Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (14)
  • Organisation for Economic Co-operation and Development  (10)
  • Poullet, Yves  (4)
  • Physics  (9)
  • Computer Science  (5)
Datasource
Material
Language
  • 1
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9789400729032
    Language: English
    Pages: Online-Ressource (XVIII, 363p. 20 illus., 10 illus. in color, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. European Data Protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Data protection--Law and legislation--European Union countries. ; Privacy, Right of--European Union countries. ; Europäische Union ; Computersicherheit ; Datenschutz
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Dordrecht : Springer Science+Business Media B.V
    ISBN: 9789400706415
    Language: English
    Pages: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Public law ; Criminology
    Abstract: This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs, data retention, PNR-agreements, property in personal data and the right to personal identity, electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.
    Note: Includes bibliographical references , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781402094989
    Language: English
    Pages: Online-Ressource (digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Science and Law
    Parallel Title: Buchausg. u.d.T. Reinventing data protection?
    RVK:
    RVK:
    Keywords: Public law ; Humanities ; Political science ; Law ; Konferenzschrift 2007 ; Datenschutz
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9789264025516
    Language: English
    Pages: Online-Ressource (132 p.)
    Series Statement: OECD Reviews of Risk Management Policies
    Parallel Title: Erscheint auch als Norway
    RVK:
    RVK:
    Keywords: Datensicherheit ; Norwegen ; Science and Technology ; Norway ; Norwegen ; Computersicherheit ; Internet ; Datenschutz ; Innere Sicherheit
    Abstract: The development of information and communication technologies and networks, and in particular that of the Internet, has gone hand in hand with the emergence of new types of malevolent actions called cyber-crime: viruses, worms, Trojan horses, and the like. While a number of factors make a strong case for governmental action in the area of information security, there are also important limits to what governments can achieve. This review, the first in a series of risk management policy reviews being conducted by the OECD, identifies areas of good practice in Norway's policies for information security, as well as areas where improvements could be made. For areas that could benefit from improvement, it proposes opportunities for action and, when possible, suggests alternatives.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9264014225
    Language: English
    Pages: Online-Ressource
    Edition: Third Edition
    Series Statement: Nuclear safety
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. ;The safety of the nuclear fuel cycle
    Parallel Title: Parallelausg. La sûreté du cycle du combustible nucléaire - Troisième édition
    RVK:
    RVK:
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: Online-Ressource
    Series Statement: Nuclear science
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Utilisation and reliability of high power proton accelerators
    RVK:
    Keywords: Konferenzschrift 1998 ; Teilchenbeschleuniger
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9264182020
    Language: English
    Pages: Online-Ressource
    Series Statement: Radiation Protection
    Series Statement: Radiation Protection
    Parallel Title: Druckausg. u.d.T. Radiological impacts of spent nuclear fuel management options
    Parallel Title: Parallelausg. Les incidences radiologiques des options de gestion du combustible nucléaire usé : Une étude comparative
    DDC: 621.4838
    RVK:
    Keywords: Konferenzschrift ; Abgebrannter Kernbrennstoff ; Radioaktive Strahlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9264173854
    Language: English
    Pages: Online-Ressource
    Series Statement: SourceOECD
    Series Statement: OECD proceedings
    Parallel Title: Druckausg. u.d.T. Back end of the fuel cycle in a 1000 GWe nuclear scenario
    RVK:
    Keywords: Konferenzschrift 1998 ; Kernbrennstoffkreislauf
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9264073280
    Language: English , French , German , Multiple languages
    Pages: Online-Ressource
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Glossary of nuclear power plant ageing
    RVK:
    Keywords: Mehrsprachiges Wörterbuch ; Kernkraftwerk ; Alterung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9264172998
    Language: English
    Pages: Online-Ressource
    Series Statement: OECD proceedings
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Workshop on Ion and Slow Positron Beam Utilisation 〈1998, Costa da Caparica〉; Proceedings of the Workshop on Ion and Slow Positron Beam Utilisation
    RVK:
    Keywords: Konferenzschrift 1998 ; Ionenstrahl ; Positronenstrahl
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9789264174368
    Language: English
    Pages: Online-Ressource (64 p.) , ill.
    Parallel Title: Druckausg.
    Parallel Title: Parallelausg. Usages bénéfiques et production des isotopes
    RVK:
    Keywords: Nuclear Energy ; Radionuklid ; Anwendung
    Abstract: Radioactive and stable isotopes are used throughout the world and in many sectors, including medicine, industry, agriculture and research. In many applications isotopes have no substitute, and in most others they are more effective and cheaper than alternative techniques or processes. This publication is the first international survey on the beneficial uses and production of isotopes. It provides an overview of their main uses, and detailed information on the facilities that produce them world-wide. Trends in isotope supply and demand are analysed, and the conclusions and recommendations presented point to key issues to be considered by governments.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9789246180547
    Language: English
    Pages: Online-Ressource (108 p.) , ill.
    Series Statement: Radioactive Waste Management
    Parallel Title: Parallelausg. Évacuation géologique des déchets radioactifs ; Bilan des dix dernières années
    Parallel Title: Parallelausg. Évacuation géologique des déchets radioactifs : Bilan des dix dernières années
    DDC: 621.48/38
    RVK:
    Keywords: Nuclear Energy ; Untertagedeponie ; Entsorgung ; Radioaktiver Abfall
    Abstract: The concept of removing long-lived radioactive wastes from the human environment by disposal in deep geological repositories was developed several decades ago. In the intervening years, research efforts world-wide have increased our knowledge and understanding of how underground disposal systems will function over very long periods of time. Significant progress has also been made towards implementation of such facilities. There have, however, been delays in the disposal programmes of several countries. This report is a review of developments in the past decade. The primary sources of information are the answers to a questionnaire provided by waste management organisations represented in the NEA Radioactive Waste Management Committee (RWMC). The latter is an international forum of senior specialists from safety authorities, waste management agencies, R&D institutions and policy-making bodies.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9264162631
    Language: English
    Pages: Online-Ressource
    Series Statement: OECD proceedings
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Specialists Meeting on Shielding Aspects of Accelerators, Targets and Irradiation Facilities 〈3, 1997, Sendai, Miyagi-ken〉; Proceedings of the third Specialists Meeting on Shielding Aspects of Accelerators, Targets and Irradiation Facilities
    RVK:
    Keywords: Konferenzschrift 1997 ; Abschirmung ; Teilchenbeschleuniger ; Bestrahlungsanlage
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...