|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA990000090650203316 |
|
|
Autore |
TAMPIERI, Alberto |
|
|
Titolo |
Sicurezza sul lavoro e modelli di rappresentanza / Alberto Tampieri |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Torino : G. Giappichelli, copyr. 1999 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Studi di diritto del lavoro |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Rappresentanti dei lavoratori per la sicurezza |
|
|
|
|
|
|
Collocazione |
|
XXV.2. Coll. 4/ 2 (IG III 768/3) |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNISA990005919160203316 |
|
|
Autore |
MARCONI, Alessandro <1969- > |
|
|
Titolo |
I buchi neri : [misteriosi protagonisti dell'evoluzione delle galassie] / Alessandro Marconi |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Bologna, : Il mulino, 2013 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
135 p., [6] carte di tav. : ill. ; 20 cm |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910299282603321 |
|
|
Titolo |
Privacy and Identity Management. The Smart Revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers / / edited by Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hübner |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2018.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XI, 371 p. 54 illus.) |
|
|
|
|
|
|
Collana |
|
IFIP AICT Tutorials ; ; 526 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Data protection |
Computers and civilization |
User interfaces (Computer systems) |
Artificial intelligence |
Computer organization |
Systems and Data Security |
Security |
Computers and Society |
User Interfaces and Human Computer Interaction |
Artificial Intelligence |
Computer Systems Organization and Communication Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
The Smart World -- Towards Organizing the Growing Knowledge on Privacy Engineering -- Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity Online: Current Solutions and Challenges -- Is It Harmful? Re-examining Privacy Concerns -- Forget About Privacy ... or Not? -- From Privacy to Algorithms' Fairness -- The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection -- Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of |
|
|
|
|
|
|
|
|
|
|
|
IoT Devices -- Secure and Privacy-Friendly Storage and Data Processing in the Cloud -- On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments -- Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures -- Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool -- Designing a GDPR-compliant and Usable Privacy Dashboard -- Blockchain-Based Identity Management and Data Usage Control -- Identification Services for Online Social Networks (OSNs) -- Cyber Security & Privacy Experiments: A Design and Reporting Toolkit -- Privacy and Socially Assistive Robots - A Meta Study -- From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data -- Handling Practices versus Compliance to Privacy -- Privacy Concerns and Behavior of Pokémon Go Players in Germany -- mHealth Applications for Goal Management Training – Privacy Engineering in Neuropsychological Studies -- NFC Payments: Gaps Between User Perception and Reality -- Real-world Identification for an Extensible and Privacy-Preserving Mobile eID. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy. |
|
|
|
|
|
|
|
| |