy right of big
data in e-commerce platform
A. The legislative protection mechanism needs to
be improved
From the constitutional perspective, as a basic human
right to privacy, has become the basic rights of
citizens are clearly defined, which not only reflects
that the right of personal privacy can never be
infringed illegally, but also shows that the
Constitution provides the most direct basis for other
departments to improve the legislation on privacy
rights at the basic legal level. But the scope of legal
protection at macro level can involve and adjust is
limited after all. How to further improve and develop
it in practice has become an urgent problem. At
present, there are two main legislative measures to be
taken in China: first, the law on the protection of
personal information is formulated to conform to the
international legislative trend of personal privacy
information protection. The basic goal is to unify
standards and have basis for the law; Secondly, the
article makes a detailed analysis of the provisions of
the protection of the right to privacy in administrative
law, aiming at enhancing the practical operability.
But at present, this cannot solve the various problems
faced by the right of data privacy in real life. How to
solve the life problems more pertinently in the
legislative level needs further consideration. From the
perspective of civil law, we can see that the right of
privacy has been clearly defined as a basic right
enjoyed by people in the civil code (general
provisions). However, the establishment of the
concept of privacy is obviously lagging behind social
practice, and the establishment of tort liability is not
clear. We should further strengthen the definition and
extension of privacy in the current civil legislation, so
5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD44956 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 787
as to make a classification in practice, so as to
facilitate the correct understanding and correct
application of the majority of citizens. Finally, from
the perspective of criminal law, we should make
corresponding legislation perfect: first, the current
criminal law only takes the information crime carried
out by the unit as the main body, as the main
component of the crime of illegally providing
personal information for citizens, which is obviously
not conducive to the fight against the crime of natural
person information. The author thinks that the main
body of crime can be expanded into the general crime
subject. Secondly, the object of infringement on the
crime of illegally stealing computer information is
limited to the high-tech field, and the general
communication computer information system is still
in a neglected stage, which is very unfavorable to the
fight against the crime in the field of computer
information. Third, according to the current criminal
law of our country, the crime of violating the freedom
of communication does not meet the trend of social
science and technology development within the scope
of protection within our ability. Modern
communication and communication methods should
be included.
B. The law enforcement and protection
mechanism needs to be improved
With the advent of big data age, managers and
providers providing e-commerce platform services
can draw their preferred paths according to user
browsing traces. Then, the bad placement of targeted
advertising brings more and more threats to the
privacy of personal data of e-commerce platform
users. Although in some current legal documents, the
situation that can be found as "using personal
information without user permission" indicates that
the use of user personal information and algorithms to
direct push information. But in the process of
practice, it is difficult to really protect the rights and
interests of users. According to the current
regulations, in the process of protection, as long as it
does not seriously affect the life of the plaintiff, even
if the defendant's infringement infringes the plaintiff's
legal rights and interests (the right to data privacy),
the plaintiff's claim for damages will not be
confirmed.
C. The judicial protection system needs to be
reformed
The position of the managers, operators and
consumers of e-commerce platform is very different,
and the single judicial supervision approach cannot
achieve the efficient restriction. The occurrence of
large-scale tort has to be reflected. Should the
violation of the prohibition be stopped by civil
damages? Should administrative punishment be given
to serious violators, or even to investigate their
criminal responsibility? The author believes that the
diversified supervision path can effectively guarantee
the healthy development of e-commerce platform and
e-commerce industry. In addition, in the era of big
data, the public authority department should also be
the active controller of user personal information, and
should actively fulfill the obligation to protect
citizens' personal information rights and interests
from direct or indirect infringement. Of course, the
characteristics of information technology cannot be
ignored. It determines that a single judicial
supervision path cannot provide long-term and
effective protection for personal information.
Therefore, the author thinks that the protection of
personal data privacy should build a comprehensive
supervision mode of public-private law. The
functions of the laws of each department should be
fully exerted to realize the judicial supervision
mechanism of internal unity and system coordination.
D. Internal governance of e-commerce platform
enterprises needs to be strengthened
The problem of short board in e-commerce platform
enterprises in China is especially prominent. The
problems in practice will often play a great role in
promoting the legislation of e-commerce in China. It
is necessary to mention that the current e-commerce
law does not perfect the regulations on operators in
the e-commerce platform. In some clear and visible
issues, operators should first abide by the provisions
of the current law. If the current law does not, some
reasonable judicial interpretation can be applied to
specific cases. In this regard, the author also puts
forward some personal opinions on the specific
situation after the promulgation of the e-commerce
law. First, we can clearly stipulate the qualification
review obligations of e-commerce platform operators,
and improve the registration system and regular
verification related provisions according to the
current situation. Secondly, it can be an effective way
to construct complaint mechanism to facilitate the
daily supervision and inspection of specific
information in e-commerce platform. In this case, we
should perfect the information publicity system of
operators and classify and register credit grades.
Finally, we can regularly submit the identity
information of the merchants and the matters related
to tax payment to the relevant departments of the state
for further supervision and management.
6. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD44956 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 788
IV. The way to perfect the legal guarantee
system of privacy of personal data of users
on e-commerce platform
A. Improve the legislation of privacy protection of
platform users' personal data
1. Innovation of personal data privacy protection
concept in information data sharing platform
Although the newly issued civil code has made
provisions on personal data information being
protected by law, compared with the relevant research
of EU, the following deficiencies in domestic
theoretical research in China need to be further
improved: (1) At present, there are unclear boundaries
and overlapping of different legal documents in
China, The terms and regulations of the same or
similar content are not completely unified, which is
very unfavorable to the mutual connection and
coordination of rights and obligations of all parties
within the e-commerce platform.(2) The subject that
needs to regulate rights and obligations in e-
commerce platform is not comprehensive, and it does
not make special emphasis on the behavior subject
which is easy to disclose user data information.( 3)
The provisions on rights and obligations are too
principled, not concise and targeted.(4) There is no
formal and operational judicial remedy. Therefore,
China should further explore the theory and focus on
the establishment of a more comprehensive and sound
legal system for personal data privacy protection. We
can promulgate the special legal documents such as
personal information protection law and data security
law as soon as possible, and clarify the rights and
obligations of users of e-commerce platform to their
data information.
2. Combine the national conditions of China with
the advanced legislation experience abroad
From the perspective of law to social governance,
China should build a dual track protection system of
personal information and a system of personal
information rights and interests of data sharing by
referring to the legislative concept of The EU General
Data Protection Regulations (GDPR). At the same
time, we should realize that although The EU General
Data Protection Regulations (GDPR) regulates and
restricts the protection of personal data, the content of
privacy protection of personal data shared by EU and
China still has great limitations. At present, only
anonymous data information can be shared or data
information agreed by data subject can be achieved.
However, The EU General Data Protection
Regulations (GDPR) provides a typical legal
framework for the protection of personal data privacy,
which is of great reference value for the effective
implementation of personal data privacy protection
measures for users of e-commerce platform in China.
B. Improve the law enforcement and protection
mechanism of privacy of platform users'
personal data
At present, it can be clear in legislation that
determining the standard of damages is one of the
effective regulatory methods in the current law. Some
scholars in China think that "the cost of safeguarding
rights is higher and the amount of compensation is
low" is the most prominent problem in the protection
of personal information in civil cases. Because of the
lack of strong legal documents as guidance in
legislation, the court in practice requires the infringer
to apologize for the apology, but in fact, there is little
demand for damages. After investigation, there are
two ways to compensate for the damage caused by
the infringement of data privacy of users on e-
commerce platform: one is to compensate according
to the amount of loss. Secondly, according to the
profit of the infringer, the compensation shall be
made in a fixed proportion. In the era of big data,
information subject can easily obtain huge property
benefits from infringement. However, due to the
unequal information and frequent data theft, it is
difficult for users of e-commerce platform to find
their infringement in time. Therefore, from the
effective containment and prevention point of view,
for malicious infringement of e-commerce platform
user information for profit (especially data privacy),
we should learn from foreign countries to pay great
attention to the punishment methods in personal
information protection, and integrate it into the
punitive compensation system to protect the
legitimate rights and interests of users in the
vulnerable e-commerce platform.
C. Strengthen the judicial protection mechanism
of the privacy of user personal data
Judicial organs should attach importance to the trial
of infringement disputes on user data rights and
interests. When correctly identifying the platform for
collecting user information in a case, it is obliged to
make clear to users, and also have the obligation of
keeping personal information confidential. Personal
data often has different definitions in different fields,
institutions or scholars' perspectives. Personal data is
also called personal information. Personal data right
refers to the real rights and interests that the subject
can independently decide in the process of collecting
and using the data about himself or her. According to
some scholars' opinions, the main attribute of
personal data right is personality right or property
right. At present, the civil code of China has some
corresponding provisions on the protection of
personal information, but it is rarely studied in the
field of criminal law in China. Therefore, the
protection basis of personal data privacy in legal
7. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD44956 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 789
documents is very limited, and we cannot infer the
extent of the protection from the existing provisions
of criminal law. In the theoretical research, there is
still a lot of research space for the research of whether
the privacy right of personal data needs to be
regulated by criminal law, how to divide the
protection boundary and how to determine the
punishment. The legal protection of personal data
privacy of users of e-commerce platform has become
an important part of legislation in the new era. In
order to meet the various practical needs, the author
thinks that the legal basic framework of the way to
protect the privacy of users' personal data on e-
commerce platform should be established and
perfected as soon as possible, so as to protect the
legitimate rights and interests of all users of e-
commerce platform more effectively. Objectively
speaking, due to the progress of the times and
technology, the traditional legal protection method in
China is not enough to deal with the problems in the
transaction process of e-commerce platform, and the
protection of user rights and interests is very easy to
appear a vacuum zone. Therefore, legislators should
establish a complete legal protection system as soon
as possible, further protect the rights and interests of
users of e-commerce platform, and protect their legal
rights and interests to the greatest extent.
D. Improve the internal governance mechanism
of privacy protection of e-commerce platform
operators
Under the background that personal information
security of users of e-commerce platform has
gradually become a global problem, improving the
internal governance mechanism of privacyprotection
of e-commerce platform operators and constructing a
secure network environment plays an important role
in the protection of consumers' rights and interests.
Today, the personal information security of users in
e-commerce platform should be solved mainly: first,
the problem of data privacy prevention of users in e-
commerce platform. The establishment of
comprehensive protection system can better filter the
bad operation behavior of e-commerce platform
operators. Second, the security and confidentiality of
user data and information of e-commerce platform.
To improve the internal governance mechanism of
privacy protection of e-commerce platform operators,
we can start from the two aspects of data storage
security and information transmission security, and
combine them to prevent them together. Third, the
security of user data information in e-commerce
platform is a problem. It is more beneficial to
improve the current situation of e-commerce platform
vulnerabilities by setting up prevention mechanisms
for different types of vulnerabilities. Fourth, the
problem of data backup and recovery of e-commerce
platform users. In order to better protect the privacy
of consumers' personal data, the data backup and
recovery function of e-commerce platform should be
strengthened and improved. When the data privacy
infringement problem to be solved, data backup and
recovery will become the most direct and efficient
auxiliary means. In the future, the author should focus
on the above four issues as the main internal
governance direction to improve the privacy
protection of e-commerce platform operators and
study the corresponding governance measures in
time.
V. Conclusion
With the development of the times, the world is more
closely connected than ever before. The world and
China are in a great development, great change and
unprecedented change in a century. In view of various
problems in the development of e-commerce industry,
we should dialectically treat the issued e-commerce
law, objectively treat the favorable and negative
factors, make necessary adjustments to the problems
and loopholes, and help the development of e-
commerce. The four departments headed by the
central information office of the state network jointly
organized special governance actions for illegal use
of personal information, and the special action of
network market supervision in 2019 jointly carried
out by 8 departments such as the State Administration
of market supervision and other 8 departments fully
reflected that the data privacy governance of e-
commerce platform in China is facing many new
challenges. It is not necessary to say that the laws and
regulations related to the protection of Internet data
and privacy governance are not perfect. Therefore, we
should actively draw on foreign data protection law or
privacy law, formulate the privacy law with Chinese
characteristics, and further improve various laws and
regulations related to the data privacy governance of
users of e-commerce platform, including the personal
information protection law (Draft), and finally form
open, scientific, transparent support The legal and
regulatory system of data protection and privacy
management in the healthy network environment.
Reference:
[1] Wenjing, Ye Minying. Analysis of the
influence of e-commerce law on the
development of e-commerce industry [J].
JOURNAL OF HUNAN ADMINISTRATIVE
COLLEGE, 1009-3605 (2020) 06-0124-
06.2020-09.
[2] Fang Yu. Personal information protection under
the evolution of data value: Reflection and
8. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD44956 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 790
reconstruction [J]. Economic and trade legal
review 2096-6180 (2020) 06-0095-16.2020-06.
[3] Sheng Xiaoping, jiaofengzhi. Data privacy
governance from the perspective of laws and
regulations [J]. Library forum, d922.16;
D923.2020-12.
[4] Zhao Yanhong. Legal regulation of big data
monitoring measures -- A Study on privacy as
the center [j]. Jiaotong University Law,
10.19375/j.cnki.31-2075/d.2020.04.010.2020-
04.
[5] Hu Zhijie. Analysis of privacy protection in the
era of big data -- from the perspective of
privacy in the network environment [J]. Legal
exposition, d923.2020-05.
[6] Wang Yibin, Li Lingzhi, Zhang Weibin.
Consumer privacy and its protection in the
context of e-commerce [J]. Journal of
Changchun Institute of education, d923.1671-
6531 (2020) 08-0062-05.2020-08.
[7] Cao Jiayi. Problems and solutions in the
implementation of China's e-commerce law 〔J〕.
Legal system Expo, 2095-4379 - (2020) 16-
0110-02. 2020-06.
[8] Ji Leilei. Research on the protection of personal
information property rights in the era of big
data [J]. Henan Social Sciences, d912.1.2020-
11.
[9] Xu Dongdong. Jurisprudential thinking on the
protection of citizens' personal privacy in the
era of big data [J]. Legal system and society,
10.19387/j.cnki.1009-0592.2020.08.181.2020-
08.
[10] Lu Bingwan. The dilemma and
Countermeasures of extraterritorial information
privacy under the background of big data --
taking personal information control as the
breakthrough point. Intelligence magazine,
D913; D912.1.2020-12.
[11] Xia Jianqun. Research on the protection of
readers' privacy under the background of big
data [J]. Western academic journal,
10.16721/j.cnki.cn61-
1487/c.2020.16.022.2020-08.
[12] Zhang Zhaoyang. Research on the
responsibility of e-commerce platform in e-
commerce law [J]. Law and economy,
d922.294.2020, (01).
[13] Sheng Xiaoping, Yang Shaobin. Analysis on
the applicability and effect of gdpr on the
protection of personal data for open sharing of
scientific data [J]. Library and information
work, 10.13266/j.issn.0252-
3116.2020.22.005.2020-12.
[14] Liu Jinsong. The influence of e-commerce law
on the development of e-commerce industry
〔J〕. Business culture, d922.294; F724.6.2020-
12.
[15] Yan Xiaoli, yuan libing. Experience and
Enlightenment of the second anniversary of
gdpr implementation 〔J〕. Science and
technology of extraterritorial observation,
d912.1.2020-10
[16] Kelly D. Martin, Jisu J. Kim, Robert W.
Palmatier et al. Data Privacy in Retail[J].
Journal of Retailing, 2020.
[17] Martin Kelly D, Kim Jisu J, Palmatier Robert
W. et al. Data Privacy in Retail [J]. Journal of
Retailing, 2020, 96(4).
[18] Jorge Sancho, José García, Álvaro Alesanco et
al. Oblivious Inspection: On the Confrontation
between System Security and Data Privacy at
Domain Boundaries [J]. Security and
Communication Networks, 2020, 2020.
[19] SPECIAL ISSUE: A New Generation of
Statisticians Tackles Data Privacy[J].
CHANCE, 2020, 33(4).
[20] Financial Loss due to a Data Privacy Breach:
An Empirical Analysis[J]. Journal of
Organizational Computing and Electronic
Commerce, 2020, 30(4).