top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
European Data Protection: Coming of Age [[electronic resource] /] / edited by Serge Gutwirth, Ronald Leenes, Paul de Hert, Yves Poullet
European Data Protection: Coming of Age [[electronic resource] /] / edited by Serge Gutwirth, Ronald Leenes, Paul de Hert, Yves Poullet
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Dordrecht : , : Springer Netherlands : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (437 p.)
Disciplina 343.240999
Soggetto topico Public international law
Computers and civilization
Political science
Philosophy
Public International Law
Computers and Society
Philosophy of Law
Philosophy of Technology
ISBN 94-007-5169-9
1-283-86565-3
94-007-5170-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level – Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary – a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez.
Record Nr. UNINA-9910438335003321
Dordrecht : , : Springer Netherlands : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Identity Management for Emerging Services and Technologies [[electronic resource] ] : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers / / edited by Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse
Privacy and Identity Management for Emerging Services and Technologies [[electronic resource] ] : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers / / edited by Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 249 p. 41 illus.)
Disciplina 005.8
Soggetto topico Data protection
Electronic data processing—Management
Computers and civilization
Data and Information Security
IT Operations
Computers and Society
ISBN 3-642-55137-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Two of the Grand Changes through Computer and Network Technology -- The Draft Data Protection Regulation and the Development of Data Processing Applications -- Privacy Management and Accountability in Global Organisations -- Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical -- Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond -- How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? -- Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off -- Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference Models -- Forgetting Bits and Pieces: An Exploration of the ”Right to Be Forgotten” as Implementation of ”Forgetting” in Online Memory Processes -- An Advanced, Privacy-Friendly Loyalty System -- Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions -- Problem-Based Consideration of Privacy-Relevant Domain Knowledge -- Extending Signatures of Reputation -- Preserving Privacy in Production -- User Search with Knowledge Thresholds in Decentralized Online Social Networks -- An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information -- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case -- Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools -- Mobile Devices to the Identity Rescue.
Record Nr. UNINA-9910298567203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Reforming European Data Protection Law [[electronic resource] /] / edited by Serge Gutwirth, Ronald Leenes, Paul de Hert
Reforming European Data Protection Law [[electronic resource] /] / edited by Serge Gutwirth, Ronald Leenes, Paul de Hert
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Dordrecht : , : Springer Netherlands : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (409 p.)
Disciplina 342.240858
Collana Issues in Privacy and Data Protection
Soggetto topico Mass media
Law
Computers
Law and legislation
Philosophy
Human rights
Computer security
Computers and civilization
IT Law, Media Law, Intellectual Property
Legal Aspects of Computing
Philosophy of Technology
Human Rights
Systems and Data Security
Computers and Society
ISBN 94-017-9385-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Preface""; ""Contents""; ""Contributors""; ""Part I Profiling: A Persistent Core Issue of Data Protection and Privacy""; ""1 Profiling Technologies and Fundamental Rights and Values: Regulatory Challenges and Perspectives from European Data Protection Authorities""; ""1.1 Introduction""; ""1.2 Profiling: Towards a Definition""; ""1.3 Societal Consequences of Digitization""; ""1.4 Profiling as a Threat for Fundamental Rights and Values""; ""1.4.1 Fundamental Values""; ""1.4.2 Fundamental Rights""; ""1.4.2.1 The Right to Privacy and the Right to Data Protection""
""1.4.2.2 The Right to Non-discrimination""""1.5 So Far so Good � Regulating Profiling""; ""1.6 National Data Protection Authorities' (DPAs) Responses to Profiling Questionnaire""; ""1.6.1 Findings""; ""1.6.1.1 Legal Aspects""; ""1.6.1.2 Domains of Application""; ""1.6.1.3 Fundamental Rights""; ""1.6.1.4 Procedure to Complaint""; ""1.6.1.5 Awareness""; ""1.7 Conclusions""; ""References""; ""2 On-line Behavioral Tracking: What May Change After the Legal Reform on Personal Data Protection""; ""2.1 On-line Behavioral Tracking""; ""2.1.1 Definition and Today's Trends""
""2.1.2 Techniques of Online Tracking""""2.1.2.1 On-line Scrutiny Through Cookies: Are They Always a Threat to Privacy?""; ""2.1.2.2 Javascript""; ""2.1.2.3 Stateless Tracking""; ""2.1.2.4 Supercookies and Evercookies""; ""2.1.2.5 Location Tracking""; ""2.1.2.6 Online Social Network Tracking""; ""2.1.3 Risks of On-line Tracking""; ""2.2 On-line Tracking Under the Current Data Protection Legal Framework""; ""2.2.1 Personal Data Protection Directive""; ""2.2.2 Applicability of the Core Foundations of Personal Data Protection""; ""2.2.2.1 Purpose Limitation""; ""2.2.2.2 Data Subject Notice""
""2.2.2.3 Proportionality""""2.2.2.4 Obligation to Obtain Prior Consent""; ""2.2.2.5 Data Destruction/Retention""; ""2.3 Future Personal Data Protection Framework: How Will It Affect Behavioral On-line Tracking?""; ""2.3.1 Scope of Application""; ""2.3.2 Definitions""; ""2.3.3 Consent""; ""2.3.4 Notice""; ""2.3.5 The Right of Erasure (“Right to Be Forgotten�)""; ""2.3.6 Data Protection “by Design�""; ""2.3.7 Towards a “Privacy Friendlier� Internet Tracking: The Role of Society, (Social) Media and Education""; ""2.4 Conclusion""; ""Bibliography""
""Part II Taming the Future: Assessments of Risks in the Sphere of Privacy and Data Protection""""3 A Systematic Approach to the Legal Evaluation of Security Measures in Public Transportation""; ""3.1 Introduction""; ""3.2 Social and Legal Acceptability of Security Measures""; ""3.3 The Basic Concepts of Decision Making""; ""3.4 The Legal Evaluation of Security Measures""; ""3.4.1 Pre-stage � Identifying Fundamental Legal Provisions""; ""3.4.1.1 Type and Functions of the Security Measure""; ""3.4.1.2 Fundamental Legal Provisions""; ""3.4.2 Stage 1 � Deduction of Legal Requirements""
""3.4.3 Stage 2 � Concretisation into Legal Criteria""
Record Nr. UNINA-9910484992103321
Dordrecht : , : Springer Netherlands : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Reloading Data Protection [[electronic resource] ] : Multidisciplinary Insights and Contemporary Challenges / / edited by Serge Gutwirth, Ronald Leenes, Paul De Hert
Reloading Data Protection [[electronic resource] ] : Multidisciplinary Insights and Contemporary Challenges / / edited by Serge Gutwirth, Ronald Leenes, Paul De Hert
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Dordrecht : , : Springer Netherlands : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (370 p.)
Disciplina 340
Soggetto topico Public international law
Computers and civilization
Political science
Philosophy
Law—Europe
Public International Law
Computers and Society
Philosophy of Law
Philosophy of Technology
European Law
ISBN 94-007-7540-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- About the Authors -- Part 1: Data protection in the world : Brazil and Poland.- 1. Data Protection in Brazil: New Developments and Current Challenges; Danilo Doneda and Laura Schertel Mendes -- 2. The effectiveness of redress mechanisms. Case study : Poland; Dorota Głowacka and Beata Konieczna -- Part 2: Forgetting and the right to be forgotten -- 3. Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice; Colin Bennett, Christopher Parsons and Adam Molnar -- 4. The EU, the US and the Right to be Forgotten; Paul Bernal -- 5. Stage ahoy! Deconstruction of the “drunken pirate” case in the light of impression management; Paulan Korenhof.- Part 3: Surveillance and law enforcement.- 6. New surveillance, new penology and new resistance: towards the criminalisation of resistance?; Antonella Galetta -- 7. Surveillance and Criminal Investigation: Blurring of Thresholds and Boundaries in the Criminal Justice System?; John Vervaele -- 8. Privatization of Information and the Data Protection Reform; Els De Busser -- 9. Quo vadis smart surveillance? Smart technologies combine and challenge democratic oversight; Marc Langheinrich, Rachel Finn, Vlad Coroama and David Wright -- 10. Surveillance of Communications Data and Article 8 of the European Convention on Human Rights; Nora Ni Loideain --  Part 4: Understanding data protection and privacy -- 11. Realizing the Complexity of Data Protection; Marion Albers -- 12. Forgetting about consent. Why the focus should be on “suitable safeguards” in data protection; Gabriela Zanfir.- 13. “All my mates have got it, so it must be okay”: Constructing a Richer Understanding of Privacy Concerns; Anthony Morton -- 14. Data mining and Its Paradoxical Relationship to the Purpose Limitation Principle; Liane Colonna.- 15. The cost of using Facebook: Assigning value to privacy protection on social network sites against data mining, identity theft, and social conflict; Wouter Steijn -- 16. Strong Accountability: Beyond Vague Promises; Denis Butin, Marcos Chicote and Daniel Le Métayer. .
Record Nr. UNINA-9910483719703321
Dordrecht : , : Springer Netherlands : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Under Observation: The Interplay Between eHealth and Surveillance [[electronic resource] /] / edited by Samantha Adams, Nadezhda Purtova, Ronald Leenes
Under Observation: The Interplay Between eHealth and Surveillance [[electronic resource] /] / edited by Samantha Adams, Nadezhda Purtova, Ronald Leenes
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (VI, 213 p. 5 illus.)
Disciplina 344.04196
Collana Issues in Privacy and Data Protection
Soggetto topico Medical laws and legislation
Medical ethics
Mass media
Communication
Ethics
Computers and civilization
Medical Law
Theory of Medicine/Bioethics
Media Sociology
Computers and Society
ISBN 3-319-48342-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction (written by the editors) -- Part I: Setting the stage -- Chapter 2: Different notions of surveillance in healthcare;Samantha Adams -- Chapter 3: The European legal framework for personal data in health; Nadezhda Purtova.- Part II: Personal health, privacy and autonomy: an uneasy relationship.- Chapter 4: Unravelling Unobtrusiveness in mHealth Design and Use and implications for user’s autonomy; Maartje Niezen -- Chapter 5: eHealth and Privacy in U.S. Employer Wellness Programs; Anna Slomovic -- Chapter 6: Sleeping information: describing circuits of knowledge in apps for self-management of sleep disorders;Federica Lucivero, Maartje Niezen and Samantha Adams.- Part III: Surveillance practices for risk management -- Chapter 7: Profiling anomalies, anomalies of profiling: At the crossroads of risk assessments on Dutch youth and the European daChapter 1: Introduction (written by the editors) -- Part I: Setting the stage -- Chapter 2: Different notions of surveillance in healthcare;Samantha Adams -- Chapter 3: The European legal framework for personal data in health; Nadezhda Purtova.- Part II: Personal health, privacy and autonomy: an uneasy relationship.- Chapter 4: Unravelling Unobtrusiveness in mHealth Design and Use and implications for user’s autonomy; Maartje Niezen -- Chapter 5: eHealth and Privacy in U.S. Employer Wellness Programs; Anna Slomovic -- Chapter 6: Sleeping information: describing circuits of knowledge in apps for self-management of sleep disorders;Federica Lucivero, Maartje Niezen and Samantha Adams.- Part III: Surveillance practices for risk management -- Chapter 7: Profiling anomalies, anomalies of profiling: At the crossroads of risk assessments on Dutch youth and the European data protection regime; Karolina La Fors-Owcinik -- Chapter 8: Selling passive monitoring to manage risk in independent living: Frontline workers in a bind ; Clara Berridge -- Chapter 9: Setting the Context: Use of CCTV inside Mental Health Wards in England; Suki Desai and Majid Yar -- Chapter 10: Veillance and electronic medical records in disease management programs in the Netherlands; Bethany Hipple Walters.- Part IV: (Health) Data for public good  -- Chapter 11: Entitled to Privacy: economic perspective on use of health data; Ignacio Cofone.- Chapter 12: Big Data, the e-health bubble and its fix ;Winfried Tilanus -- Chapter 13: Conclusions and reflections (written by editors).ta protection regime; Karolina La Fors-Owcinik -- Chapter 8: Selling passive monitoring to manage risk in independent living: Frontline workers in a bind ; Clara Berridge -- Chapter 9: Setting the Context: Use of CCTV inside Mental Health Wards in England; Suki Desai and Majid Yar -- Chapter 10: Veillance and electronic medical records in disease management programs in the Netherlands; Bethany Hipple Walters.- Part IV: (Health) Data for public good -- Chapter 11: Entitled to Privacy: economic perspective on use of health data; Ignacio Cofone -- Chapter 12: Big Data, the e-health bubble and its fix ;Winfried Tilanus -- Chapter 13: Conclusions and reflections (written by editors).
Record Nr. UNINA-9910158707003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui