Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9789401773768
    Language: English
    Pages: 1 Online-Ressource (XX, 476 Seiten)
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, Governance and Technology Ser. v.24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Philosophy ; Electronic books ; Konferenzschrift ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: Intro -- Preface -- Contents -- Mind the Air Gap -- Abstract -- 1 Introduction -- 2 Privacy Concerns for Domestic Robots -- 3 Why Privacy Need Not Be a Problem: Unravelling the Arguments -- 4 Mind the Air Gap: Prevention Rather Than Cure -- 5 Air Gaps and Domestic and Service Robots: A Look at the Issues -- 6 The Weaknesses of Air Gaps Revisited -- 7 Conclusion: A Plea for Privacy Before Design -- Bibliography -- Europe Versus Facebook: An Imbroglio of EU Data Protection Issues -- Abstract -- 1 Introduction -- 2 The Safe Harbor Program -- 3 Factual and Legal Background -- 4 Comment and Analysis -- 4.1 Article 3 of the Safe Harbor Agreement -- 4.2 The EU Data Protection Directive -- 4.3 The EU Charter -- 5 Additional Issues -- 5.1 What if There Is no Transfer? -- 5.2 What if Facebook Inc. Must Comply with the Directive Pursuant to Article 4? -- 5.3 Can the DPAs Enforce Their Decisions? -- 6 Conclusion -- The Context-Dependence of Citizens' Attitudes and Preferences Regarding Privacy and Security -- Abstract -- 1 Introduction -- 2 Measuring People's Perceptions of Security Technologies -- 2.1 Operationalization of Privacy -- 2.2 Operationalization of Security -- 2.3 Vignettes as a Tool for Contextualisation -- 2.4 Data Collection -- 3 Descriptive Results -- 4 Determinant of Citizen's Acceptance of Specific Surveillance Oriented Security Technologies -- 4.1 Methodology -- 4.2 Results -- 5 Discussion of Results and Conclusions -- Bibliography -- On Locational Privacy in the Absence of Anonymous Payments -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Problem Space -- 2.2 Approach -- 2.3 Roaming -- 3 System Design -- 3.1 Group Signatures and XSGS -- 3.2 Bootstrapping the System -- 3.3 Setting up New Charging Stations -- 3.4 Decommission of Charging Stations -- 3.5 Ensuring Authenticity of Metering Data -- 3.6 Transmission of Metering Data.
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham : Springer International Publishing
    ISBN: 9783319250472
    Language: English
    Pages: Online-Ressource (X, 506 p, online resource)
    Series Statement: Law, Governance and Technology Series 25
    Series Statement: Issues in Privacy and Data Protection 25
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg.
    RVK:
    Keywords: International law ; Intellectual property Law and legislation ; Computer security ; Computers ; Law and legislation ; Law ; Mass media. ; Law ; Computer security ; Computers ; Law and legislation ; International law ; Intellectual property Law and legislation
    Abstract: About the authors -- 1 Introduction to Enforcing Privacy; David Wright and Paul De Hert.- 2 Enforcing privacy; David Wright -- Countries -- 3 Failures of privacy self-regulation in the United States; Robert Gellman and Pam Dixon -- 4 From a model pupil to a problematic grown-up: Enforcing privacy and data protection in Hungary; Iván Székely.- 5 A tale of two privacies: Enforcing privacy with hard power and soft power in Japan; Hiroshi Miyashita.- 6 The Spanish experience of enforcing privacy norms: two decades of evolution from sticks to carrots; Artemio Rallo Lombarte.- 7 Data protection and enforcement in Latin America and in Uruguay; Ana Brian Nougrères.- International mechanisms.-8 The International Working Group on Data Protection in Telecommunications – contributions to transnational privacy enforcement;Alexander Dix.- 9 Enforcing privacy across different jurisdictions; Dan Svantesson.- 10 Cross-border breach notification; Blair Stewart.- 11 Responsive regulation of data privacy: theory and Asian examples; Graham Greenleaf.- 12 Enforcement and reform of the EU-US Safe Harbor Agreement Instruments; Chris Connolly and Peter van Dijk.- 13 How effective are fines in enforcing privacy?; Hazel Grant and Hannah Crowther.- 14 Enforcing privacy rights: Class action litigation and the challenge of cy pres; Marc Rotenberg and David Jacobs.- 15 Data protection certification: Decorative or effective instrument? Audit and seals as a way to enforce privacy; Kirsten Bock.- 16 The co-existence of administrative and criminal law approaches to data protection wrongs; Paul De Hert and Gertjan Boulet.- 17 Whom to trust? Using technology to enforce privacy Challenges for the future; Daniel Le Métayer.-18 The Irish DPA and its approach to data protection; Billy Hawkes.- 19 Getting our act together: European Data Protection Authorities face up to Silicon Valley; Jacob Kohnstamm.- 20 Regaining control and sovereignty in the digital age; Jan Philipp Albrecht.- 21 Privacy enforcement in search of its base; James B. Rule -- Index.
    Abstract: This book demonstrates different approaches – regulatory, legal and technological – to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear – it is a theme that runs throughout this book – “carrots” and “soft law” need to be backed up by “sticks” and “hard law”. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book – including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher – share their views in the one and only book on Enforcing Privacy.
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9789401773751
    Language: English
    Pages: xx, 476 Seiten , 24 cm
    Series Statement: Law, governance and technology series volume 24
    Series Statement: Law, governance and technology series
    Parallel Title: Erscheint auch als Data Protection on the Move
    Parallel Title: Erscheint auch als Data protection on the move
    DDC: 302.2
    RVK:
    Keywords: Data protection Congresses ; Data protection Congresses ; Konferenzschrift ; Europäische Union ; Datenschutz
    Note: Includes bibliographical references
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9789401793858
    Language: English
    Pages: Online-Ressource (XX, 406 p. 30 illus., 16 illus. in color, online resource)
    Series Statement: Law, Governance and Technology Series 20
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Springer eBook Collection
    Series Statement: Humanities, Social Sciences and Law
    Parallel Title: Druckausg. Reforming European data protection law
    RVK:
    RVK:
    Keywords: Technology Philosophy ; Data protection ; Computer science ; Computers Law and legislation ; Law ; Konferenzschrift 2014 ; Konferenzschrift ; Europäische Union ; Datenschutz
    Abstract: This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...