Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 50, 2014 - Issue 2
195
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Privacy and Security Part II: It's Personal

 

Abstract

This article is the second in a series of three that explores the issues of privacy versus security. The first article, “Privacy and Security Part I: Privacy and Security in the Corporate World” covered the corporate side. This second in the series will explore personal privacy versus security, and the third installment will review the overlap from both sides corporate versus personal privacy: Who really owns your data?

Notes

i. World Population Clock as of March 17, 2014 at 10:06 CDT, www.census.gov/popclock (retrieved March 2014).

ii. Betters, E. (January 15, 2014). “Internet of Things Explained: What is It, and Can It Really Change the World?” www.pocket-lint.com/news/126559-internet-of-things-explained-what-is-it-and-can-it-really-change-the-world (retrieved February 2014).

iii. Intel, “The Internet of Things Starts with Intelligence Inside,” www.intel.com/content/www/us/en/intelligent-systems/iot/internet-of-things-starts-with-intelligence-inside.html (retrieved February 2014).

iv. “‘Shine the Light’ on Marketers: Find out How They Know Your Name.” (November 2013). Privacy Rights Clearinghouse, www.privacyrights.org/shine-light-marketers-find-out-how-they-know-your-name#8 (retrieved March 2014).

v. Greene, K. “Encryption Software May Halt Wire Tapping,” http://m.technologyreview.com/read_article.aspx?id=16948&ch=infotech (retrieved February 2014).

vi. Off-the-Record (OTR) Messaging, https://otr.cypherpunks.ca/index.php#docs (retrieved February 2014).

vii. Alba, D. (February 4, 2014). “7 Ways to Reclaim Your Digital Privacy,” www.popularmechanics.com/technology/how-to/computer-security/7-ways-to-reclaim-your-digital-privacy-16453529 (retrieved March 2014).

viii. Manjoo, F. (April 18, 2013). “We Need More Cameras, and We Need Them Now, the Case for Surveillance,” Slate, www.slate.com/articles/technology/technology/2013/04/boston_bomber_photos_the_marathon_bombing_shows_that_we_need_more_security.html (retrieved February 2014).

Additional information

Notes on contributors

Al Marcella

Albert J. Marcella Jr., Ph.D., CISA, CISM, is president of Business Automation Consultants, LLC. Dr. Marcella, is an internationally recognized public speaker, researcher, and workshop and seminar leader with over 35 years of experience in IT audit, security, and assessing internal controls. Dr. Marcella, has authored numerous articles and 29 books on various IT, audit, and security related subjects.

Carol Stucki

Carol Stucki, CISA, PMP, is a Project Manager with over 25 years of experience in operational and IT roles including providing internal systems consulting, portfolio management, and auditing services for companies both in the Unites States and abroad. Carol has worked for GTE (now Verizon), Arthur Andersen, Perot Systems, Los Alamos National Labs on DOE, DOD, HSD contracts, Church of Jesus Christ of Latter-day Saints, Capgemini, and HealthNow.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.