Analyzing Data Ethics and Privacy in Healthcare and Data Companies
VerifiedAdded on 2021/02/20
|9
|2904
|70
Case Study
AI Summary
This case study examines data ethics and privacy through the lens of Acxiom and hospital scenarios. It explores the ethical implications of employers analyzing patient data, the use of sensitive attributes like chronic illness and marital status, and measures to protect patient data. The study delves into Acxiom's role in securing customer data, the government's access to private sector data, and the organizational measures needed to assess private data for security reasons. The analysis covers topics such as employee training, BYOD policies, password security, and data classification to mitigate risks. The study emphasizes the importance of ethical data handling, privacy principles, and security practices to ensure responsible data management in both healthcare and data-driven organizations.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Data ethics and
privacy
privacy
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
INTRODUCTION...........................................................................................................................1
CASE-STUDY.................................................................................................................................1
1.1 Justify the point is it ethical for employer to analyze patients to detect access to
pornography................................................................................................................................1
1.2 Analytical solution for the above scenario............................................................................1
CASE-STUDY 2..............................................................................................................................2
2.1 Using attributes like chronic illness, weight and marital status is ethical within the
organization.................................................................................................................................2
2.2 Giving consideration on the above scenario.........................................................................3
2.3 Alternatives and classify the model as a data scientist.........................................................3
2.4 Discuss the measures that the hospital can taken to protect their patients data from being
used unethically...........................................................................................................................3
CASE-STUDY 3..............................................................................................................................3
3.1 What should Acxiom can perform to increase the security and privacy of its customer
data..............................................................................................................................................3
3.2 Should government have access to private sector data.........................................................4
3.3 What measures can organization might need assess to private data for security reasons.....4
CONCLUSION................................................................................................................................5
REFERENCES................................................................................................................................6
INTRODUCTION...........................................................................................................................1
CASE-STUDY.................................................................................................................................1
1.1 Justify the point is it ethical for employer to analyze patients to detect access to
pornography................................................................................................................................1
1.2 Analytical solution for the above scenario............................................................................1
CASE-STUDY 2..............................................................................................................................2
2.1 Using attributes like chronic illness, weight and marital status is ethical within the
organization.................................................................................................................................2
2.2 Giving consideration on the above scenario.........................................................................3
2.3 Alternatives and classify the model as a data scientist.........................................................3
2.4 Discuss the measures that the hospital can taken to protect their patients data from being
used unethically...........................................................................................................................3
CASE-STUDY 3..............................................................................................................................3
3.1 What should Acxiom can perform to increase the security and privacy of its customer
data..............................................................................................................................................3
3.2 Should government have access to private sector data.........................................................4
3.3 What measures can organization might need assess to private data for security reasons.....4
CONCLUSION................................................................................................................................5
REFERENCES................................................................................................................................6

INTRODUCTION
These days technology is become more important part of human beings. In other words,
along with technology data ethics are also translated into sound business practices to ensure that
the both internal and external interests are saved and secured. In the context of human elements,
data ethics should be central consideration for companies and individuals developing or
deploying AI. Although every organization should acquire practices of ethical data to establish
policies and processes. The basic purpose of data ethics is to prevent data of the organization as
well as consumers. Present study will be base on the data ethics in the context of Acxiom which
is solution based company and secured services including data On boarding. Therefore the
present study will be addressing the following questions which is based on the Acxiom case
study. It will be justifying the whether employer need to monitor patients on accessing
pornography. Also, It will explain the systems and steps which Acxiom required to take for
securing the customer data.
CASE-STUDY
1.1 Justify the point is it ethical for employer to analyse patients to detect access to pornography.
E-mail and the use of internet services is the daily routine for the patients. Because of the
speed and email services, e-mail has replaced the inter office memorandum as the preferred
method of communication in corporate business (Wilka, Landy and McKinney, 2017). However,
in this situation problem has arise when patients misuse such data and security with their own
negative interest which is absolutely illegal (Atinuke and Titilope, 2015). So for reducing such
activities the proactive decision taken by the organization is correct for their patients. Many of
the organization in UK has following such kind of action to monitor their patients. Another
reason for patient monitoring is that security which is a another most important reason for the
organization to adopt this step to taken some strict action against patients. By the help of this
hospitals could detect those patients sooner who get access to pornography because this is the
misuse of technology for own interest which is totally illegal (Wieringa and et.al., 2019).
1.2 Analytical solution for the above scenario.
Organization involves operational as well as strategic risk by using big data techniques
and increased reputation al risk. In within the hospitals there are more and emerging challenges
that has been faced by the hospitals within the ethical manner. The ethical protection is necessary
for the companies for sustaining the intensive environment (Braganza and et.al., 2017).
1
These days technology is become more important part of human beings. In other words,
along with technology data ethics are also translated into sound business practices to ensure that
the both internal and external interests are saved and secured. In the context of human elements,
data ethics should be central consideration for companies and individuals developing or
deploying AI. Although every organization should acquire practices of ethical data to establish
policies and processes. The basic purpose of data ethics is to prevent data of the organization as
well as consumers. Present study will be base on the data ethics in the context of Acxiom which
is solution based company and secured services including data On boarding. Therefore the
present study will be addressing the following questions which is based on the Acxiom case
study. It will be justifying the whether employer need to monitor patients on accessing
pornography. Also, It will explain the systems and steps which Acxiom required to take for
securing the customer data.
CASE-STUDY
1.1 Justify the point is it ethical for employer to analyse patients to detect access to pornography.
E-mail and the use of internet services is the daily routine for the patients. Because of the
speed and email services, e-mail has replaced the inter office memorandum as the preferred
method of communication in corporate business (Wilka, Landy and McKinney, 2017). However,
in this situation problem has arise when patients misuse such data and security with their own
negative interest which is absolutely illegal (Atinuke and Titilope, 2015). So for reducing such
activities the proactive decision taken by the organization is correct for their patients. Many of
the organization in UK has following such kind of action to monitor their patients. Another
reason for patient monitoring is that security which is a another most important reason for the
organization to adopt this step to taken some strict action against patients. By the help of this
hospitals could detect those patients sooner who get access to pornography because this is the
misuse of technology for own interest which is totally illegal (Wieringa and et.al., 2019).
1.2 Analytical solution for the above scenario.
Organization involves operational as well as strategic risk by using big data techniques
and increased reputation al risk. In within the hospitals there are more and emerging challenges
that has been faced by the hospitals within the ethical manner. The ethical protection is necessary
for the companies for sustaining the intensive environment (Braganza and et.al., 2017).
1

Technology driven and information intensive business operations and makes the study more
effective and approachable. In order to protect illegal activities within the organization it is
helpful to understand international data privacy principles for establishing and maintaining data
privacy policies and operating standards and litigation measures. However, such organizational
objectives is helpful make better understanding and results. In other words, privacy and ethics
are related to aspect of trust and accountability of the people (Deibert and Villeneuve, 2016).
Besides that, it also very effective and leading to make the systematic performance within the
organization context to make the systematic goals and objectives. Apart from this business
regulations can effectively present the high security risk and fulfil the business ethics. According
to which it is helpful to protect the unethical practices within the organization.
CASE-STUDY 2
2.1 Using attributes like chronic illness, weight and marital status is ethical within the
organization.
In within hospitals to pretend wrong disease to doctors is ethically not correct if it is done
by any patient. In other words, it also not good for the any people who misconduct with the
hospitals for the consideration of false judgement. Experience in addressing the chronic disease
is also very risky behaviour if any patient did this with the consideration of the business goals.
Along with that, it makes the good outcomes which represents the best dealing process. To make
false representation to the studies give wrong message to the hospitals (Edelenbos van Meerkerk
and Schenk, 2018). Ethics is the branch of philosophy which uses the systematic approach to
handle the situational task to make the good goals. Chronic disease include conditions which
better give the negative impact on the better service and goals. Basic the main purpose is to make
sure that the confidentiality is very necessary to understand the aim of the research goals. Wrong
and misconduct behaviour is obvious not tolerable within any organization also it makes deep
understanding and given the less effective goals. Along with this make the things more
considerable effective and long lasting. If patient having serious problem of nay medical issues
in this case it is the responsibility of the organization to control the effective measures and
optimization (Elvy, 2017). However this has been considered that it is very much required to be
very specific in terms of making high conventional goals to be more energetic and following
effective targets.
2
effective and approachable. In order to protect illegal activities within the organization it is
helpful to understand international data privacy principles for establishing and maintaining data
privacy policies and operating standards and litigation measures. However, such organizational
objectives is helpful make better understanding and results. In other words, privacy and ethics
are related to aspect of trust and accountability of the people (Deibert and Villeneuve, 2016).
Besides that, it also very effective and leading to make the systematic performance within the
organization context to make the systematic goals and objectives. Apart from this business
regulations can effectively present the high security risk and fulfil the business ethics. According
to which it is helpful to protect the unethical practices within the organization.
CASE-STUDY 2
2.1 Using attributes like chronic illness, weight and marital status is ethical within the
organization.
In within hospitals to pretend wrong disease to doctors is ethically not correct if it is done
by any patient. In other words, it also not good for the any people who misconduct with the
hospitals for the consideration of false judgement. Experience in addressing the chronic disease
is also very risky behaviour if any patient did this with the consideration of the business goals.
Along with that, it makes the good outcomes which represents the best dealing process. To make
false representation to the studies give wrong message to the hospitals (Edelenbos van Meerkerk
and Schenk, 2018). Ethics is the branch of philosophy which uses the systematic approach to
handle the situational task to make the good goals. Chronic disease include conditions which
better give the negative impact on the better service and goals. Basic the main purpose is to make
sure that the confidentiality is very necessary to understand the aim of the research goals. Wrong
and misconduct behaviour is obvious not tolerable within any organization also it makes deep
understanding and given the less effective goals. Along with this make the things more
considerable effective and long lasting. If patient having serious problem of nay medical issues
in this case it is the responsibility of the organization to control the effective measures and
optimization (Elvy, 2017). However this has been considered that it is very much required to be
very specific in terms of making high conventional goals to be more energetic and following
effective targets.
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

2.2 Giving consideration on the above scenario.
In terms of hospital medical ethics and ethical challenges arising in daily clinical care,
apart from this it also basically involves the basic environment. Medical ethics is a system of
moral principles that apply values to the practice of clinical medicine and in scientific research.
These values include the respect for autonomy non maleficence, beneficence and justice. Along
with that, it basically makes the long effect on the study which more effectively useful. However,
in this clinical background of the results must be cleared the aim of the study and better
understand the aims and objectives of the results (Goebel and Tran, 2016). Hospital should
follow the ethical circumstances to moderately be more loyal and behave ethically.
2.3 Alternatives and classify the model as a data scientist.
Along with that, it helps to basically makes the things in more appropriate manner.
Opportunity and goals all along it is also very important for the business to better affect the aim
of the study. Eventually it declares that how much business required to understand the objectives
and task to be more sufficient and effectively managed. Along with that, the main purpose of
data classification is to protect the security initiatives. But data may be classified for a number of
reasons including ease of access. Somehow it maintains the regulatory compliance in an efficient
growth. In order to secure the data (Hernández, 2016). According to me hospital should need to
acquire some following classifications like restricted data, Private data and public data.
2.4 Discuss the measures that the hospital can taken to protect their patients data from being used
unethically.
Electronic health records (EHRs) provides benefits for patients, physicians and clinical
teams. This method or a application helps to protect how to protect patient data and security
measures within the organization. This application or data helps and ensure the better able to
satisfy such external functions than to ensure that patient care needs are met. In many of the
health care organization this application has been used effectively (Khokhar and et.al., 2016).
Technologies can introduce some hazards hence safety of information in the system in real
challenge.
CASE-STUDY 3
3.1 What should Acxiom can perform to increase the security and privacy of its customer data.
Acxiom should manage the records and haver to ensure that right person has rights to
access particular information. It has to categorise people so that confidential details of people can
3
In terms of hospital medical ethics and ethical challenges arising in daily clinical care,
apart from this it also basically involves the basic environment. Medical ethics is a system of
moral principles that apply values to the practice of clinical medicine and in scientific research.
These values include the respect for autonomy non maleficence, beneficence and justice. Along
with that, it basically makes the long effect on the study which more effectively useful. However,
in this clinical background of the results must be cleared the aim of the study and better
understand the aims and objectives of the results (Goebel and Tran, 2016). Hospital should
follow the ethical circumstances to moderately be more loyal and behave ethically.
2.3 Alternatives and classify the model as a data scientist.
Along with that, it helps to basically makes the things in more appropriate manner.
Opportunity and goals all along it is also very important for the business to better affect the aim
of the study. Eventually it declares that how much business required to understand the objectives
and task to be more sufficient and effectively managed. Along with that, the main purpose of
data classification is to protect the security initiatives. But data may be classified for a number of
reasons including ease of access. Somehow it maintains the regulatory compliance in an efficient
growth. In order to secure the data (Hernández, 2016). According to me hospital should need to
acquire some following classifications like restricted data, Private data and public data.
2.4 Discuss the measures that the hospital can taken to protect their patients data from being used
unethically.
Electronic health records (EHRs) provides benefits for patients, physicians and clinical
teams. This method or a application helps to protect how to protect patient data and security
measures within the organization. This application or data helps and ensure the better able to
satisfy such external functions than to ensure that patient care needs are met. In many of the
health care organization this application has been used effectively (Khokhar and et.al., 2016).
Technologies can introduce some hazards hence safety of information in the system in real
challenge.
CASE-STUDY 3
3.1 What should Acxiom can perform to increase the security and privacy of its customer data.
Acxiom should manage the records and haver to ensure that right person has rights to
access particular information. It has to categorise people so that confidential details of people can
3

be kept secure. Employees those who have no work with customer data must not get access of
these records. Hence Acxiom should maintain credential hygiene for securing data base of
consumers. Furthermore, Acxiom should update its computers in which customer’s data are
stored so that no virus can attack or issues like hacking of data take place. In addition, managers
should take regular backup of data (Lipman, 2015). Hence risk that occur due to loss of data
would not take place and details of consumers will not be misused by the customers. Companies
should install anti-virus in their all computers so that no authorised access can be done and
confidential details can be remaining protected. By using firewall such details can be kept
protected and companies can manage the data of consumers in the future in significant manner.
There should be advance privacy setting by Acxiom so that if any third person try to enter into
system then it is caught immediately.
3.2 Should government have access to private sector data.
Yes, government should have access to private sector because if they have all the details
of private sector then terrorism activities can be minimised. In addition, they are the right
authorities those who can control over cyber-crime activities by having access of all companies
which are operating in the private sector (Malcolm, 2017). If government has power to use that
data, then these authorities can protect public from big frauds. Government can make effective
laws by looking at these confidential details and can control over unauthorised access of data by
hackers those who misuse that data for their personal use. But there is need to maintain
transparency by making formal policies regarding uses of such information. By using such
details or monitoring such data government can be in position to fight back with the problems
like cybercrimes.
3.3 What measures can organization might need assess to private data for security reasons.
Police department, cyber team, Federal bank, transportation authority must have the data
of private sector. If these firms are monitoring data of all individuals, then it would be helpful in
keeping eye over everyone and if anyone’s personal information is being used then these
authorities will be in position to track the wrong person and take the immediate action so that
crime can be avoided (Sullivan and et.al., 2017). In order to protect the company essential data
some following activities can be taken and adopted by the organization. Like as given below:
Educate employees on best network security practices : This is the first measure that can be
adopted by the organization. Trend gaining momentum, employees are free to work from their
4
these records. Hence Acxiom should maintain credential hygiene for securing data base of
consumers. Furthermore, Acxiom should update its computers in which customer’s data are
stored so that no virus can attack or issues like hacking of data take place. In addition, managers
should take regular backup of data (Lipman, 2015). Hence risk that occur due to loss of data
would not take place and details of consumers will not be misused by the customers. Companies
should install anti-virus in their all computers so that no authorised access can be done and
confidential details can be remaining protected. By using firewall such details can be kept
protected and companies can manage the data of consumers in the future in significant manner.
There should be advance privacy setting by Acxiom so that if any third person try to enter into
system then it is caught immediately.
3.2 Should government have access to private sector data.
Yes, government should have access to private sector because if they have all the details
of private sector then terrorism activities can be minimised. In addition, they are the right
authorities those who can control over cyber-crime activities by having access of all companies
which are operating in the private sector (Malcolm, 2017). If government has power to use that
data, then these authorities can protect public from big frauds. Government can make effective
laws by looking at these confidential details and can control over unauthorised access of data by
hackers those who misuse that data for their personal use. But there is need to maintain
transparency by making formal policies regarding uses of such information. By using such
details or monitoring such data government can be in position to fight back with the problems
like cybercrimes.
3.3 What measures can organization might need assess to private data for security reasons.
Police department, cyber team, Federal bank, transportation authority must have the data
of private sector. If these firms are monitoring data of all individuals, then it would be helpful in
keeping eye over everyone and if anyone’s personal information is being used then these
authorities will be in position to track the wrong person and take the immediate action so that
crime can be avoided (Sullivan and et.al., 2017). In order to protect the company essential data
some following activities can be taken and adopted by the organization. Like as given below:
Educate employees on best network security practices : This is the first measure that can be
adopted by the organization. Trend gaining momentum, employees are free to work from their
4

laptops, smartphones and mobile devices within the officer premises. Also it is required for
employer to make their employees trained for the effective business task to evaluate high
professional goals.
Create a BYOD policy : This can be second method that can take by the organization. By the
help of this model which is Bring Your Own Device. This model help to take free to work from
their laptops, smart phones and mobile devices within the office premises that makes and give
the positive impact for the study (Turban and et.al., 2018). An idea about phishing emails should
be provided in advance and applications like Drobox, Own cloud and jungle disk. This type of
security regulations can help to protect the piracy within the organization.
Create a robust policy for handling sensitive data : Organization required to segregate
between its sensitive and non sensitive data to outline a strict process for handling important
information. Corporate data can be classified into public, private and restricted and security
measures can be enacted accordingly.
Focus on Password Security : Along with that, it also helps to control the effective learning
objective to present the high intentional and basic requirement is to elaborate the business goals
(Walsh, Parisi and Passerini, 2017). Keeping business password is helpful measures to elaborate
the high intentional goals to protect the data security.
CONCLUSION
On the basis of above report it has been analysed that how much ethical principles are
useful for the study in order to measure and ensure the ethical environment within the
organization. In other words, it is also measured and effectively useful to ensure how much
business facts is useful to approach the right decision. So In order to get the deep understanding
study has explained the ethical practices that should be followed by the business organization.
Also it can be say said how business organization can influence the business activities to be more
effectively makes and understand the purposeful goals. Study also observed that what ethics
should hospital need to acquire while treating patients. Apart from this, classification model can
be useful and measurable to gain the final aims of the research. Also it can be analysed that how
much business can effectively managed the systematic approach to protect ethical consideration.
5
employer to make their employees trained for the effective business task to evaluate high
professional goals.
Create a BYOD policy : This can be second method that can take by the organization. By the
help of this model which is Bring Your Own Device. This model help to take free to work from
their laptops, smart phones and mobile devices within the office premises that makes and give
the positive impact for the study (Turban and et.al., 2018). An idea about phishing emails should
be provided in advance and applications like Drobox, Own cloud and jungle disk. This type of
security regulations can help to protect the piracy within the organization.
Create a robust policy for handling sensitive data : Organization required to segregate
between its sensitive and non sensitive data to outline a strict process for handling important
information. Corporate data can be classified into public, private and restricted and security
measures can be enacted accordingly.
Focus on Password Security : Along with that, it also helps to control the effective learning
objective to present the high intentional and basic requirement is to elaborate the business goals
(Walsh, Parisi and Passerini, 2017). Keeping business password is helpful measures to elaborate
the high intentional goals to protect the data security.
CONCLUSION
On the basis of above report it has been analysed that how much ethical principles are
useful for the study in order to measure and ensure the ethical environment within the
organization. In other words, it is also measured and effectively useful to ensure how much
business facts is useful to approach the right decision. So In order to get the deep understanding
study has explained the ethical practices that should be followed by the business organization.
Also it can be say said how business organization can influence the business activities to be more
effectively makes and understand the purposeful goals. Study also observed that what ethics
should hospital need to acquire while treating patients. Apart from this, classification model can
be useful and measurable to gain the final aims of the research. Also it can be analysed that how
much business can effectively managed the systematic approach to protect ethical consideration.
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFERENCES
Books & Journals
Atinuke, A. A. and Titilope, A.O., 2015. Internet Access, use and Monitoring Policies in
Selected Organisations in Ibadan, Nigeria. Global Journal of Management And Business
Research.
Braganza, A. and et.al., 2017. Resource management in big data initiatives: Processes and
dynamic capabilities. Journal of Business Research. 70. pp.328-337.
Deibert, R. J. and Villeneuve, N., 2016. Firewalls and power: An overview of global state
censorship of the Internet. In Human rights in the digital age (pp. 125-138). Routledge-
Cavendish.
Edelenbos, J., van Meerkerk, I. and Schenk, T., 2018. The evolution of community self-
organization in interaction with government institutions: Cross-case insights from three
countries. The American Review of Public Administration, 48(1), pp.52-66.
Elvy, S. A., 2017. Paying for privacy and the personal data economy. Colum. L. Rev., 117,
p.1369.
Goebel, H. and Tran, L., 2016. Designing guidelines to monitor and measure the impacts of
ethical banks’ operations.
Hernández, W., 2016. An Empirical Assessment of Employee Cyberslacking in the Public
Sector.
Johnson, C. E., 2017. Meeting the ethical challenges of leadership: Casting light or shadow.
Sage Publications.
Khokhar, R. H. and et.al., 2016. Privacy-preserving data mashup model for trading person-
specific information. Electronic Commerce Research and Applications, 17, pp.19-37.
Lipman, R., 2015. Online Privacy and the Invisible Market for Our Data. Penn St. L. Rev., 120,
p.777.
Malcolm, D. B., 2017. Leadership in Information Technology: Leadership theories, perspectives
and ethical dilemmas. The Siegel Institute Journal of Applied Ethics. 2(1). p.1.
Sullivan, B. L. and et.al., 2017. Using open access observational data for conservation action: A
case study for birds. Biological Conservation, 208, pp.5-14.
Turban, E. and et.al., 2018. E-Commerce: Regulatory, Ethical, and Social Environments.
In Electronic Commerce 2018 (pp. 573-612). Springer, Cham.
6
Books & Journals
Atinuke, A. A. and Titilope, A.O., 2015. Internet Access, use and Monitoring Policies in
Selected Organisations in Ibadan, Nigeria. Global Journal of Management And Business
Research.
Braganza, A. and et.al., 2017. Resource management in big data initiatives: Processes and
dynamic capabilities. Journal of Business Research. 70. pp.328-337.
Deibert, R. J. and Villeneuve, N., 2016. Firewalls and power: An overview of global state
censorship of the Internet. In Human rights in the digital age (pp. 125-138). Routledge-
Cavendish.
Edelenbos, J., van Meerkerk, I. and Schenk, T., 2018. The evolution of community self-
organization in interaction with government institutions: Cross-case insights from three
countries. The American Review of Public Administration, 48(1), pp.52-66.
Elvy, S. A., 2017. Paying for privacy and the personal data economy. Colum. L. Rev., 117,
p.1369.
Goebel, H. and Tran, L., 2016. Designing guidelines to monitor and measure the impacts of
ethical banks’ operations.
Hernández, W., 2016. An Empirical Assessment of Employee Cyberslacking in the Public
Sector.
Johnson, C. E., 2017. Meeting the ethical challenges of leadership: Casting light or shadow.
Sage Publications.
Khokhar, R. H. and et.al., 2016. Privacy-preserving data mashup model for trading person-
specific information. Electronic Commerce Research and Applications, 17, pp.19-37.
Lipman, R., 2015. Online Privacy and the Invisible Market for Our Data. Penn St. L. Rev., 120,
p.777.
Malcolm, D. B., 2017. Leadership in Information Technology: Leadership theories, perspectives
and ethical dilemmas. The Siegel Institute Journal of Applied Ethics. 2(1). p.1.
Sullivan, B. L. and et.al., 2017. Using open access observational data for conservation action: A
case study for birds. Biological Conservation, 208, pp.5-14.
Turban, E. and et.al., 2018. E-Commerce: Regulatory, Ethical, and Social Environments.
In Electronic Commerce 2018 (pp. 573-612). Springer, Cham.
6

Walsh, D., Parisi, J. M. and Passerini, K., 2017. Privacy as a right or as a commodity in the
online world: the limits of regulatory reform and self-regulation. Electronic Commerce
Research. 17(2). pp.185-203.
Wieringa, J. and et.al., 2019. Data analytics in a privacy-concerned world. Journal of Business
Research.
Wilka, R., Landy, R. and McKinney, S. A., 2017. How Machines Learn: Where Do Companies
Get Data for Machine Learning and What Licenses Do They Need. Wash. JL Tech. &
Arts. 13. p.217.
7
online world: the limits of regulatory reform and self-regulation. Electronic Commerce
Research. 17(2). pp.185-203.
Wieringa, J. and et.al., 2019. Data analytics in a privacy-concerned world. Journal of Business
Research.
Wilka, R., Landy, R. and McKinney, S. A., 2017. How Machines Learn: Where Do Companies
Get Data for Machine Learning and What Licenses Do They Need. Wash. JL Tech. &
Arts. 13. p.217.
7
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.