Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Dordrecht : Springer  (4)
  • Dordrecht [u.a.] : Springer
  • Computer science  (5)
  • Computersicherheit
  • Computer Science  (5)
Datasource
Material
Language
Years
  • 1
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Dordrecht : Springer
    Show associated volumes/articles
    ISBN: 9789400755833
    Language: English
    Pages: Online-Ressource (XXXV, 645 p. 133 illus) , digital
    Edition: Online-Ausg. 2013 Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    Series Statement: Law, Governance and Technology Series 8
    Parallel Title: Print version Agreement Technologies
    DDC: 006.3
    RVK:
    Keywords: Computer science ; Artificial intelligence ; Social sciences Data processing ; Datenverarbeitung ; Künstliche Intelligenz
    Abstract: More and more transactions, whether in business or related to leisure activities, are mediated automatically by computers and computer networks, and this trend is having a significant impact on the conception and design of new computer applications. The next generation of these applications will be based on software agents to which increasingly complex tasks can be delegated, and which interact with each other in sophisticated ways so as to forge agreements in the interest of their human users. The wide variety of technologies supporting this vision is the subject of this volume. It summarises the European Cooperation in Science and Technology (COST) Action project on Agreement Technologies (AT), during which approximately 200 researchers from 25 European countries, along with eight institutions from non-COST countries, cooperated as part of a number of working groups. The book is the first to provide a comprehensive overview of the emerging field of Agreement Technologies, written and coordinated by the leading researchers in the field. The results set out here are due for wide dissemination beyond the computing sector, involving law and social science as well.
    Description / Table of Contents: pt. I. Foundations -- pt. II. Semantics in agreement technologies -- pt. III. Norms -- pt. IV. Organisations and institutions -- pt. V. Argumentation and negotiation -- pt. VI. Trust and reputation -- pt. VII. Applications.
    Description / Table of Contents: Foreword -- Preface -- Acknowledgement -- Part I Foundations -- 1 Agreement Technologies: A Computing perspective; Sascha Ossowski, Carles Sierra and Vicente Botti -- 2 Agreement and Relational Justice: A Perspective from Philosophy and Sociology of Law; Pompeu Casanovas -- 3 Agreements as the Grease (not the Glue) of Society: A Cognitive and Social Science Perspective; Fabio Paglieri -- Part II Semantics in Agreement Technologies -- 4 Agreement Technologies and the Semantic Web; Axel Polleres -- 5 Logical formalisms for Agreement Technologies; Antoine Zimmermann -- 6 Reconciling heterogeneous knowledge with ontology matching; Cássia Trojahn and George Vouros -- 7 Semantics in Multi-Agent Systems; Nicoletta Fornara, Gordan Ježi´c, Mario Kušek, Ignac Lovrek, Vedran Podobnik, Krunoslav Tržec -- 8 SemanticWeb Services in Agreement Technologies; Zijie Cong and Alberto Fernández -- 9 Using ontologies to manage resources in Grid computing-practical aspects; Michał Drozdowicz, Maria Ganzha, Katarzyna Wasielewska, MarcinPaprzycki and Paweł Szmeja -- Part III Norms -- 10 Deontic logic; Jan Broersen, Dov Gabbay, Andreas Herzig, Emiliano Lorini, John-Jules Meyer, Xavier Parent and Leendert van der Torre -- 11 (Social) Norms and Agent-Based Simulation; Giulia Andrighetto, Stephen Cranefield, Rosaria Conte, Martin Purvis, Maryam Purvis, Bastin Tony Roy Savarimuthu and Daniel Villatoro -- 12 Norms in Game Theory; Davide Grossi, Luca Tummolini and Paolo Turrini -- 13 AI and Law; Giovanni Sartor and Antonino Rotolo -- 14 Normative Agents; Michael Luck, Samhar Mahmoud, Felipe Meneguzzi, Martin Kollingbaum, Timothy J. Norman, Natalia Criado and Moser SilvaFagundes -- 15 Norms and Trust; Rino Falcone, Cristiano Castelfranchi, Henrique Lopes Cardoso, Andrew Jones and Eugénio Oliveira -- 16 Norms and Argumentation; Nir Oren, Antonino Rotolo, Leendert van der Torre and Serena Villata -- Part IV Organisations and Institutions -- 17 Describing agent organisations; Estefanía Argente, Olivier Boissier, Sergio Esparcia, Jana Görmer, Kristi Kirikal and Kuldar Taveter -- 18 Modelling Agent Institutions; Nicoletta Fornara, Henrique Lopes Cardoso, Pablo Noriega, Eugénio Oliveira and Charalampos Tampitsikas -- 19 Organisational Reasoning Agents; Olivier Boissier and M. Birna van Riemsdijk -- 20 Adaptive Agent Organisations; Estefanía Argente, Holger Billhardt, Carlos Cuesta, Sergio Esparcia, Jana Görmer, Ramón Hermoso, Kristi Kirikal, Marin Lujak, José-Santiago Pérez-Sotelo and Kuldar Taveter --  Part V Argumentation and Negotiation -- 21 The Added Value of Argumentation; Sanjay Modgil, Francesca Toni, Floris Bex, Ivan Bratko, Carlos I. Chesñevar, Wolfgang Dvoˇrák, Marcelo A. Falappa, Xiuyi Fan, Sarah Alice Gaggl, Alejandro J. García, María P. González, Thomas F. Gordon, João Leite, Martin Možina, Chris Reed, Guillermo R. Simari, Stefan Szeider, Paolo Torroni and Stefan Woltran --  22 Trends in Multiagent Negotiation: from Bilateral Bargaining to Consensus Policies; Enrique de la Hoz, Miguel A. López-Carmona and Iván Marsá-Maestre -- Part VI Trust and Reputation -- 23 A Socio-Cognitive Perspective of Trust; Joana Urbano, Ana Paula Rocha and Eugénio Oliveira -- 24 Qualitative Assessment Dynamics - QAD; Denis Trˇcek -- 25 Argumentation and Trust; Andrew Koster, Jordi Sabater-Mir and Marco Schorlemmer -- 26 Ontology, Semantics and Reputation; Andrew Koster and Jeff Z. Pan -- 27 Attacks and Vulnerabilities of Trust and Reputation Models; Jose M. Such -- 28 Reputation and Organisations; Olivier Boissier, Jomi Fred Hübner and Laurent Vercouter -- 29 Building Relationships with Trust; Carles Sierra and John Debenham -- Part VII Applications -- 30 Arguing to Support Customers: the Call Centre Study Case; Stella Heras, Jaume Jordán, Vicente Botti and Vicente Julián -- 31 Agreement Technologies for Supporting the Planning and Execution of Transports; Paul Davidsson, Marie Gustafsson Friberger, Johan Holmgren, Andreas Jacobsson and Jan A. Persson -- 32 ANTE: Agreement Negotiation in Normative and Trust-enabled Environments; Henrique Lopes Cardoso, Joana Urbano, Ana Paula Rocha, António J. M. Castro and Eugénio Oliveira -- 33 mWater, a Case Study for Modeling Virtual Markets; Antonio Garrido, Adriana Giret, Vicente Botti and Pablo Noriega -- 34 v-mWater: an e-Government Application for Water Rights Agreements; Pablo Almajano, Tomas Trescak, Marc Esteva, Inmaculada Rodríguez and Maite López-Sánchez -- 35 Coordinating Emergency Medical Assistance; Marin Lujak and Holger Billhardt -- 36 An environment to build and track agent-based business collaborations; Toni Penya-Alba, Boris Mikhaylov, Marc Pujol-González, Bruno Rosell, Jesús Cerquides, Juan A. Rodríguez-Aguilar, Marc Esteva, Àngela Fàbregues, Jordi Madrenas, Carles Sierra, Carlos Carrascosa, Vicente Julián, Mario Rodrigo and Matteo Vasirani -- 37 A Virtual Selling Agent which is Persuasive and Adaptive; Fabien Delecroix, Maxime Morge and Jean-Christophe Routier -- A Editors’ Short Bios. .
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781402066627
    Language: English
    Pages: 1 Online-Ressource (319 Seiten)
    Edition: Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    Series Statement: The International Library of Ethics, Law and Technology 1
    Series Statement: The international library of ethics, law and technology
    RVK:
    Keywords: Computer science ; Information systems ; Computers Law and legislation ; Economics
    Abstract: Aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI)
    Description / Table of Contents: Front Matter; Introduction; The brave new world of ambient intelligence; Dark scenarios; Threats and vulnerabilities; Safeguards; Recommendations for stakeholders; Conclusions; Back Matter;
    Note: Includes bibliographical references (p. 273-286) and index , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781402047848
    Language: English
    Pages: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer eBook Collection. Computer Science Electronic reproduction; Available via World Wide Web
    Series Statement: Computer Supported Cooperative Work 37
    DDC: 303.4833
    RVK:
    Keywords: Computer science ; Information systems ; Multimedia systems ; Social sciences Data processing ; Architectural design ; Informationstechnik ; Politische Beteiligung
    Abstract: In the present digital revolution we often seem trapped in a Kafkaesque world of technological advances, some desired, some disliked or even feared, which we cannot influence but must accept. This book discusses the urgent need to redress this situation. The authors argue that technologies succeed or fail according to their relevance and value to people, who need to be actively engaged in order to create shared visions and influence their implementation.
    Abstract: In the present digital revolution we often seem trapped in a Kafkaesque world of technological advances, some desired, some disliked or even feared, which we cannot influence but must accept. This book discusses the urgent need to redress this situation. The authors argue that technologies succeed or fail according to their relevance and value to people, who need to be actively engaged in order to create shared visions and influence their implementation. Strategies for citizen engagement and empowerment will enable citizens to influence and shape desirable digital futures. The book reviews the currently accepted ways of thinking about the design of systems and the reasons why these methods are no longer adequate. From an academically rigorous analysis of case histories across a wide variety of sectors, knowledge and best practice are captured in a rich, descriptive model of the contributions of citizen engagement to the design process. Finally, it provides specific practical guidance, based on sound academic research, for policy makers, administrators and ICT professionals on the strategies, methodologies, tools and techniques needed to change design practice.
    Note: Includes bibliographical references and index , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Dordrecht : Springer
    ISBN: 9781402030697
    Language: English
    Pages: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    Series Statement: Applied Logic Series 33
    RVK:
    RVK:
    Keywords: Philosophy (General) ; Technology Philosophy ; Computer science ; Artificial intelligence ; Roboter ; Programmierung ; Prädikatenlogik ; Stufe 1
    Abstract: "The book provides an in-depth and uniform treatment of a mathematical model for reasoning robotic agents. The book also contains an introduction to a programming method and system based on this model. The mathematical model, known as the ""Fluent Calculus'', describes how to use classical first-order logic to set up symbolic models of dynamic worlds and to represent knowledge of actions and their effects. Robotic agents use this knowledge and their reasoning facilities to make decisions when following high-level, long-term strategies. The book covers the issues of reasoning about sensor input, acting under incomplete knowledge and uncertainty, planning, intelligent troubleshooting, and many other topics. The mathematical model is supplemented by a programming method which allows readers to design their own reasoning robotic agents. The usage of this method, called ""FLUX'', is illustrated by many example programs. The book includes the details of an implementation of FLUX using the standard programming language PROLOG, which allows readers to re-implement or to modify and extend the generic system. The design of autonomous agents, including robots, is one of the most exciting and challenging goals of Artificial Intelligence. Reasoning robotic agents constitute a link between knowledge representation and reasoning on the one hand, and agent programming and robot control on the other. The book provides a uniform mathematical model for the problem-driven, top-down design of rational agents, which use reasoning for decision making, planning, and troubleshooting. The implementation of the mathematical model by a general PROLOG program allows readers to practice the design of reasoning robotic agents. Since all implementation details are given, the generic system can be easily modified and extended."
    Description / Table of Contents: Special Fluent Calculus; Special FLUX; General Fluent Calculus; General FLUX; Knowledge Programming; Planning; Nondeterminism; Imprecision*; Indirect Effects: Ramification Problem*; Troubleshooting: Qualification Problem; Robotics
    Note: Includes bibliographical references (p. [313]-323) and index , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...