Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Cham : Springer International Publishing
    ISBN: 9783319250472
    Language: English
    Pages: Online-Ressource (X, 506 p, online resource)
    Series Statement: Law, Governance and Technology Series 25
    Series Statement: Issues in Privacy and Data Protection 25
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg.
    RVK:
    Keywords: International law ; Intellectual property Law and legislation ; Computer security ; Computers ; Law and legislation ; Law ; Mass media. ; Law ; Computer security ; Computers ; Law and legislation ; International law ; Intellectual property Law and legislation
    Abstract: About the authors -- 1 Introduction to Enforcing Privacy; David Wright and Paul De Hert.- 2 Enforcing privacy; David Wright -- Countries -- 3 Failures of privacy self-regulation in the United States; Robert Gellman and Pam Dixon -- 4 From a model pupil to a problematic grown-up: Enforcing privacy and data protection in Hungary; Iván Székely.- 5 A tale of two privacies: Enforcing privacy with hard power and soft power in Japan; Hiroshi Miyashita.- 6 The Spanish experience of enforcing privacy norms: two decades of evolution from sticks to carrots; Artemio Rallo Lombarte.- 7 Data protection and enforcement in Latin America and in Uruguay; Ana Brian Nougrères.- International mechanisms.-8 The International Working Group on Data Protection in Telecommunications – contributions to transnational privacy enforcement;Alexander Dix.- 9 Enforcing privacy across different jurisdictions; Dan Svantesson.- 10 Cross-border breach notification; Blair Stewart.- 11 Responsive regulation of data privacy: theory and Asian examples; Graham Greenleaf.- 12 Enforcement and reform of the EU-US Safe Harbor Agreement Instruments; Chris Connolly and Peter van Dijk.- 13 How effective are fines in enforcing privacy?; Hazel Grant and Hannah Crowther.- 14 Enforcing privacy rights: Class action litigation and the challenge of cy pres; Marc Rotenberg and David Jacobs.- 15 Data protection certification: Decorative or effective instrument? Audit and seals as a way to enforce privacy; Kirsten Bock.- 16 The co-existence of administrative and criminal law approaches to data protection wrongs; Paul De Hert and Gertjan Boulet.- 17 Whom to trust? Using technology to enforce privacy Challenges for the future; Daniel Le Métayer.-18 The Irish DPA and its approach to data protection; Billy Hawkes.- 19 Getting our act together: European Data Protection Authorities face up to Silicon Valley; Jacob Kohnstamm.- 20 Regaining control and sovereignty in the digital age; Jan Philipp Albrecht.- 21 Privacy enforcement in search of its base; James B. Rule -- Index.
    Abstract: This book demonstrates different approaches – regulatory, legal and technological – to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear – it is a theme that runs throughout this book – “carrots” and “soft law” need to be backed up by “sticks” and “hard law”. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book – including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher – share their views in the one and only book on Enforcing Privacy.
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9789401773768
    Language: English
    Pages: 1 Online-Ressource (XX, 476 Seiten)
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, Governance and Technology Ser. v.24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Philosophy ; Electronic books ; Konferenzschrift ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: Intro -- Preface -- Contents -- Mind the Air Gap -- Abstract -- 1 Introduction -- 2 Privacy Concerns for Domestic Robots -- 3 Why Privacy Need Not Be a Problem: Unravelling the Arguments -- 4 Mind the Air Gap: Prevention Rather Than Cure -- 5 Air Gaps and Domestic and Service Robots: A Look at the Issues -- 6 The Weaknesses of Air Gaps Revisited -- 7 Conclusion: A Plea for Privacy Before Design -- Bibliography -- Europe Versus Facebook: An Imbroglio of EU Data Protection Issues -- Abstract -- 1 Introduction -- 2 The Safe Harbor Program -- 3 Factual and Legal Background -- 4 Comment and Analysis -- 4.1 Article 3 of the Safe Harbor Agreement -- 4.2 The EU Data Protection Directive -- 4.3 The EU Charter -- 5 Additional Issues -- 5.1 What if There Is no Transfer? -- 5.2 What if Facebook Inc. Must Comply with the Directive Pursuant to Article 4? -- 5.3 Can the DPAs Enforce Their Decisions? -- 6 Conclusion -- The Context-Dependence of Citizens' Attitudes and Preferences Regarding Privacy and Security -- Abstract -- 1 Introduction -- 2 Measuring People's Perceptions of Security Technologies -- 2.1 Operationalization of Privacy -- 2.2 Operationalization of Security -- 2.3 Vignettes as a Tool for Contextualisation -- 2.4 Data Collection -- 3 Descriptive Results -- 4 Determinant of Citizen's Acceptance of Specific Surveillance Oriented Security Technologies -- 4.1 Methodology -- 4.2 Results -- 5 Discussion of Results and Conclusions -- Bibliography -- On Locational Privacy in the Absence of Anonymous Payments -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Problem Space -- 2.2 Approach -- 2.3 Roaming -- 3 System Design -- 3.1 Group Signatures and XSGS -- 3.2 Bootstrapping the System -- 3.3 Setting up New Charging Stations -- 3.4 Decommission of Charging Stations -- 3.5 Ensuring Authenticity of Metering Data -- 3.6 Transmission of Metering Data.
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Article
    Article
    Associated volumes
    In:  Research handbook on human rights and digital technology (2019), Seite 157-179 | year:2019 | pages:157-179
    ISBN: 9781785367717
    Language: English
    Titel der Quelle: Research handbook on human rights and digital technology
    Publ. der Quelle: Cheltenham, UK : Edward Elgar Publishing, 2019
    Angaben zur Quelle: (2019), Seite 157-179
    Angaben zur Quelle: year:2019
    Angaben zur Quelle: pages:157-179
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Article
    Article
    Associated volumes
    In:  The Routledge handbook to European criminology (2014), Seite 514-535 | year:2014 | pages:514-535
    ISBN: 0415685842
    Language: English
    Titel der Quelle: The Routledge handbook to European criminology
    Publ. der Quelle: London [u.a.] : Routledge, 2014
    Angaben zur Quelle: (2014), Seite 514-535
    Angaben zur Quelle: year:2014
    Angaben zur Quelle: pages:514-535
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9789400729032
    Language: English
    Pages: Online-Ressource (XVIII, 363p. 20 illus., 10 illus. in color, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. European Data Protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Data protection--Law and legislation--European Union countries. ; Privacy, Right of--European Union countries. ; Europäische Union ; Computersicherheit ; Datenschutz
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9789400775404
    Language: English
    Pages: Online-Ressource (XV, 369 p. 20 illus., 10 illus. in color, online resource)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. Reloading data protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computer science ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Aufsatzsammlung ; Konferenzschrift ; Datenschutz ; Internationales Recht ; Datenschutz ; Internationales Recht
    Abstract: This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important and much disputed, theme of the Computers, Privacy and Data Protection (CPDP) conferences : the surveillance, control and steering of individuals and groups of people and the increasing number of performing tools (data mining, profiling, convergence) to achieve those objectives. This part is illustrated by examples from the domain of law enforcement and smart surveillance. The book concludes with five chapters that advance our understanding of the changing nature of privacy (concerns) and data protection
    Description / Table of Contents: ForewordAbout the Authors -- Part 1: Data protection in the world : Brazil and Poland.- 1. Data Protection in Brazil: New Developments and Current Challenges; Danilo Doneda and Laura Schertel Mendes -- 2. The effectiveness of redress mechanisms. Case study : Poland; Dorota Głowacka and Beata Konieczna -- Part 2: Forgetting and the right to be forgotten -- 3. Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice; Colin Bennett, Christopher Parsons and Adam Molnar -- 4. The EU, the US and the Right to be Forgotten; Paul Bernal -- 5. Stage ahoy! Deconstruction of the “drunken pirate” case in the light of impression management; Paulan Korenhof.- Part 3: Surveillance and law enforcement.- 6. New surveillance, new penology and new resistance: towards the criminalisation of resistance?; Antonella Galetta -- 7. Surveillance and Criminal Investigation: Blurring of Thresholds and Boundaries in the Criminal Justice System?; John Vervaele -- 8. Privatization of Information and the Data Protection Reform; Els De Busser -- 9. Quo vadis smart surveillance? Smart technologies combine and challenge democratic oversight; Marc Langheinrich, Rachel Finn, Vlad Coroama and David Wright -- 10. Surveillance of Communications Data and Article 8 of the European Convention on Human Rights; Nora Ni Loideain --  Part 4: Understanding data protection and privacy -- 11. Realizing the Complexity of Data Protection; Marion Albers -- 12. Forgetting about consent. Why the focus should be on “suitable safeguards” in data protection; Gabriela Zanfir.- 13. “All my mates have got it, so it must be okay”: Constructing a Richer Understanding of Privacy Concerns; Anthony Morton -- 14. Data mining and Its Paradoxical Relationship to the Purpose Limitation Principle; Liane Colonna.- 15. The cost of using Facebook: Assigning value to privacy protection on social network sites against data mining, identity theft, and social conflict; Wouter Steijn -- 16. Strong Accountability: Beyond Vague Promises; Denis Butin, Marcos Chicote and Daniel Le Métayer. .
    Note: Includes bibliographical references
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Article
    Article
    Associated volumes
    In:  Scheiding van kerk en staat of actief pluralisme? (2007), Seite 1-19 | year:2007 | pages:1-19
    ISBN: 9789050956550
    Language: Undetermined
    Titel der Quelle: Scheiding van kerk en staat of actief pluralisme?
    Publ. der Quelle: Antwerpen [u.a.] : Intersentia, 2007
    Angaben zur Quelle: (2007), Seite 1-19
    Angaben zur Quelle: year:2007
    Angaben zur Quelle: pages:1-19
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Article
    Article
    Associated volumes
    In:  Epistemology and methodology of comparative law (2004), Seite 317-357 | year:2004 | pages:317-357
    ISBN: 1841134430
    Language: Undetermined
    Titel der Quelle: Epistemology and methodology of comparative law
    Publ. der Quelle: Oxford [u.a.] : Hart, 2004
    Angaben zur Quelle: (2004), Seite 317-357
    Angaben zur Quelle: year:2004
    Angaben zur Quelle: pages:317-357
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Article
    Article
    Associated volumes
    In:  The Belgian reports at the Congress of Washington of the International Academy of Comparative Law (2011), Seite 867-956 | year:2011 | pages:867-956
    ISBN: 9782802730217
    Language: Undetermined
    Titel der Quelle: The Belgian reports at the Congress of Washington of the International Academy of Comparative Law
    Publ. der Quelle: Bruxelles : Bruylant, 2011
    Angaben zur Quelle: (2011), Seite 867-956
    Angaben zur Quelle: year:2011
    Angaben zur Quelle: pages:867-956
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9789401793858
    Language: English
    Pages: Online-Ressource (XX, 406 p. 30 illus., 16 illus. in color, online resource)
    Series Statement: Law, Governance and Technology Series 20
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Sciences and Law
    Parallel Title: Druckausg. Reforming European data protection law
    RVK:
    RVK:
    Keywords: Technology Philosophy ; Data protection ; Computer science ; Computers Law and legislation ; Law ; Konferenzschrift 2014 ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...