Risk reduction through technological control of personal information

Abuse and harm to individuals, through harassment and bullying, coexist with Identity Theft as criminal behaviours supported by the ready availability of personal information. Incorporating privacy protection measures into software design requires a thorough understanding about how an individual...

Full description

Bibliographic Details
Main Author: Atkinson, Shirley
Published: University of Plymouth 2007
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443491