LEADER 06442nam 22007935 450 001 9910163991203321 005 20200629173241.0 010 $a3-319-50796-6 024 7 $a10.1007/978-3-319-50796-5 035 $a(CKB)3710000001051607 035 $a(DE-He213)978-3-319-50796-5 035 $a(MiAaPQ)EBC4801170 035 $a(PPN)222234245 035 $a(EXLCZ)993710000001051607 100 $a20170207d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Protection and Privacy: (In)visibilities and Infrastructures /$fedited by Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XXIV, 295 p. 14 illus.) 225 1 $aIssues in Privacy and Data Protection,$x2352-1929 ;$v36 311 $a3-319-56177-4 311 $a3-319-50795-8 320 $aIncludes bibliographical references and index. 327 $aPart 1: Fundamental and legal questions. 1. Legal fundamentalism: is data protection really a fundamental right? Bart Van der Sloot -- 2. Is there a Right to Offline Alternatives in a Digital World? Murat Karaboga, Tobias Matzner, Hannah Obersteller and Carsten Ochs -- 3. What is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges. Ugo Pagallo, Massimo Durante and Shara Monteleone -- Part 2: Concepts and tools. 4. Towards a code of Conduct on privacy for mHealth to foster trust among users of mobile health applications. Eugenio Mantovani, Joan Antokol, Sjaak Nouwt, Marian Hoekstra, Nico Schutte, P?teris Zilgalvis, Juan-Pedro Castro and Claudia Prettner -- 5. Minimum Harm by Design. Reworking Privacy by Design to mitigate the risks of surveillance. Elisa Orru -- 6. A purpose-based taxonomy for better governance of personal data in the Internet of Things era: the example of wellness data. Claire Levallois-Barth and Hugo Zylberberg -- 7. A Privacy Engineering Framework for the Internet of Things. Antonio Kung, Frank Kargl, Santiago Suppan, Jorge Cuellar, Henrich C. Pöhls, Adam Kapovits, Nicolas Notario and Yod Samuel Martin -- Part 3: Case studies. 8. Dangers from Within? Looking Inwards at the Role of Maladministration as the Leading Cause of Health Data Breaches in the UK. Leslie Stevens, Christine Dobbs, Kerina Jones and Graeme Laurie -- 9. On the road to privacy- and data protection-friendly security technologies in the workplace - A case-study of the MUSES Risk and Trust Analysis Engine. Yung Shin Van Der Sype, Jonathan Guislain, Seigneur Jean-Marc and Xavier Titi -- 10. A Study on Corporate Compliance with Transparency Requirements of Data Protection Law. Christoph Bier, Simon Kömpf and Jürgen Beyerer -- Part 4: closing. 11. Closing remarks: 9th International Computers, Privacy and Data Protection Conference. Giovanni Buttarelli. 330 $aThis book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders. Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.  . 410 0$aIssues in Privacy and Data Protection,$x2352-1929 ;$v36 606 $aMass media 606 $aLaw 606 $aComputers and civilization 606 $aPhilosophy 606 $aPolitical science 606 $aLaw?Europe 606 $aComputer security 606 $aIT Law, Media Law, Intellectual Property$3https://scigraph.springernature.com/ontologies/product-market-codes/R15009 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aPhilosophy of Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/E34050 606 $aPhilosophy of Law$3https://scigraph.springernature.com/ontologies/product-market-codes/E27000 606 $aEuropean Law$3https://scigraph.springernature.com/ontologies/product-market-codes/R20000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aMass media. 615 0$aLaw. 615 0$aComputers and civilization. 615 0$aPhilosophy. 615 0$aPolitical science. 615 0$aLaw?Europe. 615 0$aComputer security. 615 14$aIT Law, Media Law, Intellectual Property. 615 24$aComputers and Society. 615 24$aPhilosophy of Technology. 615 24$aPhilosophy of Law. 615 24$aEuropean Law. 615 24$aSystems and Data Security. 676 $a342.0858 702 $aLeenes$b Ronald$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $avan Brakel$b Rosamunde$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGutwirth$b Serge$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDe Hert$b Paul$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910163991203321 996 $aData Protection and Privacy: (In)visibilities and Infrastructures$91898888 997 $aUNINA