Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Material
Language
  • 1
    Article
    Article
    Associated volumes
    In:  Terrain : carnets du patrimoine ethnologique , No. 52 (2009), p. 142-151
    ISSN: 0760-5668
    Language: Undetermined
    Titel der Quelle: Terrain : carnets du patrimoine ethnologique
    Publ. der Quelle: Paris : Ministère
    Angaben zur Quelle: , No. 52 (2009), p. 142-151
    DDC: 390
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9789401773768
    Language: English
    Pages: 1 Online-Ressource (XX, 476 Seiten)
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, Governance and Technology Ser. v.24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Philosophy ; Electronic books ; Konferenzschrift ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: Intro -- Preface -- Contents -- Mind the Air Gap -- Abstract -- 1 Introduction -- 2 Privacy Concerns for Domestic Robots -- 3 Why Privacy Need Not Be a Problem: Unravelling the Arguments -- 4 Mind the Air Gap: Prevention Rather Than Cure -- 5 Air Gaps and Domestic and Service Robots: A Look at the Issues -- 6 The Weaknesses of Air Gaps Revisited -- 7 Conclusion: A Plea for Privacy Before Design -- Bibliography -- Europe Versus Facebook: An Imbroglio of EU Data Protection Issues -- Abstract -- 1 Introduction -- 2 The Safe Harbor Program -- 3 Factual and Legal Background -- 4 Comment and Analysis -- 4.1 Article 3 of the Safe Harbor Agreement -- 4.2 The EU Data Protection Directive -- 4.3 The EU Charter -- 5 Additional Issues -- 5.1 What if There Is no Transfer? -- 5.2 What if Facebook Inc. Must Comply with the Directive Pursuant to Article 4? -- 5.3 Can the DPAs Enforce Their Decisions? -- 6 Conclusion -- The Context-Dependence of Citizens' Attitudes and Preferences Regarding Privacy and Security -- Abstract -- 1 Introduction -- 2 Measuring People's Perceptions of Security Technologies -- 2.1 Operationalization of Privacy -- 2.2 Operationalization of Security -- 2.3 Vignettes as a Tool for Contextualisation -- 2.4 Data Collection -- 3 Descriptive Results -- 4 Determinant of Citizen's Acceptance of Specific Surveillance Oriented Security Technologies -- 4.1 Methodology -- 4.2 Results -- 5 Discussion of Results and Conclusions -- Bibliography -- On Locational Privacy in the Absence of Anonymous Payments -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Problem Space -- 2.2 Approach -- 2.3 Roaming -- 3 System Design -- 3.1 Group Signatures and XSGS -- 3.2 Bootstrapping the System -- 3.3 Setting up New Charging Stations -- 3.4 Decommission of Charging Stations -- 3.5 Ensuring Authenticity of Metering Data -- 3.6 Transmission of Metering Data.
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [s.l.] : Springer Netherlands
    ISBN: 1402069138
    Language: English
    Pages: Online Ressource (1994 KB, 404 S.)
    Edition: 1. Aufl.
    Edition: Online-Ausg. 2009 Electronic reproduction; Available via World Wide Web
    Parallel Title: Print version Profiling the European Citizen
    DDC: 303.48/33094
    Keywords: Information technology Political aspects ; Information technology Social aspects ; Information literacy ; Information society ; Europe Classification Population ; Statistics
    Abstract: In the eyes of many, one of the most challenging problems of the information society is that we are faced with an ever expanding mass of information. Based on the work done within the European Network of Excellence (NoE) on the Future of Identity in Information Society (FIDIS), a set of authors from different disciplinary backgrounds and jurisdictions share their understanding of profiling as a technology that may be preconditional for the future of our information society.
    Abstract: In the eyes of many, one of the most challenging problems of the information society is that we are faced with an ever expanding mass of information. Selection of the relevant bits of information seems to become more important than the retrieval of data as such: the information is all out there, but what it means and how we should act on it may be one of the big questions of the 21st century. If an information society is a society with an exponential proliferation of data, a knowledge society must be the one that has learned how to cope with this. Profiling technologies seem to be one of the most promising technological means to create order in the chaos of proliferating data. In this volume a multi-focal view will be developed to focus upon what profiling is, where it is applied and what may be the impact on democracy and rule of law. The book is the result of research conducted within the framework of the FIDIS (Future of Identity of Information Society) NoE (Network of Excellence).
    Description / Table of Contents: CONTENTS; Contributors; 1 General Introduction and Overview; 1.1 Introduction; 1.2 Part I: What is Profiling?; 1.3 Part II: Applications of Profiling; 1.4 Part III: Profiling Democracy and Rule of Law; Part I What is Profiling?; 2 Defining Profiling: A New Type of Knowledge?; 2.1 Introduction; 2.2 Identification of Profiling; 2.3 Group Profiling & Personalised Profiling; 2.4 Automated and Non-automated Profiling; 2.5 Conclusions: From Noise to Information, From Information toKnowledge; 2.6 Reply: Further Implications?; 2.7 Reply: Direct and Indirect Profiling in the Lightof Virtual Persons
    Description / Table of Contents: 2.8 Bibliography3 General Description of the Process of Behavioural Profiling; 3.1 Introduction; 3.2 The Technical Process; 3.3 The Social Process; 3.4 Reply: Towards a Data Mining De Facto Standard; 3.5 Bibliography; 4 The Role of Algorithms in Profiling; 4.1 Algorithms as the Engine of Profiling; 4.2 Preparing the Input; 4.3 Representing the Output; 4.4 Deterministic Algorithms; 4.5 Probabilistic Algorithms; 4.6 Conclusions; 4.7 Reply: Neat Algorithms in Messy Environments; 4.8 Reply: Privacy Preserving Data Mining; 5 Behavioural Biometric Profiling and Ambient Intelligence
    Description / Table of Contents: 5.1 Introduction5.2 Behavioural Biometrics State-of-the-art; 5.3 Current Limitations; 5.4 The Future of Behavioural Biometric Profiling Technologyand Applications; 5.5 Conclusions; 5.6 Reply: Old Metaphorical Wine - New Behavioural Bottles; 6 Personalisation and its Influence on Identities,Behaviour and Social Values; 6.1 Introduction; 6.2 Setting the Stage: Personalisation and Profiling; 6.3 The Dark Side of Personalisation and Profiling; 6.4 Concluding Remarks; 6.5 Reply: Online Personalisation. For the Bad or for the Good?; 6.6 Bibliography; Part II Applications of Profiling
    Description / Table of Contents: 7 Biometric Profiling: Opportunities and Risks7.1 Introduction; 7.2 Opportunities; 7.3 Risks; 7.4 Conclusions; 7.5 Need for Legal Analysis of Biometric Profiling; 7.6 Bibliography; 8 Profiling and Location-Based Services (LBS); 8.1 Introduction: Location, Privacy and 'Mobile' Identity; 8.2 Contextual Profiling; 8.3 Countermeasures & Self-Protection; 8.4 Legal and Social Framework; 8.5 Conclusion; 8.6 Reply: Mind My Step?; 8.7 Bibliography; 9 Collecting Data for the Profiling of Web Users; 9.1 Anonymous Feeling of Web Surfers; 9.2 Specificities of the Web Architecture
    Description / Table of Contents: 9.3 Legitimate Uses of Profiling9.4 Privacy Threats and Counter Measures; 9.5 Conclusion; 9.6 Reply: Web Usage Mining for Web Personalisationin Customer Relation Management; 9.7 Bibliography; 10 User Profiling for Attention Support at School and Work; 10.1 Introduction; 10.2 Attention in the Context of Learning and Work; 10.3 Supporting Attention in the Knowledge Economy; 10.4 Attention Support in the AtGentive Project; 10.5 Conclusion and Future Work; 10.6 Acknowledgement; 10.7 Reply: Profiling Individual and Group E-learning -Some Critical Remarks; 10.8 Bibliography
    Description / Table of Contents: 11 Profiling of Customers and Consumers - CustomerLoyalty Programmes and Scoring Practices
    Note: Includes bibliographical references and index , Electronic reproduction; Available via World Wide Web
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9789400729032
    Language: English
    Pages: Online-Ressource (XVIII, 363p. 20 illus., 10 illus. in color, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. European Data Protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Data protection--Law and legislation--European Union countries. ; Privacy, Right of--European Union countries. ; Europäische Union ; Computersicherheit ; Datenschutz
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9789400775404
    Language: English
    Pages: Online-Ressource (XV, 369 p. 20 illus., 10 illus. in color, online resource)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. Reloading data protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computer science ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Aufsatzsammlung ; Konferenzschrift ; Datenschutz ; Internationales Recht ; Datenschutz ; Internationales Recht
    Abstract: This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important and much disputed, theme of the Computers, Privacy and Data Protection (CPDP) conferences : the surveillance, control and steering of individuals and groups of people and the increasing number of performing tools (data mining, profiling, convergence) to achieve those objectives. This part is illustrated by examples from the domain of law enforcement and smart surveillance. The book concludes with five chapters that advance our understanding of the changing nature of privacy (concerns) and data protection
    Description / Table of Contents: ForewordAbout the Authors -- Part 1: Data protection in the world : Brazil and Poland.- 1. Data Protection in Brazil: New Developments and Current Challenges; Danilo Doneda and Laura Schertel Mendes -- 2. The effectiveness of redress mechanisms. Case study : Poland; Dorota Głowacka and Beata Konieczna -- Part 2: Forgetting and the right to be forgotten -- 3. Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice; Colin Bennett, Christopher Parsons and Adam Molnar -- 4. The EU, the US and the Right to be Forgotten; Paul Bernal -- 5. Stage ahoy! Deconstruction of the “drunken pirate” case in the light of impression management; Paulan Korenhof.- Part 3: Surveillance and law enforcement.- 6. New surveillance, new penology and new resistance: towards the criminalisation of resistance?; Antonella Galetta -- 7. Surveillance and Criminal Investigation: Blurring of Thresholds and Boundaries in the Criminal Justice System?; John Vervaele -- 8. Privatization of Information and the Data Protection Reform; Els De Busser -- 9. Quo vadis smart surveillance? Smart technologies combine and challenge democratic oversight; Marc Langheinrich, Rachel Finn, Vlad Coroama and David Wright -- 10. Surveillance of Communications Data and Article 8 of the European Convention on Human Rights; Nora Ni Loideain --  Part 4: Understanding data protection and privacy -- 11. Realizing the Complexity of Data Protection; Marion Albers -- 12. Forgetting about consent. Why the focus should be on “suitable safeguards” in data protection; Gabriela Zanfir.- 13. “All my mates have got it, so it must be okay”: Constructing a Richer Understanding of Privacy Concerns; Anthony Morton -- 14. Data mining and Its Paradoxical Relationship to the Purpose Limitation Principle; Liane Colonna.- 15. The cost of using Facebook: Assigning value to privacy protection on social network sites against data mining, identity theft, and social conflict; Wouter Steijn -- 16. Strong Accountability: Beyond Vague Promises; Denis Butin, Marcos Chicote and Daniel Le Métayer. .
    Note: Includes bibliographical references
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9789401773751
    Language: English
    Pages: xx, 476 Seiten , 24 cm
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data Protection on the Move
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Data protection Congresses ; Data protection Congresses ; Konferenzschrift ; Europäische Union ; Datenschutz
    Note: Includes bibliographical references
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Article
    Article
    Associated volumes
    In:  Epistemology and methodology of comparative law (2004), Seite 317-357 | year:2004 | pages:317-357
    ISBN: 1841134430
    Language: Undetermined
    Titel der Quelle: Epistemology and methodology of comparative law
    Publ. der Quelle: Oxford [u.a.] : Hart, 2004
    Angaben zur Quelle: (2004), Seite 317-357
    Angaben zur Quelle: year:2004
    Angaben zur Quelle: pages:317-357
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9789401793858
    Language: English
    Pages: Online-Ressource (XX, 406 p. 30 illus., 16 illus. in color, online resource)
    Series Statement: Law, Governance and Technology Series 20
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Sciences and Law
    Parallel Title: Druckausg. Reforming European data protection law
    RVK:
    RVK:
    Keywords: Technology Philosophy ; Data protection ; Computer science ; Computers Law and legislation ; Law ; Konferenzschrift 2014 ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9781402094989
    Language: English
    Pages: Online-Ressource (digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Science and Law
    Parallel Title: Buchausg. u.d.T. Reinventing data protection?
    RVK:
    RVK:
    Keywords: Public law ; Humanities ; Political science ; Law ; Konferenzschrift 2007 ; Datenschutz
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Article
    Article
    Associated volumes
    In:  Images et usages de la nature en droit (1993), Seite 75-131 | year:1993 | pages:75-131
    ISBN: 2802800892
    Language: Undetermined
    Titel der Quelle: Images et usages de la nature en droit
    Publ. der Quelle: Bruxelles : Facultés Universitaires Saint-Louis, 1993
    Angaben zur Quelle: (1993), Seite 75-131
    Angaben zur Quelle: year:1993
    Angaben zur Quelle: pages:75-131
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...