Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Online Resource  (8)
  • Image
  • Gutwirth, Serge  (5)
  • Project Muse
  • Computer Science  (8)
Datasource
Material
  • Online Resource  (8)
  • Image
Language
Years
  • 1
    Online Resource
    Online Resource
    Urbana : University of Illinois Press
    ISBN: 9780252097416 , 0252097416
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: The geopolitics of information
    Series Statement: UPCC book collections on Project MUSE
    DDC: 303.48/33
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Medien ; Infrastruktur ; Signal processing ; Telecommunication Traffic ; Information networks Social aspects ; Computer networks Social aspects ; Information superhighway ; Mass media Social aspects ; Digital media Social aspects ; Telecommunication systems Social aspects ; BUSINESS & ECONOMICS / Industries / Computer Industry ; TECHNOLOGY & ENGINEERING / Telecommunications ; LANGUAGE ARTS & DISCIPLINES / Communication Studies ; Aufsatzsammlung ; Aufsatzsammlung
    Abstract: "The contributors to Signal Traffic investigate how the material artifacts of media infrastructure--transoceanic cables, mobile telephone towers, Internet data centers, and the like--intersect with everyday life. Essayists confront the multiple and hybrid forms networks take, the different ways networks are imagined and engaged with by publics around the world, their local effects, and what human beings experience when a network fails. Some contributors explore the physical objects and industrial relations that make up an infrastructure. Others venture into the marginalized communities orphaned from the knowledge economies, technological literacies, and epistemological questions linked to infrastructural formation and use. The wide-ranging insights delineate the oft-ignored contrasts between industrialized and developing regions, rich and poor areas, and urban and rural settings, bringing technological differences into focus. Contributors include Charles R. Acland, Paul Dourish, Sarah Harris, Jennifer Holt and Patrick Vonderau, Shannon Mattern, Toby Miller, Lisa Parks, Christian Sandvig, Nicole Starosielski, Jonathan Sterne, and Helga Tawil-Souri"--...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Philadelphia, Pennsylvania : Temple University Press
    ISBN: 9781439910344 , 9781439910351 , 1439910340 , 9781439910368 (Sekundärausgabe) , 1439910367 (Sekundärausgabe)
    Language: English
    Edition: Online-Ausg. Online-Ressource UPCC book collections on Project MUSE ISBN 9781439910368
    Edition: ISBN 1439910367
    Edition: [Online-Ausg.]
    DDC: 302.3
    RVK:
    RVK:
    Abstract: "Robert Gehl's timely critique, Reverse Engineering Social Media, rigorously analyzes the ideas of social media and software engineers, using these ideas to find contradictions and fissures beneath the surfaces of glossy sites such as Facebook, Google, and Twitter. Gehl adeptly uses a mix of software studies, science and technology studies, and political economy to reveal the histories and contexts of these social media sites. Looking backward at divisions of labor and the process of user labor, he provides case studies that illustrate how binary "Like" consumer choices hide surveillance systems that rely on users to build content for site owners who make money selling user data, and that promote a culture of anxiety and immediacy over depth. Reverse Engineering Social Media also presents ways out of this paradox, illustrating how activists, academics, and users change social media for the better by building alternatives to the dominant social media sites. "--...
    Note: Online-Ausg.:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9789400729032
    Language: English
    Pages: Online-Ressource (XVIII, 363p. 20 illus., 10 illus. in color, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. European Data Protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Data protection--Law and legislation--European Union countries. ; Privacy, Right of--European Union countries. ; Europäische Union ; Computersicherheit ; Datenschutz
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 1421401932 , 9781421401935
    Language: English
    Pages: 1 Online-Ressource (272 p. :)
    Series Statement: UPCC book collections on Project MUSE.
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 303.48/30973
    RVK:
    Keywords: Geschichte ; SOCIAL SCIENCE / General ; Consumer satisfaction ; Human-computer interaction ; Human-machine systems / Social aspects ; Technological innovations ; Gesellschaft ; Consumer satisfaction ; Human-computer interaction ; Human-machine systems Social aspects ; Technological innovations ; Anthropotechnik ; Mensch-Maschine-Kommunikation ; USA ; USA ; USA ; Mensch-Maschine-Kommunikation ; Anthropotechnik ; Geschichte
    Note: OldControl:muse9781421401935. - Multi-User , Made available online by Project Muse , Includes bibliographical references (p. 232-264) and index , Our marvelous and maddening machines -- The advent of technology consumption -- Buying an automobile -- Running a car -- Tools, tinkering, and trouble -- Reading the owner's manual -- Computers and the tyranny of technology consumption -- The technology treadmill -- Acknowledgments , "Joseph J. Corn maps two centuries of consumer frustration and struggle with personal technologies. ... Having extensively researched owner's manuals, computer user-group newsletters, and how-to literature, Corn brings a fresh, consumer-oriented approach to the history of technology."--Dust jacket
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Dordrecht : Springer Science+Business Media B.V
    ISBN: 9789400706415
    Language: English
    Pages: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Public law ; Criminology
    Abstract: This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs, data retention, PNR-agreements, property in personal data and the right to personal identity, electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.
    Note: Includes bibliographical references , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9781402094989
    Language: English
    Pages: Online-Ressource (digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Science and Law
    Parallel Title: Buchausg. u.d.T. Reinventing data protection?
    RVK:
    RVK:
    Keywords: Public law ; Humanities ; Political science ; Law ; Konferenzschrift 2007 ; Datenschutz
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9781402066627
    Language: English
    Pages: 1 Online-Ressource (319 Seiten)
    Edition: Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    Series Statement: The International Library of Ethics, Law and Technology 1
    Series Statement: The international library of ethics, law and technology
    RVK:
    Keywords: Computer science ; Information systems ; Computers Law and legislation ; Economics
    Abstract: Aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI)
    Description / Table of Contents: Front Matter; Introduction; The brave new world of ambient intelligence; Dark scenarios; Threats and vulnerabilities; Safeguards; Recommendations for stakeholders; Conclusions; Back Matter;
    Note: Includes bibliographical references (p. 273-286) and index , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...