Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
Big Data promises great socially accepted and desirable benefits. However, in general terms, the datification of life has made people to lose some awareness of the risks involved in the massive analysis of data regarding their fundamental rights. This fact is used by the companies involved in the da...
- Autores:
-
Silva, Jesus
Solano, Darwin
Fernandez, Claudia
Romero, Ligia
Vargas Villa, Jesus
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2019
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/4836
- Acceso en línea:
- https://hdl.handle.net/11323/4836
https://repositorio.cuc.edu.co/
- Palabra clave:
- privacy preserving
personal protection
data and big data
sensitive information
Colombia
- Rights
- openAccess
- License
- Attribution-NonCommercial-NoDerivatives 4.0 International
id |
RCUC2_19d60efaa995cf6bd7d5b7e0a933345a |
---|---|
oai_identifier_str |
oai:repositorio.cuc.edu.co:11323/4836 |
network_acronym_str |
RCUC2 |
network_name_str |
REDICUC - Repositorio CUC |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case |
title |
Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case |
spellingShingle |
Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case privacy preserving personal protection data and big data sensitive information Colombia |
title_short |
Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case |
title_full |
Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case |
title_fullStr |
Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case |
title_full_unstemmed |
Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case |
title_sort |
Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case |
dc.creator.fl_str_mv |
Silva, Jesus Solano, Darwin Fernandez, Claudia Romero, Ligia Vargas Villa, Jesus |
dc.contributor.author.spa.fl_str_mv |
Silva, Jesus Solano, Darwin Fernandez, Claudia Romero, Ligia Vargas Villa, Jesus |
dc.subject.spa.fl_str_mv |
privacy preserving personal protection data and big data sensitive information Colombia |
topic |
privacy preserving personal protection data and big data sensitive information Colombia |
description |
Big Data promises great socially accepted and desirable benefits. However, in general terms, the datification of life has made people to lose some awareness of the risks involved in the massive analysis of data regarding their fundamental rights. This fact is used by the companies involved in the data value chain to maximize their benefits although this implies the proliferation of negative externalities assumed by the information holders. The Colombian State has made great efforts regarding the protection of data and privacy, as demonstrated by Law 1266 of 2008 and Law 1581 of 2012, nevertheless, a deep literary review leads to conclude the need to adapt to the international context |
publishDate |
2019 |
dc.date.accessioned.none.fl_str_mv |
2019-06-10T13:52:48Z |
dc.date.available.none.fl_str_mv |
2019-06-10T13:52:48Z |
dc.date.issued.none.fl_str_mv |
2019 |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
acceptedVersion |
dc.identifier.issn.spa.fl_str_mv |
0000-2010 |
dc.identifier.uri.spa.fl_str_mv |
https://hdl.handle.net/11323/4836 |
dc.identifier.instname.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.identifier.reponame.spa.fl_str_mv |
REDICUC - Repositorio CUC |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.cuc.edu.co/ |
identifier_str_mv |
0000-2010 Corporación Universidad de la Costa REDICUC - Repositorio CUC |
url |
https://hdl.handle.net/11323/4836 https://repositorio.cuc.edu.co/ |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.relation.references.spa.fl_str_mv |
[1] Política de Big Data. (2018). Revista Dinero. Recuperado de: https://www.dinero.com/pais/articulo/colombia-ya-tiene-politica-publica-debig-data/257479. [2] DNP. (2018). Documento CONPES 3920, Politica Nacional de Explotación de Datos (Big Data). Recuperado de: https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3920.pdf [3] Puldain Salvador, V. (2017). El futuro marco legal para la protección del acceso a los datos. Revista Ibero-Latinoamericana de Seguros, 26(47). [4] Supriyadi, D. (2017). Personal and Non Personal Data, In the context of Big Data. Tesis, Tilburg. 123. Sriramoju, S. B. (2017). Introduction to big data: infrastructure and networking considerations. Recuperado de: http://one.com.vn/sites/default/files/fileattached/catalog/introduction_to_big_data__infrastructure_and_networking_considerations.pdf [5] Lane, J., Stodden, V., Bender, S., & Nissenbaum, H. (2014). Privacy, big data, and the public good: Frameworks for engagement. New York, NY: Cambridge University Press. [6] John, L. K., Acquisti, A., & Loewenstein, G. (2009). The best of strangers: Context dependent willingness to divulge personal information. DOI: https://dx.doi.org/10.2139/ssrn.1430482 [7] Fuster, G. G., & Scherrer, A. (2015). Big Data and smart devices and their impact on privacy. Committee on Civil Liberties, Justice and Home Affairs (LIBE), Directorate-General for Internal Policies, European Parliament. Recuperado de: http://www. europarl. europa. eu/RegData/etudes/STUD/2015/536455/IPOL_STU (2015) 536455_EN. Pdf [8] Gellman, R. (2017). Fair information practices: A basic history. Recuperado de: https://bobgellman.com/rg-docs/rg-FIPshistory.pdf [9] Fernández, J. P. M. (2017). La protección de datos y los motores de búsqueda en Internet: Cuestiones actuales y perspectivas de futuro acerca del derecho al olvido/Data protection and Internet search engines: current issues and future perspectives about the right to be forgotten. Revista de Derecho Civil, 4(4), 181-209. Recuperado de: http://nreg.es/ojs/index.php/RDC/article/view/280/228. [10] Márquez Buitrago, f. (2016). Aplicación de la ley estatutaria 1581 de 2012 a la red social facebook en colombia. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (15), 1-31. DOI:10.15425/redecom.15.2016.04 [11] Daros, W. R. (2017). ¿ Qué es un marco teórico?. Enfoques, 14(1 y 2), 73-112 [12] Bayern, S. J. (2009). Rational Ignorance, Rational Closed-Mindedness, and Modern Economic Formalism in Contract Law. California Law Review, 97(3), 943-973. DOI: http://dx.doi.org/https://doi.org/10.15779/Z38TD7R [13] Daries, J. P., Reich, J., Waldo, J., Young, E. M., Whittinghill, J., Ho, A. D., & Chuang, I. (2014). Privacy, anonymity, and big data in the social sciences. Communications of the ACM, 57(9), 56-63. DOI: https://doi.org/10.1145/2643132 [14] Garriga Domínguez, A. (2016). Nuevos retos para la protección de datos personales. En la Era del Big Data y de la computación ubicua. Dykinson. [15] Viloria, A., & Viviana Robayo, P. (2016). Virtual Network Level of Application Composed IP Networks Connected with Systems - (NETS Peer-to- Peer). Indian Journal Of Science And Technology, 9(46). doi:10.17485/ijst/2016/v9i46/107376 [16] Gaitán-Angulo M., Cubillos Díaz J., Viloria A., Lis-Gutiérrez JP., Rodríguez-Garnica P.A. (2018) Bibliometric Analysis of Social Innovation and Complexity (Databases Scopus and Dialnet 2007–2017). In: Tan Y., Shi Y., Tang Q. (eds) Data Mining and Big Data. DMBD 2018. Lecture Notes in Computer Science, vol 10943. Springer, Cham [17] Albrecht, J. P. (2016). The EU’s New Data Protection Law–How A Directive Evolved Into A Regulation. Computer Law Review International, 17(2), 33-43. DOI: https://doi.org/10.9785/cri-2016-0202 [18] Canbay, Y., & Sağıroğlu, S. (2017). Big data anonymization with spark. In Computer Science and Engineering (UBMK), 2017 International Conference on (pp. 833-838). DOI: https://doi.org/10.1109/UBMK.2017.8093543 [19] Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. Privacy, big data, and the public good: Frameworks for engagement, 1, 44-75. [20] Puccinelli, O. R. (2015). El hábeas data a veinte años de su incorporación en la Constitución argentina. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (13), 1-25. DOI:10.15425/redecom.13.2015.02 [21] Leenes, R., & Kosta, E. (2015). Taming the cookie monster with dutch law–a tale of regulatory failure. Computer Law & Security Review, 31(3), 317-335. DOI: https://doi.org/10.1016/j.clsr.2015.01.004 [22] Leenes R. (2016). Explaining the Unknown: Accountability and Transparency in Big Data Land. Data Science Seminar, Tilburg. [23] Mayer-Schönberger, V., & Cukier, K. (2013). Big Data–A Revolution That Will Transform How We Live, Think and Work. Houghton Mifflin Harcourt. [24] Manrique Gómez, V. (2015). El derecho al olvido: análisis comparativo de las fuentes internacionales con la regulación colombiana. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (14), 1-25. DOI:10.15425/redecom.14.2015.09 [25] Parraguez Kobek, L., & Caldera, E. (2016). Cyber Security and Habeas Data: The Latin American response to information security and data protection. Recuperado de: https://ssrn.com/abstract=2868039 [26] Gil Gonzales, Elena. (2016). Big Data, Privacidad y Protección de Datos. Accesit en el premio de investigación, Agencia Española de Protección de Datos. [27] Gantz J, Reinsel D (2011). Extracting value from chaos. IDC iView, pp 1–12 Recuperado de: https://www.emcgrandprix.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf [28] Crawford, K., & Schultz, J. (2014). Big data and due process: Toward a framework to redress predictive privacy harms. BCL Rev., 55, 93. DOI: https://ssrn.com/abstract=2325784 [29] Floridi, L. (2002). "Data", article for the International Encyclopedia of the Social Sciences, 2nd edition, editor in chief William A. Darity (Detroit: Macmillan) [30] El Emam, K., & Álvarez, C. (2014). A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques. International Data Privacy Law, 5(1), 73-87. DOI: https://doi.org/10.1093/idpl/ipu033 [31] Jaramillo Romero, C. (2016). Derecho Fundamental al Hábeas Data:¿ Cómo se ha desarrollado y cuales han sido sus consecuencias en el ordenamiento jurídico colombiano?. Tesis de Grado. Recuperado de: https://repository.upb.edu.co/handle/20.500.11912/2877 [32] Hueso, L. C. (2017). Big data e inteligencia artificial. Una aproximación a su tratamiento jurídico desde los derechos fundamentales. Dilemata, (24), 131-150. Recuperado de: https://dialnet.unirioja.es/servlet/articulo?codigo=6066829 [33] Beavers, A. F. (2013). Floridi historizado: La cuestión del método, el estado de la profesión y la oportunidad de la filosofía de la información de Luciano Floridi. Escritos, 21(46), 39-68. Recuperado de: https://revistas.upb.edu.co/index.php/escritos/article/view/1782/1719 [34] Bennett, C. J., & Bayley, R. M. (2016). Privacy protection in the era of ‘big data’: regulatory challenges and social assessments. Exploring the Boundaries of Big Data, 205. Recuperado de: https://bartvandersloot.com/onewebmedia/Verkenning_32_Exploring_the_Boundaries_of_Big_Data.pdf#page=206 [35] Zarsky, T. Z. (2016). Incompatible: The GDPR in the Age of Big Data. Seton Hall L. Rev., 47, 995. Recuperado de: https://ssrn.com/abstract=3022646 [36] Zhang, X., Leckie, C., Dou, W., Chen, J., Kotagiri, R., & Salcic, Z. (2016). Scalable local-recoding anonymization using locality sensitive hashing for big data privacy preservation. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (pp. 1793-1802). ACM. DOI: https://doi.org/10.1145/2983323.2983841 [37] Engan, M. (2017). Big Data and GDPR. Tesis de maestría, University of Stavanger. Recuperado de: https://brage.bibsys.no/xmlui/handle/11250/2467489 [38] Forgó, N., Hänold, S., & Schütze, B. (2017). The Principle of Purpose Limitation and Big Data. In New Technology, Big Data and the Law (pp. 17-42). Springer, Singapore. [39] Hox, J. J., & Boeije, H. R. (2005). Data collection, primary versus secondary. Encyclopedia of social measurement, 1, 593. Recuperado de: https://dspace.library.uu.nl/bitstream/handle/1874/23634/hox_05_data+collection,primary+versus+secondary.pdf?sequence=1 [40] Gayo, M. R. (2017). Big data: hacia la protección de datos personales basada en una transparencia y responsabilidad aumentadas. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (17), 1-24. DOI:10.15425/redecom.17.2017.09. 59. [41] Gellert, R. (2018). Understanding the notion of risk in the General Data Protection Regulation. Computer Law & Security Review, 34(2), 279-288. DOI: https://doi.org/10.1016/j.clsr.2017.12.003 60. |
dc.rights.spa.fl_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.publisher.spa.fl_str_mv |
Procedia Computer Science |
institution |
Corporación Universidad de la Costa |
bitstream.url.fl_str_mv |
https://repositorio.cuc.edu.co/bitstreams/76e950aa-7ab6-4d90-9a7f-0ad1da740b26/download https://repositorio.cuc.edu.co/bitstreams/b17a52bb-2192-455c-9471-f9e9db285237/download https://repositorio.cuc.edu.co/bitstreams/013cafd6-a52e-4922-8bc0-1b4790cab383/download https://repositorio.cuc.edu.co/bitstreams/ff8682e6-3568-493b-a87d-104cdec21806/download https://repositorio.cuc.edu.co/bitstreams/6501b097-c5d4-4cf2-b388-5f0185177d59/download |
bitstream.checksum.fl_str_mv |
7967ac5a9a595ae7977f82420c8b384b 4460e5956bc1d1639be9ae6146a50347 8a4605be74aa9ea9d79846c1fba20a33 080c99c5d3995fdd3da636ca170bc8ac 9fc407bf3b33418d6d74112249285623 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio de la Universidad de la Costa CUC |
repository.mail.fl_str_mv |
repdigital@cuc.edu.co |
_version_ |
1811760824322097152 |
spelling |
Silva, JesusSolano, DarwinFernandez, ClaudiaRomero, LigiaVargas Villa, Jesus2019-06-10T13:52:48Z2019-06-10T13:52:48Z20190000-2010https://hdl.handle.net/11323/4836Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/Big Data promises great socially accepted and desirable benefits. However, in general terms, the datification of life has made people to lose some awareness of the risks involved in the massive analysis of data regarding their fundamental rights. This fact is used by the companies involved in the data value chain to maximize their benefits although this implies the proliferation of negative externalities assumed by the information holders. The Colombian State has made great efforts regarding the protection of data and privacy, as demonstrated by Law 1266 of 2008 and Law 1581 of 2012, nevertheless, a deep literary review leads to conclude the need to adapt to the international contextSilva, Jesus-60750872-819f-4163-bbb8-c33aee0e2cf1-0Solano, Darwin-86b36b17-6546-4ba2-b51f-9fd6c1d6edf0-0Fernandez, Claudia-4fd410cf-da4b-40fd-8468-d5f32dccdfbf-0Romero, Ligia-4a5c7d67-e016-4781-b6d9-43f858ce2e2c-0Vargas Villa, Jesus-b77d96d8-0dcd-4a19-8751-3dd474b578a3-0engProcedia Computer ScienceAttribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2privacy preservingpersonal protectiondata and big datasensitive informationColombiaPrivacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia CaseArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersion[1] Política de Big Data. (2018). Revista Dinero. Recuperado de: https://www.dinero.com/pais/articulo/colombia-ya-tiene-politica-publica-debig-data/257479. [2] DNP. (2018). Documento CONPES 3920, Politica Nacional de Explotación de Datos (Big Data). Recuperado de: https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3920.pdf [3] Puldain Salvador, V. (2017). El futuro marco legal para la protección del acceso a los datos. Revista Ibero-Latinoamericana de Seguros, 26(47). [4] Supriyadi, D. (2017). Personal and Non Personal Data, In the context of Big Data. Tesis, Tilburg. 123. Sriramoju, S. B. (2017). Introduction to big data: infrastructure and networking considerations. Recuperado de: http://one.com.vn/sites/default/files/fileattached/catalog/introduction_to_big_data__infrastructure_and_networking_considerations.pdf [5] Lane, J., Stodden, V., Bender, S., & Nissenbaum, H. (2014). Privacy, big data, and the public good: Frameworks for engagement. New York, NY: Cambridge University Press. [6] John, L. K., Acquisti, A., & Loewenstein, G. (2009). The best of strangers: Context dependent willingness to divulge personal information. DOI: https://dx.doi.org/10.2139/ssrn.1430482 [7] Fuster, G. G., & Scherrer, A. (2015). Big Data and smart devices and their impact on privacy. Committee on Civil Liberties, Justice and Home Affairs (LIBE), Directorate-General for Internal Policies, European Parliament. Recuperado de: http://www. europarl. europa. eu/RegData/etudes/STUD/2015/536455/IPOL_STU (2015) 536455_EN. Pdf [8] Gellman, R. (2017). Fair information practices: A basic history. Recuperado de: https://bobgellman.com/rg-docs/rg-FIPshistory.pdf [9] Fernández, J. P. M. (2017). La protección de datos y los motores de búsqueda en Internet: Cuestiones actuales y perspectivas de futuro acerca del derecho al olvido/Data protection and Internet search engines: current issues and future perspectives about the right to be forgotten. Revista de Derecho Civil, 4(4), 181-209. Recuperado de: http://nreg.es/ojs/index.php/RDC/article/view/280/228. [10] Márquez Buitrago, f. (2016). Aplicación de la ley estatutaria 1581 de 2012 a la red social facebook en colombia. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (15), 1-31. DOI:10.15425/redecom.15.2016.04 [11] Daros, W. R. (2017). ¿ Qué es un marco teórico?. Enfoques, 14(1 y 2), 73-112 [12] Bayern, S. J. (2009). Rational Ignorance, Rational Closed-Mindedness, and Modern Economic Formalism in Contract Law. California Law Review, 97(3), 943-973. DOI: http://dx.doi.org/https://doi.org/10.15779/Z38TD7R [13] Daries, J. P., Reich, J., Waldo, J., Young, E. M., Whittinghill, J., Ho, A. D., & Chuang, I. (2014). Privacy, anonymity, and big data in the social sciences. Communications of the ACM, 57(9), 56-63. DOI: https://doi.org/10.1145/2643132 [14] Garriga Domínguez, A. (2016). Nuevos retos para la protección de datos personales. En la Era del Big Data y de la computación ubicua. Dykinson. [15] Viloria, A., & Viviana Robayo, P. (2016). Virtual Network Level of Application Composed IP Networks Connected with Systems - (NETS Peer-to- Peer). Indian Journal Of Science And Technology, 9(46). doi:10.17485/ijst/2016/v9i46/107376 [16] Gaitán-Angulo M., Cubillos Díaz J., Viloria A., Lis-Gutiérrez JP., Rodríguez-Garnica P.A. (2018) Bibliometric Analysis of Social Innovation and Complexity (Databases Scopus and Dialnet 2007–2017). In: Tan Y., Shi Y., Tang Q. (eds) Data Mining and Big Data. DMBD 2018. Lecture Notes in Computer Science, vol 10943. Springer, Cham [17] Albrecht, J. P. (2016). The EU’s New Data Protection Law–How A Directive Evolved Into A Regulation. Computer Law Review International, 17(2), 33-43. DOI: https://doi.org/10.9785/cri-2016-0202 [18] Canbay, Y., & Sağıroğlu, S. (2017). Big data anonymization with spark. In Computer Science and Engineering (UBMK), 2017 International Conference on (pp. 833-838). DOI: https://doi.org/10.1109/UBMK.2017.8093543 [19] Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. Privacy, big data, and the public good: Frameworks for engagement, 1, 44-75. [20] Puccinelli, O. R. (2015). El hábeas data a veinte años de su incorporación en la Constitución argentina. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (13), 1-25. DOI:10.15425/redecom.13.2015.02 [21] Leenes, R., & Kosta, E. (2015). Taming the cookie monster with dutch law–a tale of regulatory failure. Computer Law & Security Review, 31(3), 317-335. DOI: https://doi.org/10.1016/j.clsr.2015.01.004 [22] Leenes R. (2016). Explaining the Unknown: Accountability and Transparency in Big Data Land. Data Science Seminar, Tilburg. [23] Mayer-Schönberger, V., & Cukier, K. (2013). Big Data–A Revolution That Will Transform How We Live, Think and Work. Houghton Mifflin Harcourt. [24] Manrique Gómez, V. (2015). El derecho al olvido: análisis comparativo de las fuentes internacionales con la regulación colombiana. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (14), 1-25. DOI:10.15425/redecom.14.2015.09 [25] Parraguez Kobek, L., & Caldera, E. (2016). Cyber Security and Habeas Data: The Latin American response to information security and data protection. Recuperado de: https://ssrn.com/abstract=2868039 [26] Gil Gonzales, Elena. (2016). Big Data, Privacidad y Protección de Datos. Accesit en el premio de investigación, Agencia Española de Protección de Datos. [27] Gantz J, Reinsel D (2011). Extracting value from chaos. IDC iView, pp 1–12 Recuperado de: https://www.emcgrandprix.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf [28] Crawford, K., & Schultz, J. (2014). Big data and due process: Toward a framework to redress predictive privacy harms. BCL Rev., 55, 93. DOI: https://ssrn.com/abstract=2325784 [29] Floridi, L. (2002). "Data", article for the International Encyclopedia of the Social Sciences, 2nd edition, editor in chief William A. Darity (Detroit: Macmillan) [30] El Emam, K., & Álvarez, C. (2014). A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques. International Data Privacy Law, 5(1), 73-87. DOI: https://doi.org/10.1093/idpl/ipu033 [31] Jaramillo Romero, C. (2016). Derecho Fundamental al Hábeas Data:¿ Cómo se ha desarrollado y cuales han sido sus consecuencias en el ordenamiento jurídico colombiano?. Tesis de Grado. Recuperado de: https://repository.upb.edu.co/handle/20.500.11912/2877 [32] Hueso, L. C. (2017). Big data e inteligencia artificial. Una aproximación a su tratamiento jurídico desde los derechos fundamentales. Dilemata, (24), 131-150. Recuperado de: https://dialnet.unirioja.es/servlet/articulo?codigo=6066829 [33] Beavers, A. F. (2013). Floridi historizado: La cuestión del método, el estado de la profesión y la oportunidad de la filosofía de la información de Luciano Floridi. Escritos, 21(46), 39-68. Recuperado de: https://revistas.upb.edu.co/index.php/escritos/article/view/1782/1719 [34] Bennett, C. J., & Bayley, R. M. (2016). Privacy protection in the era of ‘big data’: regulatory challenges and social assessments. Exploring the Boundaries of Big Data, 205. Recuperado de: https://bartvandersloot.com/onewebmedia/Verkenning_32_Exploring_the_Boundaries_of_Big_Data.pdf#page=206 [35] Zarsky, T. Z. (2016). Incompatible: The GDPR in the Age of Big Data. Seton Hall L. Rev., 47, 995. Recuperado de: https://ssrn.com/abstract=3022646 [36] Zhang, X., Leckie, C., Dou, W., Chen, J., Kotagiri, R., & Salcic, Z. (2016). Scalable local-recoding anonymization using locality sensitive hashing for big data privacy preservation. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (pp. 1793-1802). ACM. DOI: https://doi.org/10.1145/2983323.2983841 [37] Engan, M. (2017). Big Data and GDPR. Tesis de maestría, University of Stavanger. Recuperado de: https://brage.bibsys.no/xmlui/handle/11250/2467489 [38] Forgó, N., Hänold, S., & Schütze, B. (2017). The Principle of Purpose Limitation and Big Data. In New Technology, Big Data and the Law (pp. 17-42). Springer, Singapore. [39] Hox, J. J., & Boeije, H. R. (2005). Data collection, primary versus secondary. Encyclopedia of social measurement, 1, 593. Recuperado de: https://dspace.library.uu.nl/bitstream/handle/1874/23634/hox_05_data+collection,primary+versus+secondary.pdf?sequence=1 [40] Gayo, M. R. (2017). Big data: hacia la protección de datos personales basada en una transparencia y responsabilidad aumentadas. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (17), 1-24. DOI:10.15425/redecom.17.2017.09. 59. [41] Gellert, R. (2018). Understanding the notion of risk in the General Data Protection Regulation. Computer Law & Security Review, 34(2), 279-288. DOI: https://doi.org/10.1016/j.clsr.2017.12.003 60.PublicationORIGINALPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdfPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdfapplication/pdf480566https://repositorio.cuc.edu.co/bitstreams/76e950aa-7ab6-4d90-9a7f-0ad1da740b26/download7967ac5a9a595ae7977f82420c8b384bMD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.cuc.edu.co/bitstreams/b17a52bb-2192-455c-9471-f9e9db285237/download4460e5956bc1d1639be9ae6146a50347MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.cuc.edu.co/bitstreams/013cafd6-a52e-4922-8bc0-1b4790cab383/download8a4605be74aa9ea9d79846c1fba20a33MD53THUMBNAILPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdf.jpgPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdf.jpgimage/jpeg45672https://repositorio.cuc.edu.co/bitstreams/ff8682e6-3568-493b-a87d-104cdec21806/download080c99c5d3995fdd3da636ca170bc8acMD55TEXTPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdf.txtPrivacy Preserving, Protection of Personal Data, and Big Data a Review of the Colombia Case.pdf.txttext/plain27246https://repositorio.cuc.edu.co/bitstreams/6501b097-c5d4-4cf2-b388-5f0185177d59/download9fc407bf3b33418d6d74112249285623MD5611323/4836oai:repositorio.cuc.edu.co:11323/48362024-09-17 14:05:41.767http://creativecommons.org/licenses/by-nc-nd/4.0/Attribution-NonCommercial-NoDerivatives 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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 |