Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case

Big Data promises great socially accepted and desirable benefits. However, in general terms, the datification of life has made people to lose some awareness of the risks involved in the massive analysis of data regarding their fundamental rights. This fact is used by the companies involved in the da...

Full description

Autores:
Silva, Jesus
Solano, Darwin
Fernandez, Claudia
Romero, Ligia
Vargas Villa, Jesus
Tipo de recurso:
Article of journal
Fecha de publicación:
2019
Institución:
Corporación Universidad de la Costa
Repositorio:
REDICUC - Repositorio CUC
Idioma:
eng
OAI Identifier:
oai:repositorio.cuc.edu.co:11323/4836
Acceso en línea:
https://hdl.handle.net/11323/4836
https://repositorio.cuc.edu.co/
Palabra clave:
privacy preserving
personal protection
data and big data
sensitive information
Colombia
Rights
openAccess
License
Attribution-NonCommercial-NoDerivatives 4.0 International
id RCUC2_19d60efaa995cf6bd7d5b7e0a933345a
oai_identifier_str oai:repositorio.cuc.edu.co:11323/4836
network_acronym_str RCUC2
network_name_str REDICUC - Repositorio CUC
repository_id_str
dc.title.spa.fl_str_mv Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
title Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
spellingShingle Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
privacy preserving
personal protection
data and big data
sensitive information
Colombia
title_short Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
title_full Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
title_fullStr Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
title_full_unstemmed Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
title_sort Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
dc.creator.fl_str_mv Silva, Jesus
Solano, Darwin
Fernandez, Claudia
Romero, Ligia
Vargas Villa, Jesus
dc.contributor.author.spa.fl_str_mv Silva, Jesus
Solano, Darwin
Fernandez, Claudia
Romero, Ligia
Vargas Villa, Jesus
dc.subject.spa.fl_str_mv privacy preserving
personal protection
data and big data
sensitive information
Colombia
topic privacy preserving
personal protection
data and big data
sensitive information
Colombia
description Big Data promises great socially accepted and desirable benefits. However, in general terms, the datification of life has made people to lose some awareness of the risks involved in the massive analysis of data regarding their fundamental rights. This fact is used by the companies involved in the data value chain to maximize their benefits although this implies the proliferation of negative externalities assumed by the information holders. The Colombian State has made great efforts regarding the protection of data and privacy, as demonstrated by Law 1266 of 2008 and Law 1581 of 2012, nevertheless, a deep literary review leads to conclude the need to adapt to the international context
publishDate 2019
dc.date.accessioned.none.fl_str_mv 2019-06-10T13:52:48Z
dc.date.available.none.fl_str_mv 2019-06-10T13:52:48Z
dc.date.issued.none.fl_str_mv 2019
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
format http://purl.org/coar/resource_type/c_6501
status_str acceptedVersion
dc.identifier.issn.spa.fl_str_mv 0000-2010
dc.identifier.uri.spa.fl_str_mv https://hdl.handle.net/11323/4836
dc.identifier.instname.spa.fl_str_mv Corporación Universidad de la Costa
dc.identifier.reponame.spa.fl_str_mv REDICUC - Repositorio CUC
dc.identifier.repourl.spa.fl_str_mv https://repositorio.cuc.edu.co/
identifier_str_mv 0000-2010
Corporación Universidad de la Costa
REDICUC - Repositorio CUC
url https://hdl.handle.net/11323/4836
https://repositorio.cuc.edu.co/
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.references.spa.fl_str_mv [1] Política de Big Data. (2018). Revista Dinero. Recuperado de: https://www.dinero.com/pais/articulo/colombia-ya-tiene-politica-publica-debig-data/257479. [2] DNP. (2018). Documento CONPES 3920, Politica Nacional de Explotación de Datos (Big Data). Recuperado de: https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3920.pdf [3] Puldain Salvador, V. (2017). El futuro marco legal para la protección del acceso a los datos. Revista Ibero-Latinoamericana de Seguros, 26(47). [4] Supriyadi, D. (2017). Personal and Non Personal Data, In the context of Big Data. Tesis, Tilburg. 123. Sriramoju, S. B. (2017). Introduction to big data: infrastructure and networking considerations. Recuperado de: http://one.com.vn/sites/default/files/fileattached/catalog/introduction_to_big_data__infrastructure_and_networking_considerations.pdf [5] Lane, J., Stodden, V., Bender, S., & Nissenbaum, H. (2014). Privacy, big data, and the public good: Frameworks for engagement. New York, NY: Cambridge University Press. [6] John, L. K., Acquisti, A., & Loewenstein, G. (2009). The best of strangers: Context dependent willingness to divulge personal information. DOI: https://dx.doi.org/10.2139/ssrn.1430482 [7] Fuster, G. G., & Scherrer, A. (2015). Big Data and smart devices and their impact on privacy. Committee on Civil Liberties, Justice and Home Affairs (LIBE), Directorate-General for Internal Policies, European Parliament. Recuperado de: http://www. europarl. europa. eu/RegData/etudes/STUD/2015/536455/IPOL_STU (2015) 536455_EN. Pdf [8] Gellman, R. (2017). Fair information practices: A basic history. Recuperado de: https://bobgellman.com/rg-docs/rg-FIPshistory.pdf [9] Fernández, J. P. M. (2017). La protección de datos y los motores de búsqueda en Internet: Cuestiones actuales y perspectivas de futuro acerca del derecho al olvido/Data protection and Internet search engines: current issues and future perspectives about the right to be forgotten. Revista de Derecho Civil, 4(4), 181-209. Recuperado de: http://nreg.es/ojs/index.php/RDC/article/view/280/228. [10] Márquez Buitrago, f. (2016). Aplicación de la ley estatutaria 1581 de 2012 a la red social facebook en colombia. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (15), 1-31. DOI:10.15425/redecom.15.2016.04 [11] Daros, W. R. (2017). ¿ Qué es un marco teórico?. Enfoques, 14(1 y 2), 73-112 [12] Bayern, S. J. (2009). Rational Ignorance, Rational Closed-Mindedness, and Modern Economic Formalism in Contract Law. California Law Review, 97(3), 943-973. DOI: http://dx.doi.org/https://doi.org/10.15779/Z38TD7R [13] Daries, J. P., Reich, J., Waldo, J., Young, E. M., Whittinghill, J., Ho, A. D., & Chuang, I. (2014). Privacy, anonymity, and big data in the social sciences. Communications of the ACM, 57(9), 56-63. DOI: https://doi.org/10.1145/2643132 [14] Garriga Domínguez, A. (2016). Nuevos retos para la protección de datos personales. En la Era del Big Data y de la computación ubicua. Dykinson. [15] Viloria, A., & Viviana Robayo, P. (2016). Virtual Network Level of Application Composed IP Networks Connected with Systems - (NETS Peer-to- Peer). Indian Journal Of Science And Technology, 9(46). doi:10.17485/ijst/2016/v9i46/107376 [16] Gaitán-Angulo M., Cubillos Díaz J., Viloria A., Lis-Gutiérrez JP., Rodríguez-Garnica P.A. (2018) Bibliometric Analysis of Social Innovation and Complexity (Databases Scopus and Dialnet 2007–2017). In: Tan Y., Shi Y., Tang Q. (eds) Data Mining and Big Data. DMBD 2018. Lecture Notes in Computer Science, vol 10943. Springer, Cham [17] Albrecht, J. P. (2016). The EU’s New Data Protection Law–How A Directive Evolved Into A Regulation. Computer Law Review International, 17(2), 33-43. DOI: https://doi.org/10.9785/cri-2016-0202 [18] Canbay, Y., & Sağıroğlu, S. (2017). Big data anonymization with spark. In Computer Science and Engineering (UBMK), 2017 International Conference on (pp. 833-838). DOI: https://doi.org/10.1109/UBMK.2017.8093543 [19] Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. Privacy, big data, and the public good: Frameworks for engagement, 1, 44-75. [20] Puccinelli, O. R. (2015). El hábeas data a veinte años de su incorporación en la Constitución argentina. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (13), 1-25. DOI:10.15425/redecom.13.2015.02 [21] Leenes, R., & Kosta, E. (2015). Taming the cookie monster with dutch law–a tale of regulatory failure. Computer Law & Security Review, 31(3), 317-335. DOI: https://doi.org/10.1016/j.clsr.2015.01.004 [22] Leenes R. (2016). Explaining the Unknown: Accountability and Transparency in Big Data Land. Data Science Seminar, Tilburg. [23] Mayer-Schönberger, V., & Cukier, K. (2013). Big Data–A Revolution That Will Transform How We Live, Think and Work. Houghton Mifflin Harcourt. [24] Manrique Gómez, V. (2015). El derecho al olvido: análisis comparativo de las fuentes internacionales con la regulación colombiana. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (14), 1-25. DOI:10.15425/redecom.14.2015.09 [25] Parraguez Kobek, L., & Caldera, E. (2016). Cyber Security and Habeas Data: The Latin American response to information security and data protection. Recuperado de: https://ssrn.com/abstract=2868039 [26] Gil Gonzales, Elena. (2016). Big Data, Privacidad y Protección de Datos. Accesit en el premio de investigación, Agencia Española de Protección de Datos. [27] Gantz J, Reinsel D (2011). Extracting value from chaos. IDC iView, pp 1–12 Recuperado de: https://www.emcgrandprix.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf [28] Crawford, K., & Schultz, J. (2014). Big data and due process: Toward a framework to redress predictive privacy harms. BCL Rev., 55, 93. DOI: https://ssrn.com/abstract=2325784 [29] Floridi, L. (2002). "Data", article for the International Encyclopedia of the Social Sciences, 2nd edition, editor in chief William A. Darity (Detroit: Macmillan) [30] El Emam, K., & Álvarez, C. (2014). A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques. International Data Privacy Law, 5(1), 73-87. DOI: https://doi.org/10.1093/idpl/ipu033 [31] Jaramillo Romero, C. (2016). Derecho Fundamental al Hábeas Data:¿ Cómo se ha desarrollado y cuales han sido sus consecuencias en el ordenamiento jurídico colombiano?. Tesis de Grado. Recuperado de: https://repository.upb.edu.co/handle/20.500.11912/2877 [32] Hueso, L. C. (2017). Big data e inteligencia artificial. Una aproximación a su tratamiento jurídico desde los derechos fundamentales. Dilemata, (24), 131-150. Recuperado de: https://dialnet.unirioja.es/servlet/articulo?codigo=6066829 [33] Beavers, A. F. (2013). Floridi historizado: La cuestión del método, el estado de la profesión y la oportunidad de la filosofía de la información de Luciano Floridi. Escritos, 21(46), 39-68. Recuperado de: https://revistas.upb.edu.co/index.php/escritos/article/view/1782/1719 [34] Bennett, C. J., & Bayley, R. M. (2016). Privacy protection in the era of ‘big data’: regulatory challenges and social assessments. Exploring the Boundaries of Big Data, 205. Recuperado de: https://bartvandersloot.com/onewebmedia/Verkenning_32_Exploring_the_Boundaries_of_Big_Data.pdf#page=206 [35] Zarsky, T. Z. (2016). Incompatible: The GDPR in the Age of Big Data. Seton Hall L. Rev., 47, 995. Recuperado de: https://ssrn.com/abstract=3022646 [36] Zhang, X., Leckie, C., Dou, W., Chen, J., Kotagiri, R., & Salcic, Z. (2016). Scalable local-recoding anonymization using locality sensitive hashing for big data privacy preservation. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (pp. 1793-1802). ACM. DOI: https://doi.org/10.1145/2983323.2983841 [37] Engan, M. (2017). Big Data and GDPR. Tesis de maestría, University of Stavanger. Recuperado de: https://brage.bibsys.no/xmlui/handle/11250/2467489 [38] Forgó, N., Hänold, S., & Schütze, B. (2017). The Principle of Purpose Limitation and Big Data. In New Technology, Big Data and the Law (pp. 17-42). Springer, Singapore. [39] Hox, J. J., & Boeije, H. R. (2005). Data collection, primary versus secondary. Encyclopedia of social measurement, 1, 593. Recuperado de: https://dspace.library.uu.nl/bitstream/handle/1874/23634/hox_05_data+collection,primary+versus+secondary.pdf?sequence=1 [40] Gayo, M. R. (2017). Big data: hacia la protección de datos personales basada en una transparencia y responsabilidad aumentadas. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (17), 1-24. DOI:10.15425/redecom.17.2017.09. 59. [41] Gellert, R. (2018). Understanding the notion of risk in the General Data Protection Regulation. Computer Law & Security Review, 34(2), 279-288. DOI: https://doi.org/10.1016/j.clsr.2017.12.003 60.
dc.rights.spa.fl_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International
http://creativecommons.org/licenses/by-nc-nd/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.publisher.spa.fl_str_mv Procedia Computer Science
institution Corporación Universidad de la Costa
bitstream.url.fl_str_mv https://repositorio.cuc.edu.co/bitstreams/76e950aa-7ab6-4d90-9a7f-0ad1da740b26/download
https://repositorio.cuc.edu.co/bitstreams/b17a52bb-2192-455c-9471-f9e9db285237/download
https://repositorio.cuc.edu.co/bitstreams/013cafd6-a52e-4922-8bc0-1b4790cab383/download
https://repositorio.cuc.edu.co/bitstreams/ff8682e6-3568-493b-a87d-104cdec21806/download
https://repositorio.cuc.edu.co/bitstreams/6501b097-c5d4-4cf2-b388-5f0185177d59/download
bitstream.checksum.fl_str_mv 7967ac5a9a595ae7977f82420c8b384b
4460e5956bc1d1639be9ae6146a50347
8a4605be74aa9ea9d79846c1fba20a33
080c99c5d3995fdd3da636ca170bc8ac
9fc407bf3b33418d6d74112249285623
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad de la Costa CUC
repository.mail.fl_str_mv repdigital@cuc.edu.co
_version_ 1811760824322097152
spelling Silva, JesusSolano, DarwinFernandez, ClaudiaRomero, LigiaVargas Villa, Jesus2019-06-10T13:52:48Z2019-06-10T13:52:48Z20190000-2010https://hdl.handle.net/11323/4836Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/Big Data promises great socially accepted and desirable benefits. However, in general terms, the datification of life has made people to lose some awareness of the risks involved in the massive analysis of data regarding their fundamental rights. This fact is used by the companies involved in the data value chain to maximize their benefits although this implies the proliferation of negative externalities assumed by the information holders. The Colombian State has made great efforts regarding the protection of data and privacy, as demonstrated by Law 1266 of 2008 and Law 1581 of 2012, nevertheless, a deep literary review leads to conclude the need to adapt to the international contextSilva, Jesus-60750872-819f-4163-bbb8-c33aee0e2cf1-0Solano, Darwin-86b36b17-6546-4ba2-b51f-9fd6c1d6edf0-0Fernandez, Claudia-4fd410cf-da4b-40fd-8468-d5f32dccdfbf-0Romero, Ligia-4a5c7d67-e016-4781-b6d9-43f858ce2e2c-0Vargas Villa, Jesus-b77d96d8-0dcd-4a19-8751-3dd474b578a3-0engProcedia Computer ScienceAttribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2privacy preservingpersonal protectiondata and big datasensitive informationColombiaPrivacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia CaseArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersion[1] Política de Big Data. (2018). Revista Dinero. Recuperado de: https://www.dinero.com/pais/articulo/colombia-ya-tiene-politica-publica-debig-data/257479. [2] DNP. (2018). Documento CONPES 3920, Politica Nacional de Explotación de Datos (Big Data). Recuperado de: https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3920.pdf [3] Puldain Salvador, V. (2017). El futuro marco legal para la protección del acceso a los datos. Revista Ibero-Latinoamericana de Seguros, 26(47). [4] Supriyadi, D. (2017). Personal and Non Personal Data, In the context of Big Data. Tesis, Tilburg. 123. Sriramoju, S. B. (2017). Introduction to big data: infrastructure and networking considerations. Recuperado de: http://one.com.vn/sites/default/files/fileattached/catalog/introduction_to_big_data__infrastructure_and_networking_considerations.pdf [5] Lane, J., Stodden, V., Bender, S., & Nissenbaum, H. (2014). Privacy, big data, and the public good: Frameworks for engagement. New York, NY: Cambridge University Press. [6] John, L. K., Acquisti, A., & Loewenstein, G. (2009). The best of strangers: Context dependent willingness to divulge personal information. DOI: https://dx.doi.org/10.2139/ssrn.1430482 [7] Fuster, G. G., & Scherrer, A. (2015). Big Data and smart devices and their impact on privacy. Committee on Civil Liberties, Justice and Home Affairs (LIBE), Directorate-General for Internal Policies, European Parliament. Recuperado de: http://www. europarl. europa. eu/RegData/etudes/STUD/2015/536455/IPOL_STU (2015) 536455_EN. Pdf [8] Gellman, R. (2017). Fair information practices: A basic history. Recuperado de: https://bobgellman.com/rg-docs/rg-FIPshistory.pdf [9] Fernández, J. P. M. (2017). La protección de datos y los motores de búsqueda en Internet: Cuestiones actuales y perspectivas de futuro acerca del derecho al olvido/Data protection and Internet search engines: current issues and future perspectives about the right to be forgotten. Revista de Derecho Civil, 4(4), 181-209. Recuperado de: http://nreg.es/ojs/index.php/RDC/article/view/280/228. [10] Márquez Buitrago, f. (2016). Aplicación de la ley estatutaria 1581 de 2012 a la red social facebook en colombia. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (15), 1-31. DOI:10.15425/redecom.15.2016.04 [11] Daros, W. R. (2017). ¿ Qué es un marco teórico?. Enfoques, 14(1 y 2), 73-112 [12] Bayern, S. J. (2009). Rational Ignorance, Rational Closed-Mindedness, and Modern Economic Formalism in Contract Law. California Law Review, 97(3), 943-973. DOI: http://dx.doi.org/https://doi.org/10.15779/Z38TD7R [13] Daries, J. P., Reich, J., Waldo, J., Young, E. M., Whittinghill, J., Ho, A. D., & Chuang, I. (2014). Privacy, anonymity, and big data in the social sciences. Communications of the ACM, 57(9), 56-63. DOI: https://doi.org/10.1145/2643132 [14] Garriga Domínguez, A. (2016). Nuevos retos para la protección de datos personales. En la Era del Big Data y de la computación ubicua. Dykinson. [15] Viloria, A., & Viviana Robayo, P. (2016). Virtual Network Level of Application Composed IP Networks Connected with Systems - (NETS Peer-to- Peer). Indian Journal Of Science And Technology, 9(46). doi:10.17485/ijst/2016/v9i46/107376 [16] Gaitán-Angulo M., Cubillos Díaz J., Viloria A., Lis-Gutiérrez JP., Rodríguez-Garnica P.A. (2018) Bibliometric Analysis of Social Innovation and Complexity (Databases Scopus and Dialnet 2007–2017). In: Tan Y., Shi Y., Tang Q. (eds) Data Mining and Big Data. DMBD 2018. Lecture Notes in Computer Science, vol 10943. Springer, Cham [17] Albrecht, J. P. (2016). The EU’s New Data Protection Law–How A Directive Evolved Into A Regulation. Computer Law Review International, 17(2), 33-43. DOI: https://doi.org/10.9785/cri-2016-0202 [18] Canbay, Y., & Sağıroğlu, S. (2017). Big data anonymization with spark. In Computer Science and Engineering (UBMK), 2017 International Conference on (pp. 833-838). DOI: https://doi.org/10.1109/UBMK.2017.8093543 [19] Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. Privacy, big data, and the public good: Frameworks for engagement, 1, 44-75. [20] Puccinelli, O. R. (2015). El hábeas data a veinte años de su incorporación en la Constitución argentina. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (13), 1-25. DOI:10.15425/redecom.13.2015.02 [21] Leenes, R., & Kosta, E. (2015). Taming the cookie monster with dutch law–a tale of regulatory failure. Computer Law & Security Review, 31(3), 317-335. DOI: https://doi.org/10.1016/j.clsr.2015.01.004 [22] Leenes R. (2016). Explaining the Unknown: Accountability and Transparency in Big Data Land. Data Science Seminar, Tilburg. [23] Mayer-Schönberger, V., & Cukier, K. (2013). Big Data–A Revolution That Will Transform How We Live, Think and Work. Houghton Mifflin Harcourt. [24] Manrique Gómez, V. (2015). El derecho al olvido: análisis comparativo de las fuentes internacionales con la regulación colombiana. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (14), 1-25. DOI:10.15425/redecom.14.2015.09 [25] Parraguez Kobek, L., & Caldera, E. (2016). Cyber Security and Habeas Data: The Latin American response to information security and data protection. Recuperado de: https://ssrn.com/abstract=2868039 [26] Gil Gonzales, Elena. (2016). Big Data, Privacidad y Protección de Datos. Accesit en el premio de investigación, Agencia Española de Protección de Datos. [27] Gantz J, Reinsel D (2011). Extracting value from chaos. IDC iView, pp 1–12 Recuperado de: https://www.emcgrandprix.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf [28] Crawford, K., & Schultz, J. (2014). Big data and due process: Toward a framework to redress predictive privacy harms. BCL Rev., 55, 93. DOI: https://ssrn.com/abstract=2325784 [29] Floridi, L. (2002). "Data", article for the International Encyclopedia of the Social Sciences, 2nd edition, editor in chief William A. Darity (Detroit: Macmillan) [30] El Emam, K., & Álvarez, C. (2014). A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques. International Data Privacy Law, 5(1), 73-87. DOI: https://doi.org/10.1093/idpl/ipu033 [31] Jaramillo Romero, C. (2016). Derecho Fundamental al Hábeas Data:¿ Cómo se ha desarrollado y cuales han sido sus consecuencias en el ordenamiento jurídico colombiano?. Tesis de Grado. Recuperado de: https://repository.upb.edu.co/handle/20.500.11912/2877 [32] Hueso, L. C. (2017). Big data e inteligencia artificial. Una aproximación a su tratamiento jurídico desde los derechos fundamentales. Dilemata, (24), 131-150. Recuperado de: https://dialnet.unirioja.es/servlet/articulo?codigo=6066829 [33] Beavers, A. F. (2013). Floridi historizado: La cuestión del método, el estado de la profesión y la oportunidad de la filosofía de la información de Luciano Floridi. Escritos, 21(46), 39-68. Recuperado de: https://revistas.upb.edu.co/index.php/escritos/article/view/1782/1719 [34] Bennett, C. J., & Bayley, R. M. (2016). Privacy protection in the era of ‘big data’: regulatory challenges and social assessments. Exploring the Boundaries of Big Data, 205. Recuperado de: https://bartvandersloot.com/onewebmedia/Verkenning_32_Exploring_the_Boundaries_of_Big_Data.pdf#page=206 [35] Zarsky, T. Z. (2016). Incompatible: The GDPR in the Age of Big Data. Seton Hall L. Rev., 47, 995. Recuperado de: https://ssrn.com/abstract=3022646 [36] Zhang, X., Leckie, C., Dou, W., Chen, J., Kotagiri, R., & Salcic, Z. (2016). Scalable local-recoding anonymization using locality sensitive hashing for big data privacy preservation. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (pp. 1793-1802). ACM. DOI: https://doi.org/10.1145/2983323.2983841 [37] Engan, M. (2017). Big Data and GDPR. Tesis de maestría, University of Stavanger. Recuperado de: https://brage.bibsys.no/xmlui/handle/11250/2467489 [38] Forgó, N., Hänold, S., & Schütze, B. (2017). The Principle of Purpose Limitation and Big Data. In New Technology, Big Data and the Law (pp. 17-42). Springer, Singapore. [39] Hox, J. J., & Boeije, H. R. (2005). Data collection, primary versus secondary. Encyclopedia of social measurement, 1, 593. Recuperado de: https://dspace.library.uu.nl/bitstream/handle/1874/23634/hox_05_data+collection,primary+versus+secondary.pdf?sequence=1 [40] Gayo, M. R. (2017). Big data: hacia la protección de datos personales basada en una transparencia y responsabilidad aumentadas. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (17), 1-24. DOI:10.15425/redecom.17.2017.09. 59. [41] Gellert, R. (2018). Understanding the notion of risk in the General Data Protection Regulation. Computer Law & Security Review, 34(2), 279-288. DOI: https://doi.org/10.1016/j.clsr.2017.12.003 60.PublicationORIGINALPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdfPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdfapplication/pdf480566https://repositorio.cuc.edu.co/bitstreams/76e950aa-7ab6-4d90-9a7f-0ad1da740b26/download7967ac5a9a595ae7977f82420c8b384bMD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.cuc.edu.co/bitstreams/b17a52bb-2192-455c-9471-f9e9db285237/download4460e5956bc1d1639be9ae6146a50347MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.cuc.edu.co/bitstreams/013cafd6-a52e-4922-8bc0-1b4790cab383/download8a4605be74aa9ea9d79846c1fba20a33MD53THUMBNAILPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdf.jpgPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdf.jpgimage/jpeg45672https://repositorio.cuc.edu.co/bitstreams/ff8682e6-3568-493b-a87d-104cdec21806/download080c99c5d3995fdd3da636ca170bc8acMD55TEXTPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdf.txtPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdf.txttext/plain27246https://repositorio.cuc.edu.co/bitstreams/6501b097-c5d4-4cf2-b388-5f0185177d59/download9fc407bf3b33418d6d74112249285623MD5611323/4836oai:repositorio.cuc.edu.co:11323/48362024-09-17 14:05:41.767http://creativecommons.org/licenses/by-nc-nd/4.0/Attribution-NonCommercial-NoDerivatives 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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