top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Prison in Peru : Ethnographic, Feminist and Decolonial Perspectives
Prison in Peru : Ethnographic, Feminist and Decolonial Perspectives
Autore Bracco Bruce Lucia
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (311 pages)
Disciplina 365.43098525
Collana Palgrave Studies in Prisons and Penology Ser.
Soggetto genere / forma Electronic books.
ISBN 9783030844097
9783030844080
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510540403321
Bracco Bruce Lucia  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Prison Officers : International Perspectives on Prison Work
Prison Officers : International Perspectives on Prison Work
Autore Arnold Helen
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2023
Descrizione fisica 1 online resource (528 pages)
Disciplina 365
Altri autori (Persone) MaycockMatthew
RicciardelliRosemary
Collana Palgrave Studies in Prisons and Penology Series
ISBN 3-031-41061-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Acknowledgments -- Praise for Prison Officers -- Contents -- Notes on Contributors -- List of Figures -- List of Tables -- 1 Introduction -- The Contributions -- Part I: Prison Officer Interpretations and Performances of Power and Authority -- Part II: Prison Officer Identities and Workplace Culture -- Part III: Implications of Prison Policy and Prison Management for the Role of Prison Officers -- Part IV: Working Conditions and Prison Officer Well-Being -- References -- Part I Prison Officer Interpretations and Performances of Power and Authority -- 2 The Moral Value of Authority: Reflections on the Work of Prison Officers -- Introduction -- The Importance of Staff-Prisoner Relationships in Prison Life -- The Importance of Creative Methods in Research -- Understanding Staff Professionalism -- Links Between the Work of Prison Officers and Outcomes -- Summary and Discussion -- References -- 3 Ukrainian Prison Officers and Their Power -- Introduction -- Prison Officers as a State's Outpost -- Ukrainian Prison Service and State-Citizens Relations -- Methodological Note -- Forms of Officers' Power -- Authority -- Force -- Coercion -- Inducement -- Personalised Power -- Conclusions -- References -- 4 French Prison Officers' Legal Socialisation: 'The Law, Yes, Prisoners' Rights, No' -- Introduction -- The Literature -- Methodology -- Findings -- Code of Conduct and Oath -- Strip Searches -- Civil Society Participation on Disciplinary Commissions -- Ignoring and Resisting the Law -- Discussion -- References -- 5 Proxy Governance in (Post)Colonial Prisons: When Prison Officers Delegate Power to Prisoners -- The 'Other' Officers -- Prisoners Running Prisons -- Conceptualising Prisoner Governance: Diffused, Arrogated and by Proxy -- Staffing by Proxy and Distributive and Disciplinary Power -- Proxy Governance Structures in Myanmar and Uganda.
Appointments -- Distributive Power -- Disciplinary Power -- Relations with Prison Officers -- Conclusion -- References -- Part II Prison Officer Identities and Workplace Cultures -- 6 Dirty Work and Beyond: Representations of Prison Officers in Films -- Understanding Prison Films -- Doing Dirty Work -- Beyond Dirty Work -- Conclusion -- References -- 7 'It's a Very Clannish Type of a Job': Entitativity and Identity in Prison Officers' Occupational Cultures and Identities -- Introduction -- Occupational Cultures in Prisons and the Concept of Entitativity -- The Study -- Entitativity in Prison Officers' Occupational Cultures -- Entitative Solidarity and Conformity -- Coerced Conformity -- Conclusion -- References -- 8 'Friendly but not Friends' or 'Never Trust the Bastards'? Staff-Prisoner Interaction Styles in Australia and Norway -- Introduction -- Staff-Prisoner Interaction in Australia and Norway -- The True Carer -- The Limited Carer -- The Old School Type -- The Conflicted Type -- The Damaged Type -- Discussion -- References -- 9 "It Is Important to Be a Prison Officer and Have Trade Union Backup" Exploring Trade Union Membership Within the Scottish Prison Service -- Introduction and Context -- The Literature on Prison Officer Trade Unions -- Methodology and Ethics -- The Sample -- Findings -- The Function of POAS Membership to Its Members -- Local and National Representation -- Conclusion -- References -- 10 The Prison Officer In Post-Soviet Russia -- The Organisation of the Federal Service for the Administration of Punishments -- Data -- Recruitment and Promotion -- Job Satisfaction -- Reform and the Future -- Conclusion -- References -- Part III Implications of Prison Policy and Management for the Role of Prison Officers -- 11 "Prison Officers Should Be Treated Fairly". Perceptions and Experiences of Fairness Among Prison Officers in Ghana.
Prisons in Ghana -- Organisational Justice and Prison Officer Outcomes -- Methods -- Findings -- Distributive Justice: Unequal Distribution of Outcomes -- Procedural Justice: Lack of Policy and Inconsistent Application of Available Policies, and Voice -- Interactional Justice: Interpersonal Treatment -- Discussion -- References -- 12 Do Risk-Reducing Measures Only Reduce Risk? Prison Officer Work With Risk-Reducing Measures in the Imprisonment of a High-Risk Prisoner -- Introduction -- Risk-Reducing Measures and Situational Awareness -- Method -- Risk Awareness: 'A New Day Is a Day Closer to Getting My Face Smashed' -- Risk-Reduction Measure: 'Not Talk' -- Risk-Reduction Measure: 'Detailed Security Procedures' -- Implication of Risk-Reducing Measures and the Mechanisation of Officers' Work -- References -- 13 Farewell to Exceptionalism: An Analysis of Swedish Prisons Officers' Attitudes Towards Prison Policy, Organisation, and Their Occupational Role in 2009 and 2019 -- Introduction -- The Development of the Swedish Prison System in Recent History -- Method: The Two Survey Samples and Complications With Longitudinal Comparisons -- Results -- Differences in Population -- Summing Up -- Views About Occupational Conditions, Competence, and Collegial Culture -- Occupational Conditions -- Competencies Needed -- Collegial Culture -- Summing Up -- Approach to, and Expectations of, the Occupational Role and "The Other" -- Rehabilitative Approach -- Security Approach -- A Growing Repressive Approach Among POs and a Growing Repressive Climate in Prisons? -- Conclusion: Farewell to Exceptionalism -- References -- 14 The Role of Prison Officers in Transforming Prisoners' Lives in Hong Kong -- Introduction -- An Overview of the Correctional Services Department -- The Work of Prison Officers -- Providing Safe Custody -- Rehabilitation Service.
Drug Addiction Treatment Centres -- Detention Centres -- Rehabilitation Centres -- Training Centres -- Education -- Industrial and Vocational Training -- Psychological and Counselling Services -- Post-Release Supervision -- Recidivism Rate -- Community Engagement -- New Initiatives -- Rehabilitation Programme for Persons Participating in the 2019-20 Anti-Extradition Law Amendment Bill Movement -- Introducing the "Smart Prison" Concept -- Concluding Remarks -- References -- 15 Locating Prison Officers in the Prison Reforms Discourse: Insights from India -- Introduction -- Recommendations of Prison Reform Committees for Prison Officers -- The Ground Realities and Challenges -- Prison Officer Training in India -- Discussion and Conclusion -- References -- Part IV Working Conditions and Prison Officer Well-Being -- 16 The Well-Being of Correctional Officers in Canada -- Introduction -- Theme 1: Exposure to Potentially Psychologically Traumatic Events -- Theme 2: Occupational Stress -- Theme 3: Mental Health of Correctional Officers -- Discussion -- Conclusion -- References -- 17 Fear and Perceived Risk among Correctional Officers -- Introduction -- Defining Fear and Perceived Risk -- Fear and Perceived Risk of Victimisation -- Fear and Perceived Risk of Exposure to Infectious Disease -- Strategies to Address Perceptions of Safety -- Implications for Officer Interactions with Prisoners -- Policy Implications -- Directions for Future Research -- Conclusion -- References -- 18 Prison Officers and Their Work Routine in Brazilian Prisons -- An Introduction to the Brazilian Prison System -- Research and Work: A Relational Place Between Two Roles -- Between the Internal and the External: Attributions and Identity of Prison Officers -- The Role of the Prison Officer in Brazil -- Final Considerations -- References.
19 Conclusion: Towards a New Research Agenda to Analyse the Contemporary Prison Officer Role -- References -- Index.
Record Nr. UNINA-9910770254103321
Arnold Helen  
Cham : , : Springer International Publishing AG, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Prisons, Politics and Practices in England and Wales 1945-2020 : The Operational Management Issues
Prisons, Politics and Practices in England and Wales 1945-2020 : The Operational Management Issues
Autore Cornwell David J
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (272 pages)
Disciplina 365.94109045
Soggetto genere / forma Electronic books.
ISBN 3-030-84277-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Preface -- Acknowledgements -- Books by the Same Author -- Contents -- About the Author -- Abbreviations and Acronyms -- List of Figures -- List of Tables -- Part I Prisons and Penology: A Survey of Post-war England and Wales 1945-2020 -- 1 Introduction and Overview of This Book -- Preliminary Observations -- The Outline of This Book -- Part Two -- References -- 2 Change and Uncertainty in Penal Strategies 1945-1991 -- Strategic Post-war Penal Policies-The Rehabilitative Ideal -- 'Humane Containment' -- Emergence of the 'Justice Model' of Corrections -- Strategic Paralysis in the Late 1980s -- Strangeways, April 1990 and the Aftermath -- Conclusions from Chapter 2 -- References -- 3 Prisons, Managerialism and Privatisation 1991-1997 -- The Early 1990s: Prisons at the Crossroads -- Managerialism and Privatisation: Twin Pillars of a New Penal Strategy -- Resurgence of the 'Law and Order' Mantra Post-1992 -- The Judicial Response -- Further Problems with Prison Privatisation -- Turmoil and Confusion Post-Whitemoor -- Towards the End of an Era -- Conclusion to Chapter 3 -- References -- 4 Re-branding the 'Toc' Image: New Labour 1997-2007 -- As It Was in May 1997 -- Chasing the Crime Control Dragon -- New Millennium: New Approaches or Old Ones Revived? -- CJA 2003-A Colossus of Ideological Obfuscation -- Criminal Dangerousness and Its Punishment in CJA 2003 -- The Aftermath of CJA 2003 -- References -- 5 Penality and the Ministry of Justice Era 2007-2020 -- An Uncertain Beginning -- Creation of the Ministry of Justice 2007 -- Carter Redivivus and the State of the Prisons 2007-2008 -- Into the Doldrums: 2008-2010 -- 2010-2020: A Decade of 'Busy Going Nowhere' -- Looking Ahead: Conclusions from Part One -- References -- Part II A Vision for the Prisons of the Future -- 6 Strategic Management of Prisons: Structure and Style.
Introduction to Part Two -- HMPPS: Chimerical Vision or Marriage of Inconvenience? -- Structural Uncertainty in Prisons Management -- Restoring Strategic Reputation and Style Within HMPPS -- Conclusions from This Chapter -- References -- 7 Towards 'Doing Justice Better' -- Learning from the Lessons of the Past -- Scoping the Potential for Custodial Reduction -- What Does 'Doing Justice Better' Mean? -- Reparative and Restorative Justice: The Neglected Link in Contemporary Corrections -- References -- 8 Making Prisons Fit for Purpose -- Defining the Purpose of Prisons -- Making Prisons More Purposeful -- Centralisation and Devolution in Prison Governance -- Re-conceiving a Reformative Ethic -- References -- 9 Beyond the Prison Walls -- Prisons in a Community Context -- Bridging the Custody: Community Divide -- Prisons and Their Neighbourhood Communities -- Is There a Role for Reparative Justice in a Unified Correctional Process? -- References -- 10 Summation and Conclusions -- The Starting Point -- Prisons: Their Use and Abuse -- The Politics of Criminal Justice -- Practices and Malpractices in the Penal Process -- The Need for Systematic Future Research into the Penal Process -- References -- Appendix 1 -- Appendix 2 -- Appendix 3 -- Suggested Topics for Seminar Discussion and/or Student Written Assessments -- Author's Postscript -- Bibliography -- Index.
Altri titoli varianti Prisons, Politics and Practices in England and Wales 1945-2020
Record Nr. UNINA-9910502977703321
Cornwell David J  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Data Protection Challenges in the Distributed Era
Privacy and Data Protection Challenges in the Distributed Era
Autore Politou Eugenia
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (195 pages)
Altri autori (Persone) AlepisEfthimios
VirvouMaria
PatsakisConstantinos
Collana Learning and Analytics in Intelligent Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 3-030-85443-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Series Editor's Foreword -- References -- Preface -- Contents -- Acronyms -- 1 Introduction -- 1.1 Book Objectives -- 1.2 Book Structure -- References -- 2 Privacy and Personal Data Protection -- 2.1 Introduction -- 2.2 The Value of Personal Data -- 2.3 The Value of Data Privacy -- 2.4 The Rights to Privacy and to Data Protection -- 2.5 Privacy in the Tax and Financial Domain -- References -- 3 The General Data Protection Regulation -- 3.1 Introduction -- 3.2 Introduction to the GDPR -- 3.3 The GDPR Data Protection Principles -- 3.4 Consent and Revocation -- 3.4.1 Consent Misuses -- 3.4.2 Consent Under the GDPR -- 3.4.3 Current Efforts for Revoking Consent -- 3.5 The Right to be Forgotten -- 3.5.1 Forgetting and the Need to be Forgotten -- 3.5.2 About the CJEU Decision -- 3.5.3 The Right to be Forgotten Under the GDPR -- References -- 4 The ``Right to Be Forgotten'' in the GDPR: Implementation Challenges and Potential Solutions -- 4.1 Introduction -- 4.2 Implementation Challenges -- 4.3 The Impact of the GDPR on Backups and Archives -- 4.3.1 GDPR Provisions for Backups and Archives -- 4.3.2 The Process of Backing up -- 4.3.3 IT Security Standards for Backup Procedures -- 4.3.4 Impact Analysis of Implementing the RtbF on Backups -- 4.4 Towards GDPR Compliance -- References -- 5 State-of-the-Art Technological Developments -- 5.1 Introduction -- 5.2 Mobile Ubiquitous Computing -- 5.2.1 Affective Computing -- 5.2.2 Mobile Affective Computing and Ubiquitous Sensing -- 5.3 Decentralized p2p Networks -- 5.3.1 Blockchain -- 5.3.2 Decentralized Storage and File Sharing -- References -- 6 Privacy in Ubiquitous Mobile Computing -- 6.1 Introduction -- 6.2 Privacy Risks in Mobile Computing -- 6.2.1 Privacy and Big Data -- 6.2.2 Informed Consent -- 6.2.3 Risk of Re-Identification -- 6.2.4 Risk of Profiling.
6.2.5 The Risks of Tax and Financial Profiling -- 6.2.6 Towards Accountable, Transparent and Fairer Profiling and Automated Decision Making -- 6.3 Mitigating Privacy Risks Under the GDPR -- 6.3.1 Profiling and Automated Decision Making Under the GDPR -- 6.3.2 Implementation Challenges and Countermeasures -- 6.3.3 The Future of Big Data Profiling Under the GDPR -- References -- 7 Privacy in Blockchain -- 7.1 Introduction -- 7.2 Blockchain Privacy -- 7.3 Blockchain's Immutability and the ``Right to Be Forgotten'' -- 7.4 Current Efforts for Balancing Immutability and the RtbF -- 7.4.1 Bypassing Blockchain's Immutability -- 7.4.2 Removing Blockchain's Immutability -- 7.5 The Controversy -- References -- 8 Implementing Content Erasure in IPFS -- 8.1 Introduction -- 8.2 Storing Off-Chain Personal Data in the IPFS -- 8.3 Erasing Content in IPFS -- 8.4 The Requirement for Total Content Erasure -- 8.5 Towards Aligning IPFS with the RtbF -- 8.6 The Proposed Protocol -- 8.6.1 Assumptions and Desiderata -- 8.6.2 Threat Model -- 8.6.3 IPFS Delegated Erasure Protocol -- 8.6.4 Security Proof -- 8.6.5 Protocol Efficiency -- 8.6.6 Limitations and Countermeasures -- References -- 9 Privacy in the COVID-19 Era -- 9.1 Introduction -- 9.2 Contact Tracing Apps -- 9.3 Immunity Passports -- 9.4 Privacy and Data Protection in the Pandemic -- 9.5 Conclusions -- References -- 10 Open Questions and Future Directions -- 10.1 Introduction -- 10.1.1 Forgetting Implementation Standards -- 10.1.2 Big Data Analytics -- 10.1.3 Backups and Archives -- 10.1.4 Blockchain -- 10.1.5 IPFS and Other Decentralized P2p File Storage Systems -- References -- 11 Conclusions -- 11.1 Introduction -- References.
Record Nr. UNINA-9910506403603321
Politou Eugenia  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Identity Management. Sharing in a Digital World : 18th IFIP WG 9. 2, 9. 6/11. 7, 11. 6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers
Privacy and Identity Management. Sharing in a Digital World : 18th IFIP WG 9. 2, 9. 6/11. 7, 11. 6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers
Autore Bieker Felix
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (350 pages)
Altri autori (Persone) de ConcaSilvia
GruschkaNils
JensenMeiko
SchieringIna
Collana IFIP Advances in Information and Communication Technology Series
ISBN 9783031579783
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910851998003321
Bieker Felix  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy at Sea : Practices, Spaces, and Communication in Maritime History
Privacy at Sea : Practices, Spaces, and Communication in Maritime History
Autore Klein Käfer Natacha
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (398 pages)
Disciplina 155.92
Collana Global Studies in Social and Cultural Maritime History Series
ISBN 3-031-35847-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910799210003321
Klein Käfer Natacha  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy Symposium 2023 : Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
Privacy Symposium 2023 : Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
Autore Schiffner Stefan
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (169 pages)
Disciplina 342.0858
Altri autori (Persone) ZieglerSébastien
JensenMeiko
ISBN 3-031-44939-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Comments on Specific Papers -- Conclusion -- Preface -- Organization -- Executive Committee -- Steering Committee -- Program Committee -- Additional Referees -- Contents -- 1 A Methodology for the Assessment of the Impact of Data Protection Risks in the Context of Big Data Analytics: A Delphi Study -- 1.1 Introduction -- 1.2 Background -- 1.3 Overview of the Delphi Study -- 1.3.1 Delphi First Round -- 1.3.2 Delphi Second Round -- 1.4 Conclusions -- A.1 Appendix -- A.1.1 Level of Agreement -- A.1.2 PTP (1) Unclear Data Controllership -- A.1.3 Level of Importance -- A.1.4 DPIA Methodologies -- References -- 2 Introducing the Concept of Data Subject Rights as a Service under the GDPR -- 2.1 Introduction -- 2.2 Data Subject Rights -- 2.3 Related Work -- 2.4 Data Subject Rights as a Service -- 2.4.1 Goals -- 2.4.2 Services -- 2.4.2.1 Data Subject Right Enforcement -- 2.4.2.2 Authentication -- 2.4.2.3 Data Model -- 2.4.2.4 Data Logbook -- 2.4.2.5 Consulting -- 2.4.3 Interfaces -- 2.5 DSRaaS in the Context of the European Data Strategy -- 2.6 Discussion -- 2.7 Conclusion -- References -- 3 Technical and Legal Aspects Relating to the (Re)Use of Health Data When Repurposing Machine Learning Models in the EU -- 3.1 Introduction -- 3.2 Machine Learning Model Repurposing -- 3.3 Data Leakage in Machine Learning Models -- 3.4 Legal Analysis of Repurposing Machine Learning Models -- 3.4.1 General Data Protection Regulation -- 3.4.2 Data Governance Act -- 3.4.3 European Health Data Space Proposal -- 3.5 Scholarly Opinions -- 3.6 Discussion -- 3.7 Conclusion -- References -- 4 "We Are the Makers of Manners": A Grounded Approach to Data Ethics for the Built Environment -- 4.1 Introduction -- 4.1.1 The RED Foundation -- 4.2 The Real Estate Sector: The Landscape, Data, and PropTech -- 4.2.1 The Property Landscape -- 4.2.2 Real Estate Data.
4.2.3 Technologies Within the Real Estate Sector -- 4.2.4 Data Regulations Within the Real Estate Sector -- 4.3 Data and Data Protection Challenges in the Real Estate Sector -- 4.3.1 Smart Homes and the Internet of Things: Consumer Data Within the Sector -- 4.3.2 Smart Cities and Sensing: Citizen Data in the Built Environment -- 4.3.3 The Occupier Perspective: The Service Provider Versus the Customer -- 4.3.4 Summary -- 4.4 Overcoming Data and Data Protection Challenges in Practice -- 4.4.1 Good Practices in the Absence of Central Regulation -- 4.4.2 The RED Foundation Data Ethics Playbook -- 4.4.3 Future Work -- 4.5 Conclusion -- References -- 5 How the Charter of Trust Can Support the Data Protection -- 5.1 Introduction -- 5.2 Recent Landscape in Cybersecurity: EU Cybersecurity, Strategy Prime Threats, and Investments -- 5.2.1 The EU Cybersecurity Strategy -- 5.2.2 Prime Threats in the 2021-2022 -- 5.2.3 The ENISA NIS Investments 2022 Report -- 5.3 The Charter of Trust -- 5.4 How the Charter of Trust Supports Data Protection -- 5.4.1 The "Default" Concept and the Charter of Trust 03 Principle: Security by Default -- 5.4.2 A User-Centricity Approach -- 5.4.3 Education -- 5.4.4 Transparency and Response -- 5.5 Conclusion -- References -- 6 Operationalizing the European Essential Guarantees in Cross-Border Personal Data Transfers: The Case Studies of China and India -- 6.1 Introduction -- 6.2 The European Essential Guarantees for Surveillance Measures -- 6.3 Legal Analysis of Government Access to Personal Data in China and India -- 6.3.1 Government Access to Personal Data in China -- 6.3.1.1 Secondary Legislation Analysis in China: Government Access, Oversight, and Data Subject Rights -- 6.3.1.2 Assessment of the Chinese Legal Framework Against the European Essential Guarantees.
6.3.1.3 Chinese Personal Information Protection Law: New Regime for the Legality, Oversight Mechanism, Redress, and Data Subject Rights for the Government Data Access? -- 6.3.2 Government Access to Personal Data in India -- 6.3.2.1 Secondary Legislation Analysis in India: Government Access, Oversight, and Data Subject Rights -- 6.3.2.2 Assessment of the Indian Legal Framework Against the European Essential Guarantees -- 6.4 Conclusion -- 6.5 Tables of Relevant Chinese and Indian Laws -- 7 Enabling Versatile Privacy Interfaces Using Machine-Readable Transparency Information -- 7.1 Introduction -- 7.2 Background and Related Work -- 7.3 General Model for Providing Transparency Information -- 7.4 Implementation -- 7.4.1 Layered Privacy Dashboard Including Privacy Icons -- 7.4.2 Interactive Privacy Chatbot and Voice Assistant Through Conversational AI -- 7.5 Preliminary Evaluation -- 7.5.1 Layered Privacy Dashboard -- 7.5.2 Interactive Privacy Chatbot and Voice Assistant -- 7.6 Discussion, Conclusion, and Outlook -- References -- 8 Processing of Data Relating to Criminal Convictions and Offenses in the Context of Labor Relations in Spain -- 8.1 Introduction -- 8.2 The Legal Regime Applicable in Spain to the Processing of Personal Data in the Field of Employment -- 8.3 The Effects of the Special Nature of Data Concerning Criminal Convictions and Offenses with Respect to Its Processing by Employers in Spain -- 8.4 The Processing of Personal Data Relating to Criminal Convictions and Offenses by Employers in Other Member States -- 8.5 Conclusions -- References -- Index.
Record Nr. UNINA-9910799235703321
Schiffner Stefan  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy Technologies and Policy : 11th Annual Privacy Forum, APF 2023, Lyon, France, June 1-2, 2023, Proceedings
Privacy Technologies and Policy : 11th Annual Privacy Forum, APF 2023, Lyon, France, June 1-2, 2023, Proceedings
Autore Rannenberg Kai
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (187 pages)
Altri autori (Persone) DrogkarisProkopios
LauradouxCédric
Collana Lecture Notes in Computer Science Series
ISBN 3-031-61089-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Emerging Technologies and Protection of Personal Data -- A Universal Data Model for Data Sharing Under the European Data Strategy -- 1 Introduction -- 2 Background -- 2.1 The European Data Strategy -- 2.2 The Data Governance Act and Data Intermediaries -- 2.3 Digital Markets Act and Market Fairness -- 3 Related Work -- 4 Data Model -- 4.1 Requirements -- 4.2 Classes and Attributes -- 5 Illustrating Example -- 6 Application Areas -- 7 Discussion and Open Issues -- 8 Conclusion -- References -- A Decision-Making Process to Implement the 'Right to Be Forgotten' in Machine Learning -- 1 Introduction -- 1.1 Paper Contributions -- 1.2 Paper Structure -- 2 Background -- 2.1 Machine Learning -- 2.2 Literature Review -- 3 Decision-Making Flow -- 3.1 Legal Requirements for Implementing the RTBF -- 3.2 Machine Learning Techniques for Erasure -- 4 Conclusion -- References -- Data Protection Principles and Data Subject Rights -- A Data Protection-Compliant Framework for Wi-Fi-Based Location Tracking (in Law Enforcement) -- 1 Introduction -- 2 Related Work -- 3 System and Scenario for a Domestic Wi-Fi Detector -- 3.1 Limitation of the Perimeter -- 3.2 Limitation of the Duration of Data Collection and Storage -- 3.3 Detection of Authorised and Unauthorised Devices -- 3.4 Lawfulness of Processing -- 3.5 Information Obligations - A Legal Minefield -- 3.6 Opt-Out Possibilities -- 4 Conclusion -- References -- Past and Present: A Case Study of Twitter's Responses to GDPR Data Requests -- 1 Introduction -- 2 Related Work -- 2.1 General Data Protection Regulation -- 2.2 Research Approaches Related to GDPR -- 2.3 Summary -- 3 Methodology -- 4 Evaluation of Data Requests -- 4.1 Past: First Request in 2018 -- 4.2 Present: Second Request in 2023 -- 4.3 From Past to Present -- 5 Discussion.
5.1 Completeness, Accuracy, and Transparency -- 5.2 Data Minimization -- 5.3 Understandable vs. Machine-Readable -- 5.4 Advertisement and Tracking -- 5.5 Comparison with Twitter's Privacy Statement -- 6 Conclusion and Outlook -- A Definitions -- B Comparison of Past and Current Files -- References -- Modelling Data Protection and Privacy -- No Children in the Metaverse? The Privacy and Safety Risks of Virtual Worlds (and How to Deal with Them) -- 1 Introduction -- 2 What is the "Metaverse"? -- 3 Relevance and Risks to Children -- 4 Overarching Child Privacy and Safeguarding Legal Framework -- 5 Design of Virtual Reality Devices -- 6 Design of the Virtual Spaces in the Metaverse -- 6.1 PETs (and Other 'Privacy by Law' Initiatives) -- 6.2 DPIA -- 7 Could Consumer Laws Be the/an Answer? -- 8 Data Protection Challenges in the Metaverse -- 8.1 Territorial Scope -- 8.2 Consent -- 8.3 Necessity for the Performance of a Contract and Legitimate Interest -- 8.4 Augmented Privacy Notice -- 9 Safety of Children in the Metaverse -- 9.1 Child Exploitation -- 9.2 Gambling -- 10 Broader Policy Options -- 11 Conclusion -- References -- Home Alone? Exploring the Geographies of Digitally-Mediated Privacy Practices at Home During the COVID-19 Pandemic -- 1 Introduction -- 2 Conceptual Discussions -- 2.1 Privacy is Collective -- 2.2 Privacy is Contextual -- 2.3 Privacy is Spatial -- 2.4 Privacy in the Pandemic -- 3 Conceptual Framework -- 4 Methods -- 4.1 Research Design: Semi-structured Interviews -- 4.2 Data Analysis: Thematic Analysis -- 5 Results and Discussion -- 5.1 The Blurring of the Work-Life Divide -- 5.2 Collective Dimensions of Privacy in Times of Pandemic -- 6 Future Research and Conclusions -- 6.1 Further Research and Practice Recommendations -- 6.2 Conclusions -- A Interview Questions -- A.1 Introduction -- A.2 Information Disclosure.
A.3 Changes in Information Disclosure -- A.4 General Privacy Practices -- A.5 The Importance of Privacy -- A.6 Internet Tools for Fighting COVID-19 -- A.7 Wrap-Up -- B Code Book -- C Interview Question Formulation -- References -- Modelling Perceptions of Privacy -- From Dark Patterns to Fair Patterns? Usable Taxonomy to Contribute Solving the Issue with Countermeasures -- 1 Introduction -- 2 Current State of Play on Dark Patterns: Prevalence, Evidence of Harms and Legal Framework -- 2.1 Definitions and Prevalence -- 2.2 Evidence of Serious Individual and Structural Harms -- 2.3 Legal Framework -- 3 Usable Taxonomy to Empower All Stakeholders to Take Action and Fight Against Dark Patterns -- 3.1 Related Work -- 3.2 Proposal of a Usable Taxonomy -- 4 Discussion -- 5 Conclusion -- References -- A Singular Approach to Address Privacy Issues by the Data Protection and Privacy Relationships Model (DAPPREMO) -- 1 Introduction -- 2 Application of the Set Theory -- 3 The Relationships Between Objects and Those Between Subassemblies -- 4 Description of a Complex Multidimensional Model -- 5 The Model and the Role of the Subjects -- 6 DAPPREMO's Concrete Applications for Individuals and Institutions, and Future Developments: The Use of Artificial Intelligence -- 7 Conclusions -- References -- Author Index.
Record Nr. UNISA-996601561303316
Rannenberg Kai  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy Technologies and Policy : 11th Annual Privacy Forum, APF 2023, Lyon, France, June 1-2, 2023, Proceedings
Privacy Technologies and Policy : 11th Annual Privacy Forum, APF 2023, Lyon, France, June 1-2, 2023, Proceedings
Autore Rannenberg Kai
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (187 pages)
Altri autori (Persone) DrogkarisProkopios
LauradouxCédric
Collana Lecture Notes in Computer Science Series
ISBN 3-031-61089-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Emerging Technologies and Protection of Personal Data -- A Universal Data Model for Data Sharing Under the European Data Strategy -- 1 Introduction -- 2 Background -- 2.1 The European Data Strategy -- 2.2 The Data Governance Act and Data Intermediaries -- 2.3 Digital Markets Act and Market Fairness -- 3 Related Work -- 4 Data Model -- 4.1 Requirements -- 4.2 Classes and Attributes -- 5 Illustrating Example -- 6 Application Areas -- 7 Discussion and Open Issues -- 8 Conclusion -- References -- A Decision-Making Process to Implement the 'Right to Be Forgotten' in Machine Learning -- 1 Introduction -- 1.1 Paper Contributions -- 1.2 Paper Structure -- 2 Background -- 2.1 Machine Learning -- 2.2 Literature Review -- 3 Decision-Making Flow -- 3.1 Legal Requirements for Implementing the RTBF -- 3.2 Machine Learning Techniques for Erasure -- 4 Conclusion -- References -- Data Protection Principles and Data Subject Rights -- A Data Protection-Compliant Framework for Wi-Fi-Based Location Tracking (in Law Enforcement) -- 1 Introduction -- 2 Related Work -- 3 System and Scenario for a Domestic Wi-Fi Detector -- 3.1 Limitation of the Perimeter -- 3.2 Limitation of the Duration of Data Collection and Storage -- 3.3 Detection of Authorised and Unauthorised Devices -- 3.4 Lawfulness of Processing -- 3.5 Information Obligations - A Legal Minefield -- 3.6 Opt-Out Possibilities -- 4 Conclusion -- References -- Past and Present: A Case Study of Twitter's Responses to GDPR Data Requests -- 1 Introduction -- 2 Related Work -- 2.1 General Data Protection Regulation -- 2.2 Research Approaches Related to GDPR -- 2.3 Summary -- 3 Methodology -- 4 Evaluation of Data Requests -- 4.1 Past: First Request in 2018 -- 4.2 Present: Second Request in 2023 -- 4.3 From Past to Present -- 5 Discussion.
5.1 Completeness, Accuracy, and Transparency -- 5.2 Data Minimization -- 5.3 Understandable vs. Machine-Readable -- 5.4 Advertisement and Tracking -- 5.5 Comparison with Twitter's Privacy Statement -- 6 Conclusion and Outlook -- A Definitions -- B Comparison of Past and Current Files -- References -- Modelling Data Protection and Privacy -- No Children in the Metaverse? The Privacy and Safety Risks of Virtual Worlds (and How to Deal with Them) -- 1 Introduction -- 2 What is the "Metaverse"? -- 3 Relevance and Risks to Children -- 4 Overarching Child Privacy and Safeguarding Legal Framework -- 5 Design of Virtual Reality Devices -- 6 Design of the Virtual Spaces in the Metaverse -- 6.1 PETs (and Other 'Privacy by Law' Initiatives) -- 6.2 DPIA -- 7 Could Consumer Laws Be the/an Answer? -- 8 Data Protection Challenges in the Metaverse -- 8.1 Territorial Scope -- 8.2 Consent -- 8.3 Necessity for the Performance of a Contract and Legitimate Interest -- 8.4 Augmented Privacy Notice -- 9 Safety of Children in the Metaverse -- 9.1 Child Exploitation -- 9.2 Gambling -- 10 Broader Policy Options -- 11 Conclusion -- References -- Home Alone? Exploring the Geographies of Digitally-Mediated Privacy Practices at Home During the COVID-19 Pandemic -- 1 Introduction -- 2 Conceptual Discussions -- 2.1 Privacy is Collective -- 2.2 Privacy is Contextual -- 2.3 Privacy is Spatial -- 2.4 Privacy in the Pandemic -- 3 Conceptual Framework -- 4 Methods -- 4.1 Research Design: Semi-structured Interviews -- 4.2 Data Analysis: Thematic Analysis -- 5 Results and Discussion -- 5.1 The Blurring of the Work-Life Divide -- 5.2 Collective Dimensions of Privacy in Times of Pandemic -- 6 Future Research and Conclusions -- 6.1 Further Research and Practice Recommendations -- 6.2 Conclusions -- A Interview Questions -- A.1 Introduction -- A.2 Information Disclosure.
A.3 Changes in Information Disclosure -- A.4 General Privacy Practices -- A.5 The Importance of Privacy -- A.6 Internet Tools for Fighting COVID-19 -- A.7 Wrap-Up -- B Code Book -- C Interview Question Formulation -- References -- Modelling Perceptions of Privacy -- From Dark Patterns to Fair Patterns? Usable Taxonomy to Contribute Solving the Issue with Countermeasures -- 1 Introduction -- 2 Current State of Play on Dark Patterns: Prevalence, Evidence of Harms and Legal Framework -- 2.1 Definitions and Prevalence -- 2.2 Evidence of Serious Individual and Structural Harms -- 2.3 Legal Framework -- 3 Usable Taxonomy to Empower All Stakeholders to Take Action and Fight Against Dark Patterns -- 3.1 Related Work -- 3.2 Proposal of a Usable Taxonomy -- 4 Discussion -- 5 Conclusion -- References -- A Singular Approach to Address Privacy Issues by the Data Protection and Privacy Relationships Model (DAPPREMO) -- 1 Introduction -- 2 Application of the Set Theory -- 3 The Relationships Between Objects and Those Between Subassemblies -- 4 Description of a Complex Multidimensional Model -- 5 The Model and the Role of the Subjects -- 6 DAPPREMO's Concrete Applications for Individuals and Institutions, and Future Developments: The Use of Artificial Intelligence -- 7 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910865239503321
Rannenberg Kai  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Probability in Electrical Engineering and Computer Science [[electronic resource] ] : An Application-Driven Course
Probability in Electrical Engineering and Computer Science [[electronic resource] ] : An Application-Driven Course
Autore Walrand Jean
Pubbl/distr/stampa Cham, : Springer International Publishing AG, 2021
Descrizione fisica 1 online resource (390 p.)
Soggetto topico Maths for computer scientists
Communications engineering / telecommunications
Maths for engineers
Probability & statistics
Soggetto non controllato Probability and Statistics in Computer Science
Communications Engineering, Networks
Mathematical and Computational Engineering
Probability Theory and Stochastic Processes
Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences
Mathematical and Computational Engineering Applications
Probability Theory
Statistics in Engineering, Physics, Computer Science, Chemistry and Earth Sciences
Applied probability
Hypothesis testing
Detection theory
Expectation maximization
Stochastic dynamic programming
Machine learning
Stochastic gradient descent
Deep neural networks
Matrix completion
Linear and polynomial regression
Open Access
Maths for computer scientists
Mathematical & statistical software
Communications engineering / telecommunications
Maths for engineers
Probability & statistics
Stochastics
ISBN 3-030-49995-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464521903316
Walrand Jean  
Cham, : Springer International Publishing AG, 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...