dc.creatorSilva, Jesus
dc.creatorSolano, Darwin
dc.creatorFernandez, Claudia
dc.creatorRomero, Ligia
dc.creatorVargas Villa, Jesus
dc.date2019-06-10T13:52:48Z
dc.date2019-06-10T13:52:48Z
dc.date2019
dc.date.accessioned2023-10-03T19:39:52Z
dc.date.available2023-10-03T19:39:52Z
dc.identifier0000-2010
dc.identifierhttp://hdl.handle.net/11323/4836
dc.identifierCorporación Universidad de la Costa
dc.identifierREDICUC - Repositorio CUC
dc.identifierhttps://repositorio.cuc.edu.co/
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/9171183
dc.descriptionBig Data promises great socially accepted and desirable benefits. However, in general terms, the datification of life has made people to lose some awareness of the risks involved in the massive analysis of data regarding their fundamental rights. This fact is used by the companies involved in the data value chain to maximize their benefits although this implies the proliferation of negative externalities assumed by the information holders. The Colombian State has made great efforts regarding the protection of data and privacy, as demonstrated by Law 1266 of 2008 and Law 1581 of 2012, nevertheless, a deep literary review leads to conclude the need to adapt to the international context
dc.formatapplication/pdf
dc.languageeng
dc.publisherProcedia Computer Science
dc.relation[1] Política de Big Data. (2018). Revista Dinero. Recuperado de: https://www.dinero.com/pais/articulo/colombia-ya-tiene-politica-publica-debig-data/257479. [2] DNP. (2018). Documento CONPES 3920, Politica Nacional de Explotación de Datos (Big Data). Recuperado de: https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3920.pdf [3] Puldain Salvador, V. (2017). El futuro marco legal para la protección del acceso a los datos. Revista Ibero-Latinoamericana de Seguros, 26(47). [4] Supriyadi, D. (2017). Personal and Non Personal Data, In the context of Big Data. Tesis, Tilburg. 123. Sriramoju, S. B. (2017). Introduction to big data: infrastructure and networking considerations. Recuperado de: http://one.com.vn/sites/default/files/fileattached/catalog/introduction_to_big_data__infrastructure_and_networking_considerations.pdf [5] Lane, J., Stodden, V., Bender, S., & Nissenbaum, H. (2014). Privacy, big data, and the public good: Frameworks for engagement. New York, NY: Cambridge University Press. [6] John, L. K., Acquisti, A., & Loewenstein, G. (2009). The best of strangers: Context dependent willingness to divulge personal information. DOI: https://dx.doi.org/10.2139/ssrn.1430482 [7] Fuster, G. G., & Scherrer, A. (2015). Big Data and smart devices and their impact on privacy. Committee on Civil Liberties, Justice and Home Affairs (LIBE), Directorate-General for Internal Policies, European Parliament. Recuperado de: http://www. europarl. europa. eu/RegData/etudes/STUD/2015/536455/IPOL_STU (2015) 536455_EN. Pdf [8] Gellman, R. (2017). Fair information practices: A basic history. Recuperado de: https://bobgellman.com/rg-docs/rg-FIPshistory.pdf [9] Fernández, J. P. M. (2017). La protección de datos y los motores de búsqueda en Internet: Cuestiones actuales y perspectivas de futuro acerca del derecho al olvido/Data protection and Internet search engines: current issues and future perspectives about the right to be forgotten. Revista de Derecho Civil, 4(4), 181-209. Recuperado de: http://nreg.es/ojs/index.php/RDC/article/view/280/228. [10] Márquez Buitrago, f. (2016). Aplicación de la ley estatutaria 1581 de 2012 a la red social facebook en colombia. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (15), 1-31. DOI:10.15425/redecom.15.2016.04 [11] Daros, W. R. (2017). ¿ Qué es un marco teórico?. Enfoques, 14(1 y 2), 73-112 [12] Bayern, S. J. (2009). Rational Ignorance, Rational Closed-Mindedness, and Modern Economic Formalism in Contract Law. California Law Review, 97(3), 943-973. DOI: http://dx.doi.org/https://doi.org/10.15779/Z38TD7R [13] Daries, J. P., Reich, J., Waldo, J., Young, E. M., Whittinghill, J., Ho, A. D., & Chuang, I. (2014). Privacy, anonymity, and big data in the social sciences. Communications of the ACM, 57(9), 56-63. DOI: https://doi.org/10.1145/2643132 [14] Garriga Domínguez, A. (2016). Nuevos retos para la protección de datos personales. En la Era del Big Data y de la computación ubicua. Dykinson. [15] Viloria, A., & Viviana Robayo, P. (2016). Virtual Network Level of Application Composed IP Networks Connected with Systems - (NETS Peer-to- Peer). Indian Journal Of Science And Technology, 9(46). doi:10.17485/ijst/2016/v9i46/107376 [16] Gaitán-Angulo M., Cubillos Díaz J., Viloria A., Lis-Gutiérrez JP., Rodríguez-Garnica P.A. (2018) Bibliometric Analysis of Social Innovation and Complexity (Databases Scopus and Dialnet 2007–2017). In: Tan Y., Shi Y., Tang Q. (eds) Data Mining and Big Data. DMBD 2018. Lecture Notes in Computer Science, vol 10943. Springer, Cham [17] Albrecht, J. P. (2016). The EU’s New Data Protection Law–How A Directive Evolved Into A Regulation. Computer Law Review International, 17(2), 33-43. DOI: https://doi.org/10.9785/cri-2016-0202 [18] Canbay, Y., & Sağıroğlu, S. (2017). Big data anonymization with spark. In Computer Science and Engineering (UBMK), 2017 International Conference on (pp. 833-838). DOI: https://doi.org/10.1109/UBMK.2017.8093543 [19] Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. Privacy, big data, and the public good: Frameworks for engagement, 1, 44-75. [20] Puccinelli, O. R. (2015). El hábeas data a veinte años de su incorporación en la Constitución argentina. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (13), 1-25. DOI:10.15425/redecom.13.2015.02 [21] Leenes, R., & Kosta, E. (2015). Taming the cookie monster with dutch law–a tale of regulatory failure. Computer Law & Security Review, 31(3), 317-335. DOI: https://doi.org/10.1016/j.clsr.2015.01.004 [22] Leenes R. (2016). Explaining the Unknown: Accountability and Transparency in Big Data Land. Data Science Seminar, Tilburg. [23] Mayer-Schönberger, V., & Cukier, K. (2013). Big Data–A Revolution That Will Transform How We Live, Think and Work. Houghton Mifflin Harcourt. [24] Manrique Gómez, V. (2015). El derecho al olvido: análisis comparativo de las fuentes internacionales con la regulación colombiana. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (14), 1-25. DOI:10.15425/redecom.14.2015.09 [25] Parraguez Kobek, L., & Caldera, E. (2016). Cyber Security and Habeas Data: The Latin American response to information security and data protection. Recuperado de: https://ssrn.com/abstract=2868039 [26] Gil Gonzales, Elena. (2016). Big Data, Privacidad y Protección de Datos. Accesit en el premio de investigación, Agencia Española de Protección de Datos. [27] Gantz J, Reinsel D (2011). Extracting value from chaos. IDC iView, pp 1–12 Recuperado de: https://www.emcgrandprix.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf [28] Crawford, K., & Schultz, J. (2014). Big data and due process: Toward a framework to redress predictive privacy harms. BCL Rev., 55, 93. DOI: https://ssrn.com/abstract=2325784 [29] Floridi, L. (2002). "Data", article for the International Encyclopedia of the Social Sciences, 2nd edition, editor in chief William A. Darity (Detroit: Macmillan) [30] El Emam, K., & Álvarez, C. (2014). A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques. International Data Privacy Law, 5(1), 73-87. DOI: https://doi.org/10.1093/idpl/ipu033 [31] Jaramillo Romero, C. (2016). Derecho Fundamental al Hábeas Data:¿ Cómo se ha desarrollado y cuales han sido sus consecuencias en el ordenamiento jurídico colombiano?. Tesis de Grado. Recuperado de: https://repository.upb.edu.co/handle/20.500.11912/2877 [32] Hueso, L. C. (2017). Big data e inteligencia artificial. Una aproximación a su tratamiento jurídico desde los derechos fundamentales. Dilemata, (24), 131-150. Recuperado de: https://dialnet.unirioja.es/servlet/articulo?codigo=6066829 [33] Beavers, A. F. (2013). Floridi historizado: La cuestión del método, el estado de la profesión y la oportunidad de la filosofía de la información de Luciano Floridi. Escritos, 21(46), 39-68. Recuperado de: https://revistas.upb.edu.co/index.php/escritos/article/view/1782/1719 [34] Bennett, C. J., & Bayley, R. M. (2016). Privacy protection in the era of ‘big data’: regulatory challenges and social assessments. Exploring the Boundaries of Big Data, 205. Recuperado de: https://bartvandersloot.com/onewebmedia/Verkenning_32_Exploring_the_Boundaries_of_Big_Data.pdf#page=206 [35] Zarsky, T. Z. (2016). Incompatible: The GDPR in the Age of Big Data. Seton Hall L. Rev., 47, 995. Recuperado de: https://ssrn.com/abstract=3022646 [36] Zhang, X., Leckie, C., Dou, W., Chen, J., Kotagiri, R., & Salcic, Z. (2016). Scalable local-recoding anonymization using locality sensitive hashing for big data privacy preservation. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (pp. 1793-1802). ACM. DOI: https://doi.org/10.1145/2983323.2983841 [37] Engan, M. (2017). Big Data and GDPR. Tesis de maestría, University of Stavanger. Recuperado de: https://brage.bibsys.no/xmlui/handle/11250/2467489 [38] Forgó, N., Hänold, S., & Schütze, B. (2017). The Principle of Purpose Limitation and Big Data. In New Technology, Big Data and the Law (pp. 17-42). Springer, Singapore. [39] Hox, J. J., & Boeije, H. R. (2005). Data collection, primary versus secondary. Encyclopedia of social measurement, 1, 593. Recuperado de: https://dspace.library.uu.nl/bitstream/handle/1874/23634/hox_05_data+collection,primary+versus+secondary.pdf?sequence=1 [40] Gayo, M. R. (2017). Big data: hacia la protección de datos personales basada en una transparencia y responsabilidad aumentadas. Revista De Derecho Comunicaciones Y Nuevas Tecnologías, (17), 1-24. DOI:10.15425/redecom.17.2017.09. 59. [41] Gellert, R. (2018). Understanding the notion of risk in the General Data Protection Regulation. Computer Law & Security Review, 34(2), 279-288. DOI: https://doi.org/10.1016/j.clsr.2017.12.003 60.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightshttp://purl.org/coar/access_right/c_abf2
dc.subjectprivacy preserving
dc.subjectpersonal protection
dc.subjectdata and big data
dc.subjectsensitive information
dc.subjectColombia
dc.titlePrivacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case
dc.typeArtículo de revista
dc.typehttp://purl.org/coar/resource_type/c_6501
dc.typeText
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typehttp://purl.org/redcol/resource_type/ART
dc.typeinfo:eu-repo/semantics/acceptedVersion
dc.typehttp://purl.org/coar/version/c_ab4af688f83e57aa


Este ítem pertenece a la siguiente institución