Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9789401773768
    Language: English
    Pages: 1 Online-Ressource (XX, 476 Seiten)
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, Governance and Technology Ser. v.24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Philosophy ; Electronic books ; Konferenzschrift ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: Intro -- Preface -- Contents -- Mind the Air Gap -- Abstract -- 1 Introduction -- 2 Privacy Concerns for Domestic Robots -- 3 Why Privacy Need Not Be a Problem: Unravelling the Arguments -- 4 Mind the Air Gap: Prevention Rather Than Cure -- 5 Air Gaps and Domestic and Service Robots: A Look at the Issues -- 6 The Weaknesses of Air Gaps Revisited -- 7 Conclusion: A Plea for Privacy Before Design -- Bibliography -- Europe Versus Facebook: An Imbroglio of EU Data Protection Issues -- Abstract -- 1 Introduction -- 2 The Safe Harbor Program -- 3 Factual and Legal Background -- 4 Comment and Analysis -- 4.1 Article 3 of the Safe Harbor Agreement -- 4.2 The EU Data Protection Directive -- 4.3 The EU Charter -- 5 Additional Issues -- 5.1 What if There Is no Transfer? -- 5.2 What if Facebook Inc. Must Comply with the Directive Pursuant to Article 4? -- 5.3 Can the DPAs Enforce Their Decisions? -- 6 Conclusion -- The Context-Dependence of Citizens' Attitudes and Preferences Regarding Privacy and Security -- Abstract -- 1 Introduction -- 2 Measuring People's Perceptions of Security Technologies -- 2.1 Operationalization of Privacy -- 2.2 Operationalization of Security -- 2.3 Vignettes as a Tool for Contextualisation -- 2.4 Data Collection -- 3 Descriptive Results -- 4 Determinant of Citizen's Acceptance of Specific Surveillance Oriented Security Technologies -- 4.1 Methodology -- 4.2 Results -- 5 Discussion of Results and Conclusions -- Bibliography -- On Locational Privacy in the Absence of Anonymous Payments -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Problem Space -- 2.2 Approach -- 2.3 Roaming -- 3 System Design -- 3.1 Group Signatures and XSGS -- 3.2 Bootstrapping the System -- 3.3 Setting up New Charging Stations -- 3.4 Decommission of Charging Stations -- 3.5 Ensuring Authenticity of Metering Data -- 3.6 Transmission of Metering Data.
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9789400729032
    Language: English
    Pages: Online-Ressource (XVIII, 363p. 20 illus., 10 illus. in color, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. European Data Protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Data protection--Law and legislation--European Union countries. ; Privacy, Right of--European Union countries. ; Europäische Union ; Computersicherheit ; Datenschutz
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9789400775404
    Language: English
    Pages: Online-Ressource (XV, 369 p. 20 illus., 10 illus. in color, online resource)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. Reloading data protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computer science ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Aufsatzsammlung ; Konferenzschrift ; Datenschutz ; Internationales Recht ; Datenschutz ; Internationales Recht
    Abstract: This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important and much disputed, theme of the Computers, Privacy and Data Protection (CPDP) conferences : the surveillance, control and steering of individuals and groups of people and the increasing number of performing tools (data mining, profiling, convergence) to achieve those objectives. This part is illustrated by examples from the domain of law enforcement and smart surveillance. The book concludes with five chapters that advance our understanding of the changing nature of privacy (concerns) and data protection
    Description / Table of Contents: ForewordAbout the Authors -- Part 1: Data protection in the world : Brazil and Poland.- 1. Data Protection in Brazil: New Developments and Current Challenges; Danilo Doneda and Laura Schertel Mendes -- 2. The effectiveness of redress mechanisms. Case study : Poland; Dorota Głowacka and Beata Konieczna -- Part 2: Forgetting and the right to be forgotten -- 3. Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice; Colin Bennett, Christopher Parsons and Adam Molnar -- 4. The EU, the US and the Right to be Forgotten; Paul Bernal -- 5. Stage ahoy! Deconstruction of the “drunken pirate” case in the light of impression management; Paulan Korenhof.- Part 3: Surveillance and law enforcement.- 6. New surveillance, new penology and new resistance: towards the criminalisation of resistance?; Antonella Galetta -- 7. Surveillance and Criminal Investigation: Blurring of Thresholds and Boundaries in the Criminal Justice System?; John Vervaele -- 8. Privatization of Information and the Data Protection Reform; Els De Busser -- 9. Quo vadis smart surveillance? Smart technologies combine and challenge democratic oversight; Marc Langheinrich, Rachel Finn, Vlad Coroama and David Wright -- 10. Surveillance of Communications Data and Article 8 of the European Convention on Human Rights; Nora Ni Loideain --  Part 4: Understanding data protection and privacy -- 11. Realizing the Complexity of Data Protection; Marion Albers -- 12. Forgetting about consent. Why the focus should be on “suitable safeguards” in data protection; Gabriela Zanfir.- 13. “All my mates have got it, so it must be okay”: Constructing a Richer Understanding of Privacy Concerns; Anthony Morton -- 14. Data mining and Its Paradoxical Relationship to the Purpose Limitation Principle; Liane Colonna.- 15. The cost of using Facebook: Assigning value to privacy protection on social network sites against data mining, identity theft, and social conflict; Wouter Steijn -- 16. Strong Accountability: Beyond Vague Promises; Denis Butin, Marcos Chicote and Daniel Le Métayer. .
    Note: Includes bibliographical references
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9789401793858
    Language: English
    Pages: Online-Ressource (XX, 406 p. 30 illus., 16 illus. in color, online resource)
    Series Statement: Law, Governance and Technology Series 20
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Sciences and Law
    Parallel Title: Druckausg. Reforming European data protection law
    RVK:
    RVK:
    Keywords: Technology Philosophy ; Data protection ; Computer science ; Computers Law and legislation ; Law ; Konferenzschrift 2014 ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9789401773751
    Language: English
    Pages: xx, 476 Seiten , 24 cm
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data Protection on the Move
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Data protection Congresses ; Data protection Congresses ; Konferenzschrift ; Europäische Union ; Datenschutz
    Note: Includes bibliographical references
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg | Cham : Springer International Publishing AG
    ISBN: 9783642190506 , 3642190502
    Language: English
    Pages: 1 Online-Ressource (800 Seiten) , 105 illus., 58 illus. in color.
    Edition: 1st ed. 2011
    Series Statement: Security and Cryptology 6545
    Parallel Title: Erscheint auch als Digital Privacy
    DDC: 303.4834
    RVK:
    Keywords: Identitätsverwaltung ; Privatsphäre ; Benutzerorientierung ; Trusted Computing ; Anonymisierung ; Systemplattform ; Computers and civilization ; Electronic data processing Management ; Application software ; Computer science ; Information technology Management ; Cryptography ; Data encryption (Computer science) ; Computers and Society ; IT Operations ; Computer and Information Systems Applications ; Models of Computation ; Computer Application in Administrative Data Processing ; Cryptology ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Article
    Article
    Associated volumes
    In:  Research handbook on the law of artificial intelligence (2018), Seite 280-306 | year:2018 | pages:280-306
    ISBN: 9781786439048
    Language: Undetermined
    Titel der Quelle: Research handbook on the law of artificial intelligence
    Publ. der Quelle: Cheltenham, UK : Edward Elgar Publishing, 2018
    Angaben zur Quelle: (2018), Seite 280-306
    Angaben zur Quelle: year:2018
    Angaben zur Quelle: pages:280-306
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Dordrecht : Springer Science+Business Media B.V
    ISBN: 9789400706415
    Language: English
    Pages: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Public law ; Criminology
    Abstract: This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs, data retention, PNR-agreements, property in personal data and the right to personal identity, electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.
    Note: Includes bibliographical references , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...