Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Berlin, Heidelberg : Springer Berlin Heidelberg  (6)
  • Cham : Springer International Publishing  (1)
  • Dordrecht [u.a.] : Springer  (1)
  • Computer science  (8)
  • Computer Science  (8)
Datasource
Material
Language
  • 1
    ISBN: 9783662540336
    Language: English
    Pages: 1 Online-Ressource (xii, 261 Seiten)
    Series Statement: The Frontiers Collection
    Parallel Title: Erscheint auch als The technological singularity
    Parallel Title: Print version Callaghan, Victor The Technological Singularity : Managing the Journey
    DDC: 100
    RVK:
    Keywords: Computer science ; Electronic books ; Einzigkeit ; Technischer Fortschritt ; Wissenschaftsethik ; Künstliche Intelligenz ; Risikomanagement
    Abstract: Foreword -- References -- Acknowledgements -- Contents -- 1 Introduction to the Technological Singularity -- 1.1 Why the "Singularity" Is Important -- 1.2 Superintelligence, Superpowers -- 1.3 Danger, Danger! -- 1.4 Uncertainties and Safety -- References -- Risks of, and Responses to, the Journey to the Singularity -- 2 Risks of the Journey to the Singularity -- 2.1 Introduction -- 2.2 Catastrophic AGI Risk -- 2.2.1 Most Tasks Will Be Automated -- 2.2.2 AGIs Might Harm Humans -- 2.2.3 AGIs May Become Powerful Quickly -- 2.2.3.1 Hardware Overhang -- 2.2.3.2 Speed Explosion -- 2.2.3.3 Intelligence Explosion -- References -- 3 Responses to the Journey to the Singularity -- 3.1 Introduction -- 3.2 Post-Superintelligence Responses -- 3.3 Societal Proposals -- 3.3.1 Do Nothing -- 3.3.1.1 AI Is Too Distant to Be Worth Our Attention -- 3.3.1.2 Little Risk, no Action Needed -- 3.3.1.3 Let Them Kill Us -- 3.3.1.4 "Do Nothing" Proposals-Our View -- 3.3.2 Integrate with Society -- 3.3.2.1 Legal and Economic Controls -- 3.3.2.2 Foster Positive Values -- 3.3.2.3 "Integrate with Society" Proposals-Our View -- 3.3.3 Regulate Research -- 3.3.3.1 Review Boards -- 3.3.3.2 Encourage Research into Safe AGI -- 3.3.3.3 Differential Technological Progress -- 3.3.3.4 International Mass Surveillance -- 3.3.3.5 "Regulate Research" Proposals-Our View -- 3.3.4 Enhance Human Capabilities -- 3.3.4.1 Would We Remain Human? -- 3.3.4.2 Would Evolutionary Pressures Change Us? -- 3.3.4.3 Would Uploading Help? -- 3.3.4.4 "Enhance Human Capabilities" Proposals-Our View -- 3.3.5 Relinquish Technology -- 3.3.5.1 Outlaw AGI -- 3.3.5.2 Restrict Hardware -- 3.3.5.3 "Relinquish Technology" Proposals-Our View -- 3.4 External AGI Constraints -- 3.4.1 AGI Confinement -- 3.4.1.1 Safe Questions -- 3.4.1.2 Virtual Worlds -- 3.4.1.3 Resetting the AGI -- 3.4.1.4 Checks and Balances
    Abstract: 3.4.1.5 "AI Confinement" Proposals-Our View -- 3.4.2 AGI Enforcement -- 3.4.2.1 "AGI Enforcement" Proposals-Our View -- 3.5 Internal Constraints -- 3.5.1 Oracle AI -- 3.5.1.1 Oracles Are Likely to Be Released -- 3.5.1.2 Oracles Will Become Authorities -- 3.5.1.3 "Oracle AI" Proposals-Our View -- 3.5.2 Top-Down Safe AGI -- 3.5.2.1 Three Laws -- 3.5.2.2 Categorical Imperative -- 3.5.2.3 Principle of Voluntary Joyous Growth -- 3.5.2.4 Utilitarianism -- 3.5.2.5 Value Learning -- 3.5.2.6 Approval-Directed Agents -- 3.5.2.7 "Top-Down Safe AGI" Proposals-Our View -- 3.5.3 Bottom-up and Hybrid Safe AGI -- 3.5.3.1 Evolutionary Invariants -- 3.5.3.2 Evolved Morality -- 3.5.3.3 Reinforcement Learning -- 3.5.3.4 Human-like AGI -- 3.5.3.5 "Bottom-up and Hybrid Safe AGI" Proposals-Our View -- 3.5.4 AGI Nanny -- 3.5.4.1 "AGI Nanny" Proposals-Our View -- 3.5.5 Motivational Scaffolding -- 3.5.6 Formal Verification -- 3.5.6.1 "Formal Verification" Proposals-Our View -- 3.5.7 Motivational Weaknesses -- 3.5.7.1 High Discount Rates -- 3.5.7.2 Easily Satiable Goals -- 3.5.7.3 Calculated Indifference -- 3.5.7.4 Programmed Restrictions -- 3.5.7.5 Legal Machine Language -- 3.5.7.6 "Motivational Weaknesses" Proposals-Our View -- 3.6 Conclusion -- Acknowledgementss -- References -- Managing the Singularity Journey -- 4 How Change Agencies Can Affect Our Path Towards a Singularity -- 4.1 Introduction -- 4.2 Pre-singularity: The Dynamic Process of Technological Change -- 4.2.1 Paradigm Shifts -- 4.2.2 Technological Change and Innovation Adoption -- 4.2.3 The Change Agency Perspective -- 4.2.3.1 Business Organisations as Agents of Change in Innovation Practice -- 4.2.3.2 Social Networks as Agents of Change -- 4.2.3.3 The Influence of Entrepreneurs as Agents of Change -- 4.2.3.4 Nation States as Agents of Change -- 4.3 Key Drivers of Technology Research and Their Impact
    Abstract: 4.4 The Anti-singularity Postulate -- 4.5 Conclusions -- References -- 5 Agent Foundations for Aligning Machine Intelligence with Human Interests: A Technical Research Agenda -- 5.1 Introduction -- 5.1.1 Why These Problems? -- 5.2 Highly Reliable Agent Designs -- 5.2.1 Realistic World-Models -- 5.2.2 Decision Theory -- 5.2.3 Logical Uncertainty -- 5.2.4 Vingean Reflection -- 5.3 Error-Tolerant Agent Designs -- 5.4 Value Specification -- 5.5 Discussion -- 5.5.1 Toward a Formal Understanding of the Problem -- 5.5.2 Why Start Now? -- References -- 6 Risk Analysis and Risk Management for the Artificial Superintelligence Research and Development Process -- 6.1 Introduction -- 6.2 Key ASI R&D Risk and Decision Issues -- 6.3 Risk Analysis Methods -- 6.3.1 Fault Trees -- 6.3.2 Event Trees -- 6.3.3 Estimating Parameters for Fault Trees and Event Trees -- 6.3.4 Elicitation of Expert Judgment -- 6.3.5 Aggregation of Data Sources -- 6.4 Risk Management Decision Analysis Methods -- 6.5 Evaluating Opportunities for Future Research -- 6.6 Concluding Thoughts -- Acknowledgements -- References -- 7 Diminishing Returns and Recursive Self Improving Artificial Intelligence -- 7.1 Introduction -- 7.2 Self-improvement -- 7.2.1 Evolutionary Algorithms -- 7.2.2 Learning Algorithms -- 7.3 Limits of Recursively Improving Intelligent Algorithms -- 7.3.1 Software Improvements -- 7.3.2 Hardware Improvements -- 7.4 The Takeaway -- References -- 8 Energy, Complexity, and the Singularity -- 8.1 A Contradiction -- 8.2 Challenges -- 8.2.1 Climate Change -- 8.2.2 Biodiversity and Ecosystem Services -- 8.2.3 Energy-or, Where's My Jetsons Car? -- 8.2.4 The Troubles with Science -- 8.3 Energy and Complexity -- 8.4 Exponentials and Feedbacks -- 8.5 Ingenuity, not Data Processing -- 8.6 In Summary -- Acknowledgements -- References
    Abstract: 9 Computer Simulations as a Technological Singularity in the Empirical Sciences -- 9.1 Introduction -- 9.2 The Anthropocentric Predicament -- 9.3 The Reliability of Computer Simulations -- 9.3.1 Verification and Validation Methods -- 9.4 Final Words -- References -- 10 Can the Singularity Be Patented? (And Other IP Conundrums for Converging Technologies) -- 10.1 Introduction -- 10.2 A Singular Promise -- 10.3 Intellectual Property -- 10.3.1 Some General IP Problems in Converging Technologies -- 10.3.2 Some Gaps in IP Relating to the Singularity -- 10.4 Limits to Ownership and Other Monopolies -- 10.5 Owning the Singularity -- 10.6 Ethics, Patents and Artificial Agents -- 10.7 The Open Alternative -- References -- 11 The Emotional Nature of Post-Cognitive Singularities -- 11.1 Technological Singularity: Key Concepts -- 11.1.1 Tools and Methods -- 11.1.2 Singularity: Main Hypotheses -- 11.1.3 Implications of Post-singularity Entities with Advanced, Meta-cognitive Intelligence Ruled by Para-emotions -- 11.2 Post-cognitive Singularity Entities and their Physical Nature -- 11.2.1 Being a Singularity Entity -- 11.2.1.1 Super-intelligent Entities -- 11.2.1.2 Transhumans -- 11.2.2 Post Singularity Entities as Living Systems? -- 11.3 Para-emotional Systems -- 11.4 Conclusions -- Acknowledgements -- References -- 12 A Psychoanalytic Approach to the Singularity: Why We Cannot Do Without Auxiliary Constructions -- 12.1 Introduction -- 12.2 AI and Intelligence -- 12.3 Consciousness -- 12.4 Reason and Emotion -- 12.5 Psychoanalysis -- 12.6 Conclusion -- References -- Reflections on the Journey -- 13 Reflections on the Singularity Journey -- 13.1 Introduction -- 13.2 Eliezer Yudkowsky -- 13.2.1 The Event Horizon -- 13.2.2 Accelerating Change -- 13.2.3 The Intelligence Explosion -- 13.2.4 MIRI and LessWrong -- 13.3 Scott Aaronson -- 13.4 Stuart Armstrong
    Abstract: 13.5 Too Far in the Future -- 13.6 Scott Siskind -- 13.6.1 Wireheading -- 13.6.2 Work on AI Safety Now -- 14 Singularity Blog Insights -- 14.1 Three Major Singularity Schools -- 14.2 AI Timeline Predictions: Are We Getting Better? -- 14.3 No Time Like the Present for AI Safety Work -- 14.4 The Singularity Is Far -- Appendix -- The Coming Technological Singularity: How to Survive in the Post-human Era (reprint) -- References -- References -- Titles in this Series
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg
    ISBN: 9783642453588
    Language: English
    Pages: Online-Ressource (XXIV, 459 p. 61 illus., 23 illus. in color, online resource)
    Series Statement: Theory and Applications of Natural Language Processing
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. Natural language processing of semitic languages
    RVK:
    Keywords: Computer science ; Computer Science ; Translators (Computer programs) ; Computational linguistics ; Computer science ; Translators (Computer programs) ; Computational linguistics ; Aufsatzsammlung ; Semitische Sprachen ; Natürliche Sprache
    Abstract: Part I Natural Language Processing Core-Technologies -- 1.Linguistic Introduction: The Orthography, Morphology and Syntax of Semitic Languages. R.Fabri, M.Gasser, N. Habash, G. Kiraz and S.Wintner -- 2.Morphological Processing of Semitic Languages. S.Wintner -- 3.Syntax and Parsing of Semitic Languages. R. Tsarfaty -- 4.Semantic Processing of Semitic Languages. M. Diab and Y.Marton -- 5.Language Modeling. I. Heintz -- Part II Natural Language Processing Applications -- 6.Statistical Machine Translation. H. Hassan and K.Darwish -- 7.Named Entity Recognition. B.Mohit -- 8.Anaphora Resolution. K.M. Seddik and A. Farghaly -- 9.Relation Extraction. V. Castelli and I. Zitouni -- 10.Information Retrieval. K. Darwish -- 11.Question Answering. Y. Benajiba, P. Rosso, L. Abouenour, O. Trigui, K.Bouzoubaa and L.H. Belguith -- 12.Automatic Summarization -- L.H. Belguith, M. Ellouze, M.H. Maaloul, M. Jaoua, F. Kallel Jaoua and P. Blache -- 13.Automatic Speech Recognition. H. Soltau, G. Saon, L. Mangu, H-K.Kuo, B.Kingsbury, S. Chu and F. Biadsy
    Abstract: Research in Natural Language Processing (NLP) has rapidly advanced in recent years, resulting in exciting algorithms for sophisticated processing of text and speech in various languages. Much of this work focuses on English; in this book we address another group of interesting and challenging languages for NLP research: the Semitic languages. The Semitic group of languages includes Arabic (206 million native speakers), Amharic (27 million), Hebrew (7 million), Tigrinya (6.7 million), Syriac (1 million) and Maltese (419 thousand). Semitic languages exhibit unique morphological processes, challenging syntactic constructions, and various other phenomena that are less prevalent in other natural languages. These challenges call for unique solutions, many of which are described in this book. The 13 chapters presented in this book bring together leading scientists from several universities and research institutes worldwide. While this book devotes some attention to cutting-edge algorithms and techniques, its primary purpose is a thorough explication of best practices in the field. Furthermore, every chapter describes how the techniques discussed apply to Semitic languages. The book covers both statistical approaches to NLP, which are dominant across various applications nowadays, and the more traditional, rule-based approaches, that were proven useful for several other application domains. We hope that this book will provide a "one-stop-shop'' for all the requisite background and practical advice when building NLP applications for Semitic languages
    Description / Table of Contents: Preface; Acknowledgments; Technical Review Committee; Contents; About the Editor; Part I Natural Language Processing Core-Technologies; Chapter1 Linguistic Introduction: The Orthography, Morphology and Syntax of Semitic Languages; 1.1 Introduction; 1.2 Amharic; 1.2.1 Orthography; 1.2.2 Derivational Morphology; Lexicon; Root and Pattern Processes; Other Derivational Processes; 1.2.3 Inflectional Morphology; Verbs; Nominals; 1.2.4 Basic Syntactic Structure; Noun Phrases; Clauses; 1.3 Arabic; 1.3.1 Orthography; Arabic Script; Arabic Spelling; 1.3.2 Morphology; Templatic Morphology
    Description / Table of Contents: Concatenative MorphologyDerivational Morphology; Inflectional Morphology; Form-Function Independence; Dialectal Arabic Morphology; Morphological Ambiguity; 1.3.3 Basic Syntactic Structure; Morphology and Syntax; Sentence Structure; Nominal Phrase Structure; Relative Clauses; Arabic Dialect Syntax; 1.4 Hebrew; 1.4.1 Orthography; 1.4.2 Derivational Morphology; Root and Pattern Processes; Other Derivational Processes; 1.4.3 Inflectional Morphology; Verbs; Nominals; Other Closed-Class Items; 1.4.4 Morphological Ambiguity; 1.4.5 Basic Syntactic Structure; 1.5 Maltese; 1.5.1 Orthography
    Description / Table of Contents: 1.5.2 Derivational MorphologyMixed Root-Based and Stem-Based Morphology; 1.5.3 Inflectional Morphology; Verbs; Nominals; Other Closed Class Items; 1.5.4 Basic Syntactic Structure; 1.6 Syriac; 1.6.1 Orthography; 1.6.2 Derivational Morphology; 1.6.3 Inflectional Morphology; 1.6.4 Syntax; 1.7 Contrastive Analysis; 1.7.1 Orthography; 1.7.2 Phonology; 1.7.3 Morphology; 1.7.4 Syntax; 1.7.5 Lexicon; 1.8 Conclusion; References; Chapter2 Morphological Processing of Semitic Languages; 2.1 Introduction; 2.2 Basic Notions; 2.3 The Challenges of Morphological Processing
    Description / Table of Contents: 2.4 Computational Approaches to Morphology2.4.1 Two-Level Morphology; 2.4.2 Multi-tape Automata; 2.4.3 The Xerox Approach; 2.4.4 Registered Automata; 2.4.5 Analysis by Generation; 2.4.6 Functional Morphology; 2.5 Morphological Analysis and Generation of Semitic Languages; 2.5.1 Amharic; 2.5.2 Arabic; 2.5.3 Hebrew; 2.5.4 Other Languages; 2.5.5 Related Applications; 2.6 Morphological Disambiguation of Semitic Languages; 2.7 Future Directions; References; Chapter3 Syntax and Parsing of Semitic Languages; 3.1 Introduction; 3.1.1 Parsing Systems; Syntactic Analysis; Models and Algorithms
    Description / Table of Contents: 3.1.2 Semitic LanguagesScript and Orthography; Morphology; Syntax; 3.1.3 The Main Challenges; The Architectural Challenge; The Modeling Challenge; The Lexical Challenge; 3.1.4 Summary and Conclusion; 3.2 Case Study: Generative Probabilistic Parsing; 3.2.1 Formal Preliminaries; Probabilistic Grammars; Training; Decoding; Evaluation; 3.2.2 An Architecture for Parsing Semitic Languages; Preliminaries; Joint Probabilistic Modeling; Lattice-Based Decoding; Evaluation; Summary and Conclusion; 3.2.3 The Syntactic Model; PCFG Refinements; Constrained Parsing; Discriminative Approaches
    Description / Table of Contents: 3.2.4 The Lexical Model
    Note: Description based upon print version of record
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9783319016672
    Language: English
    Pages: Online-Ressource (VIII, 79 p. 11 illus, online resource)
    Series Statement: SpringerBriefs in Education
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. Grand Challenges in Technology Enhanced Learning
    RVK:
    Keywords: Computer science ; Education ; Education ; Computer science ; Computer science ; Education ; Konferenzschrift 2013 ; E-Learning ; E-Learning
    Abstract: This book presents a key piece of the vision and strategy developed in STELLAR. It sets out a new mid-term agenda by defining Grand Challenges for research and development in technology-enhanced learning. Other than mere technology prizes, STELLAR Grand Challenges deal with problems at the interface of social and technical sciences. They pose problems that can be solved only in interdisciplinary collaboration. The descriptions of the Grand Challenge Problems were sent out to a number of stakeholders from industry, academia, and policy-making who responded with insightful, creative and critical comments bringing in their specific perspectives. This book will inspire everyone interested in TEL and its neighboring disciplines in their future projects. All of the listed problems, first hints with respect to the approach, measurable success indicators and funding sources are outlined. The challenges focus on what noted experts regard as important upcoming, pending, and innovative fields of research, the solution of which is within reach in a timeframe of a mere 2 to 15 years of work
    Description / Table of Contents: Grand Challenge Problems from the Alpine Rendez-Vous - an Introduction1.1 The Concept of Grand Challenge Problems -- 1.2 Development of the Grand Challenge Problems at the Alpine Rendez-Vous -- 2 -- 2.1.1 GCP1: Open Collaboration in Formal Education -- 2.1.2 GCP2: Technology-Supported Representation-Fitness -- 2.1.3 GCP3: Rich-Media Assignments -- 2.1.4 GCP4: Supporting an Open Culture of Design for TEL -- 2.1.5 GCP5: Multi-Level Evaluations of TEL -- Guest Commentaries on Connecting Learners -- 2.1.6 Guest Commentary by Roy Peas -- 2.1.7 Guest Commentary by Michelle Selinger.- 2.2 Grand Challenge Problems Focusing on Orchestrating Learning -- 2.2.1 GCP6: Emotion-Adaptive TEL -- 2.2.2 GCP7: Assessment and Automated Feedback -- 2.2.3 GCP8: One Informed Tutor per Child -- 2.2.4 GCP9: Improving Educational Practices through Data-supported Information Systems -- 2.2.5 GCP10: Semiotic Recommender Systems for Learning -- 2.2.6 GCP11: Enhancing Learning with Improved Information Retrieval.- 2.2.7 GCP12: Open TEL Practices -- Guest Commentaries on Orchestrating Learning -- 2.2.8 Guest Commentary -- 2.2.9 Guest Commentary by Florian Schulz-Pernice -- 2.2.10 Guest Commentary by Jim Slotta -- 2.3 Grand Challenge Problems Focusing on Contextualising Learning -- 2.3.1 GCP13: Learning Reading at Home (Authors: Andrew Manches, Ros Sutherland and Sarah Eagle) -- 2.3.2 GCP14: Technology for Young Children’s Expression of Scientific Ideas (Authors: Andrew Manches & Ros Sutherland) -- 2.3.3 GCP15: Evaluating Informal TEL (Author: Denise M. Whitelock) -- 2.3.4 GCP16: Engaging the Brains Reward System.- 2.3.5 GCP17: Drop-Out Prevention through Attrition Analytics -- 2.3.6 GCP18: New Forms of Assessment for Social TEL Environments -- 2.3.7 GCP19: Guidance for Technology Use in Early Years -- 2.3.8 GCP20: TEL Plasticity -- 2.3.9 GCP21: European TEL DataMart -- Guest Commentaries on Contextualising Learning -- 2.3.10 Guest Commentary by Charles Crook -- 2.3.11 Guest Commentary by Allison Littlejohn -- 2.3.12 Guest Commentary by Yves Punie -- 2.3.13 Guest Commentary by Karen Velasco -- GCP22: Open Research Methodology Infrastructure for CSCL.- General Conclusions -- References.
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg | Cham : Springer International Publishing AG
    ISBN: 9783642190506 , 3642190502
    Language: English
    Pages: 1 Online-Ressource (800 Seiten) , 105 illus., 58 illus. in color.
    Edition: 1st ed. 2011
    Series Statement: Security and Cryptology 6545
    Parallel Title: Erscheint auch als Digital Privacy
    DDC: 3,034,834
    RVK:
    Keywords: Identitätsverwaltung ; Privatsphäre ; Benutzerorientierung ; Trusted Computing ; Anonymisierung ; Systemplattform ; Computers and civilization ; Electronic data processing Management ; Application software ; Computer science ; Information technology Management ; Cryptography ; Data encryption (Computer science) ; Computers and Society ; IT Operations ; Computer and Information Systems Applications ; Models of Computation ; Computer Application in Administrative Data Processing ; Cryptology ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9783540457718 , 3540457712 , 3540457690 , 3540830898
    Language: English
    Pages: 1 Online-Ressource (VIII, 240 Seiten)
    Edition: 1st edition 2006
    Series Statement: Lecture Notes in Artificial Intelligence 4211
    Parallel Title: Erscheint auch als Symbol Grounding and Beyond
    DDC: 306.44
    RVK:
    Keywords: Computerlinguistik ; Sociolinguistics ; Artificial intelligence ; Computer simulation ; Computer science ; Natural language processing (Computer science) ; Social sciences Data processing ; Sociolinguistics ; Artificial Intelligence ; Computer Modelling ; Theory of Computation ; Natural Language Processing (NLP) ; Computer Application in Social and Behavioral Sciences ; Konferenzschrift 2006
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg | Cham : Springer International Publishing AG
    ISBN: 9783540316138 , 3540316132 , 3540307079 , 3540818464
    Language: English
    Pages: 1 Online-Ressource (X, 315 Seiten)
    Edition: 1st ed. 2005
    Series Statement: Lecture Notes in Artificial Intelligence 3413
    Parallel Title: Erscheint auch als Socionics
    DDC: 301
    RVK:
    Keywords: Sozionik ; Verteilte künstliche Intelligenz ; Künstliche Gesellschaft ; Komplexes System ; Soziales System ; Selbst organisierendes System ; Mehragentensystem ; Sociology ; Artificial intelligence ; Computer science ; Computers, Special purpose ; Social sciences Data processing ; Computers and civilization ; Sociology ; Artificial Intelligence ; Theory of Computation ; Special Purpose and Application-Based Systems ; Computer Application in Social and Behavioral Sciences ; Computers and Society ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9783540209232
    Language: English
    Pages: Online-Ressource
    Series Statement: Lecture Notes in Computer Science 2934
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Lecture notes in computer science
    Parallel Title: Buchausg. u.d.T. Regulated agent-based social systems
    DDC: 303.4834
    RVK:
    Keywords: Artificial intelligence ; Computer Communication Networks ; Computer science ; Computer simulation ; Social sciences_xData processing ; Computer Science ; Konferenzschrift 2002 ; Mehragentensystem ; Autonomer Agent ; Soziales System ; Selbst organisierendes System
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...