Buch, Englisch, 457 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 727 g
Buch, Englisch, 457 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 727 g
ISBN: 978-94-007-9945-5
Verlag: Springer Netherlands
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
- Rechtswissenschaften Öffentliches Recht Verwaltungsrecht Allgemeines Informationsrecht, Datenschutzrecht
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
- Sozialwissenschaften Soziologie | Soziale Arbeit Spezielle Soziologie Wissenssoziologie, Wissenschaftssoziologie, Techniksoziologie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Introduction.- Part 1 Building and Rebuilding Legal Concepts for Privacy and Data Protection.- Chapter 1 The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn’t It?); Katja de Vries, Rocco Bellanova, Paul De Hert and Serge Gutwirth.- Chapter 2 The Noise in the Archive: Oblivion in the Age of Total Recall; Jean-François Blanchette.- Chapter 3 Property in personal data. Second life of an old idea in the age of cloud computing, chain informatisation, and ambient intelligence; Nadezhda Purtova.- Chapter 4, Right to Personal Identity. The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization ; Norberto Nuno Gomes de Andrade.- Part 2 The Dark Side: Suspicions, Distrust and Surveillance.- Chapter 5 Frames from the life and death of Jean Charles de Menezes; Amos Bianchi & Denis J. Roio (a.k.a. Jaromil).- Chapter 6 Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden; Christel Backman.- Chapter 7 Ubiquitous computing, privacy and data protection: options and limitations to reconcile the unprecedented contradictions; Johann Cas.- Chapter 8 Franziska Boehm, EU PNR: European Flight passengers under general suspicion. The envisaged European model of analyzing flight passenger data.- Chapter 9 Options for securing PCs against phishing and espionage. A report from the EU-project "Open Trusted Computing"; Arnd Weber and Dirk Weber.- Part 3 Privacy Practices as Vectors of Reflection.- Chapter 10 Keeping up appearances: Audience segregation in social network sites; Bibi Van den Berg and Ronald Leenes.- Chapter 11 Avatars out of Control. Gazira Babeli, Pose Balls and ‘Rape’ in Second Life; Katja De Vries.- Chapter 12 Privacy as a practice: exploring the relational and spatial dynamics of HIV-related information seeking; Fadhila Mazanderani and Ian Brown.- Chapter 13 Rise and Phall:Lessons from the Phorm Saga; Paul Bernal.- Chapter 14 Disclosing or protecting? Teenagers’ online self-disclosure; Michel Walrave and Wannes Heirman.- Chapter 15 Why Adopting Privacy Enhancing Technologies (PETs) Takes So Much Time; John J. Borking.- Part 4 Privacy and Data Protection in the Cloud.- Chapter 16 Can a Cloud be Really Secure? A Socratic Dialogue; Gurpreet Dhillon and Ella Kolkowska.- Chapter 17 Privacy Regulations for Cloud Computing. Compliance and Implementation in Theory and Practice; Joep Ruiter and Martijn Warnier.- Chapter 18 Data Protection in the Clouds ; Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gérard and Claire Gayrel.- Chapter 19 Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases; Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi and Hui (Wendy) Wang.- Chapter 20 Access Control in Cloud-on-GRID Systems: the PerfCloud Case Study; Valentina Casola, Raffaele Lettiero, Massimiliano Rak and Umberto Villano.- Chapter 21 Security and privacy in the clouds: a bird’s eye view; Wolter Pieters.