Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
Many hypes are currently surrounding the “datafication” such as the Big Data, Cloud and BYOD. The proliferation of data from ubiquitous sources is often not counter-balanced with adequate awareness and prudent risk management by the end-users, making it easier for others to take advantage of the new...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
American Scientific Publishers
2015
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/48480/ http://irep.iium.edu.my/48480/ http://irep.iium.edu.my/48480/ http://irep.iium.edu.my/48480/4/38480_big_data_scopus.pdf http://irep.iium.edu.my/48480/6/48480_Big_data%2C_cloud_and_bring_your_own_device.pdf |
id |
iium-48480 |
---|---|
recordtype |
eprints |
spelling |
iium-484802016-07-15T06:46:24Z http://irep.iium.edu.my/48480/ Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication' Zulhuda, Sonny Abdul Ghani Azmi, Ida Madieha Hakiem, Nashrul H61.8 Communication of information K Law (General) T58.6 Management information systems Many hypes are currently surrounding the “datafication” such as the Big Data, Cloud and BYOD. The proliferation of data from ubiquitous sources is often not counter-balanced with adequate awareness and prudent risk management by the end-users, making it easier for others to take advantage of the new technology and reap from the abundant data available for all kinds of purposes including criminal. IT stakeholders should view Big Data not only as a new exciting technological advancement, but also a frontier full of potential risks to be addressed not only by industrial best practices, but also by the reforming laws in the area of information security and data privacy. This paper sets to undertake two major tasks. Firstly, examining the types of legal risks involved in the Big Data environment. Secondly, it highlights some aspects of data privacy and security laws already contained in the current data protection laws in Malaysia. American Scientific Publishers 2015-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/48480/4/38480_big_data_scopus.pdf application/pdf en http://irep.iium.edu.my/48480/6/48480_Big_data%2C_cloud_and_bring_your_own_device.pdf Zulhuda, Sonny and Abdul Ghani Azmi, Ida Madieha and Hakiem, Nashrul (2015) Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'. Advanced Science Letters, 21 (10). pp. 3347-3351. ISSN 1936-6612 E-ISSN 1936-7317 http://www.ingentaconnect.com/contentone/asp/asl/2015/00000021/00000010/art00089?crawler=true 10.1166/asl.2015.6493 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
H61.8 Communication of information K Law (General) T58.6 Management information systems |
spellingShingle |
H61.8 Communication of information K Law (General) T58.6 Management information systems Zulhuda, Sonny Abdul Ghani Azmi, Ida Madieha Hakiem, Nashrul Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication' |
description |
Many hypes are currently surrounding the “datafication” such as the Big Data, Cloud and BYOD. The proliferation of data from ubiquitous sources is often not counter-balanced with adequate awareness and prudent risk management by the end-users, making it easier for others to take advantage of the new technology and reap from the abundant data available for all kinds of purposes including criminal. IT stakeholders should view Big Data not only as a new exciting technological advancement, but also a frontier full of potential risks to be addressed not only by industrial best practices, but also by the reforming laws in the area of information security and data privacy. This paper sets to undertake two major tasks. Firstly, examining the types of legal risks involved in the Big Data environment. Secondly, it highlights some aspects of data privacy and security laws already contained in the current data protection laws in Malaysia. |
format |
Article |
author |
Zulhuda, Sonny Abdul Ghani Azmi, Ida Madieha Hakiem, Nashrul |
author_facet |
Zulhuda, Sonny Abdul Ghani Azmi, Ida Madieha Hakiem, Nashrul |
author_sort |
Zulhuda, Sonny |
title |
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
|
title_short |
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
|
title_full |
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
|
title_fullStr |
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
|
title_full_unstemmed |
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
|
title_sort |
big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication' |
publisher |
American Scientific Publishers |
publishDate |
2015 |
url |
http://irep.iium.edu.my/48480/ http://irep.iium.edu.my/48480/ http://irep.iium.edu.my/48480/ http://irep.iium.edu.my/48480/4/38480_big_data_scopus.pdf http://irep.iium.edu.my/48480/6/48480_Big_data%2C_cloud_and_bring_your_own_device.pdf |
first_indexed |
2023-09-18T21:08:46Z |
last_indexed |
2023-09-18T21:08:46Z |
_version_ |
1777411111133380608 |