Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Gutwirth, Serge  (6)
  • Konferenzschrift  (4)
  • Political science  (2)
  • Europa
  • Law  (6)
Datasource
Material
Language
Years
Subjects(RVK)
  • 1
    ISBN: 9789401773751
    Language: English
    Pages: xx, 476 Seiten , 24 cm
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data Protection on the Move
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Data protection Congresses ; Data protection Congresses ; Konferenzschrift ; Europäische Union ; Datenschutz
    Note: Includes bibliographical references
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9789401773768
    Language: English
    Pages: 1 Online-Ressource (XX, 476 Seiten)
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, Governance and Technology Ser. v.24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Philosophy ; Electronic books ; Konferenzschrift ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: Intro -- Preface -- Contents -- Mind the Air Gap -- Abstract -- 1 Introduction -- 2 Privacy Concerns for Domestic Robots -- 3 Why Privacy Need Not Be a Problem: Unravelling the Arguments -- 4 Mind the Air Gap: Prevention Rather Than Cure -- 5 Air Gaps and Domestic and Service Robots: A Look at the Issues -- 6 The Weaknesses of Air Gaps Revisited -- 7 Conclusion: A Plea for Privacy Before Design -- Bibliography -- Europe Versus Facebook: An Imbroglio of EU Data Protection Issues -- Abstract -- 1 Introduction -- 2 The Safe Harbor Program -- 3 Factual and Legal Background -- 4 Comment and Analysis -- 4.1 Article 3 of the Safe Harbor Agreement -- 4.2 The EU Data Protection Directive -- 4.3 The EU Charter -- 5 Additional Issues -- 5.1 What if There Is no Transfer? -- 5.2 What if Facebook Inc. Must Comply with the Directive Pursuant to Article 4? -- 5.3 Can the DPAs Enforce Their Decisions? -- 6 Conclusion -- The Context-Dependence of Citizens' Attitudes and Preferences Regarding Privacy and Security -- Abstract -- 1 Introduction -- 2 Measuring People's Perceptions of Security Technologies -- 2.1 Operationalization of Privacy -- 2.2 Operationalization of Security -- 2.3 Vignettes as a Tool for Contextualisation -- 2.4 Data Collection -- 3 Descriptive Results -- 4 Determinant of Citizen's Acceptance of Specific Surveillance Oriented Security Technologies -- 4.1 Methodology -- 4.2 Results -- 5 Discussion of Results and Conclusions -- Bibliography -- On Locational Privacy in the Absence of Anonymous Payments -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Problem Space -- 2.2 Approach -- 2.3 Roaming -- 3 System Design -- 3.1 Group Signatures and XSGS -- 3.2 Bootstrapping the System -- 3.3 Setting up New Charging Stations -- 3.4 Decommission of Charging Stations -- 3.5 Ensuring Authenticity of Metering Data -- 3.6 Transmission of Metering Data.
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9789401793858
    Language: English
    Pages: Online-Ressource (XX, 406 p. 30 illus., 16 illus. in color, online resource)
    Series Statement: Law, Governance and Technology Series 20
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Sciences and Law
    Parallel Title: Druckausg. Reforming European data protection law
    RVK:
    RVK:
    Keywords: Technology Philosophy ; Data protection ; Computer science ; Computers Law and legislation ; Law ; Konferenzschrift 2014 ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9789400775404
    Language: English
    Pages: Online-Ressource (XV, 369 p. 20 illus., 10 illus. in color, online resource)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. Reloading data protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computer science ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Aufsatzsammlung ; Konferenzschrift ; Datenschutz ; Internationales Recht ; Datenschutz ; Internationales Recht
    Abstract: This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important and much disputed, theme of the Computers, Privacy and Data Protection (CPDP) conferences : the surveillance, control and steering of individuals and groups of people and the increasing number of performing tools (data mining, profiling, convergence) to achieve those objectives. This part is illustrated by examples from the domain of law enforcement and smart surveillance. The book concludes with five chapters that advance our understanding of the changing nature of privacy (concerns) and data protection
    Description / Table of Contents: ForewordAbout the Authors -- Part 1: Data protection in the world : Brazil and Poland.- 1. Data Protection in Brazil: New Developments and Current Challenges; Danilo Doneda and Laura Schertel Mendes -- 2. The effectiveness of redress mechanisms. Case study : Poland; Dorota Głowacka and Beata Konieczna -- Part 2: Forgetting and the right to be forgotten -- 3. Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice; Colin Bennett, Christopher Parsons and Adam Molnar -- 4. The EU, the US and the Right to be Forgotten; Paul Bernal -- 5. Stage ahoy! Deconstruction of the “drunken pirate” case in the light of impression management; Paulan Korenhof.- Part 3: Surveillance and law enforcement.- 6. New surveillance, new penology and new resistance: towards the criminalisation of resistance?; Antonella Galetta -- 7. Surveillance and Criminal Investigation: Blurring of Thresholds and Boundaries in the Criminal Justice System?; John Vervaele -- 8. Privatization of Information and the Data Protection Reform; Els De Busser -- 9. Quo vadis smart surveillance? Smart technologies combine and challenge democratic oversight; Marc Langheinrich, Rachel Finn, Vlad Coroama and David Wright -- 10. Surveillance of Communications Data and Article 8 of the European Convention on Human Rights; Nora Ni Loideain --  Part 4: Understanding data protection and privacy -- 11. Realizing the Complexity of Data Protection; Marion Albers -- 12. Forgetting about consent. Why the focus should be on “suitable safeguards” in data protection; Gabriela Zanfir.- 13. “All my mates have got it, so it must be okay”: Constructing a Richer Understanding of Privacy Concerns; Anthony Morton -- 14. Data mining and Its Paradoxical Relationship to the Purpose Limitation Principle; Liane Colonna.- 15. The cost of using Facebook: Assigning value to privacy protection on social network sites against data mining, identity theft, and social conflict; Wouter Steijn -- 16. Strong Accountability: Beyond Vague Promises; Denis Butin, Marcos Chicote and Daniel Le Métayer. .
    Note: Includes bibliographical references
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Dordrecht [u.a.] : Springer
    ISBN: 9789048188659
    Language: English
    Pages: Online-Ressource
    Edition: Online-Ausg. 2010 Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    Parallel Title: Print version Data Protection in a Profiled World
    DDC: 342.0858
    RVK:
    Keywords: Law ; Philosophy of law ; Public law ; Humanities ; Criminology ; Political science
    Abstract: One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe`s most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in. TOC:I. GENERIC ISSUES.- II. SPECIFIC ISSUES : SECURITY BREACHES, UNSOLICITED ADJUSTMENTS, FACEBOOK, SURVEILLANCE AND ELECTRONIC VOTING.- III. THIRD PILLAR ISSUES.- IV. TECHNOLOGY ASSESSMENT VIEWS.- V. LEGAL PRACTITIONER`S VIEWS.- VI. TECHNOLOGIST`S VIEWS
    Description / Table of Contents: Foreword; Contents; Contributors; Part I; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Part II; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Part III; Chapter 11; Chapter 12; Chapter 13; Part IV; Chapter 14; Chapter 15; Part V; Chapter 16; Chapter 17; Part VI; Chapter 18; Chapter 19; Chapter 20
    Note: Includes bibliographical references , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9781402094989
    Language: English
    Pages: Online-Ressource (digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Science and Law
    Parallel Title: Buchausg. u.d.T. Reinventing data protection?
    RVK:
    RVK:
    Keywords: Public law ; Humanities ; Political science ; Law ; Konferenzschrift 2007 ; Datenschutz
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...