Balancing privacy and free speech : unwanted attention in the age of social media / / Mark Tunick |
Autore | Tunick Mark |
Edizione | [1 ed.] |
Pubbl/distr/stampa | Taylor & Francis, 2015 |
Descrizione fisica | 1 online resource (xiv, 222 pages) |
Disciplina |
323.44/8
323.448 |
Collana | Routledge Research in Information Technology and E-Commerce Law |
Soggetto topico |
Social media - Law and legislation
Privacy, Right of Freedom of expression |
ISBN |
9781317650362
1317650360 9781315763132 1315763133 9781317650379 1317650379 |
Classificazione | LAW036000LAW096000LAW116000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Table of cases -- Acknowledgments -- 1. Introduction -- Unwanted attention -- The democratization of the media -- Permissible and impermissible speech -- Goals: Building a framework for addressing conflicts between privacy and free speech ; Formulating principles of privacy ethics ; Grounding privacy ; Reevaluating case law ; Distinguishing ethical and legal judgments -- The book's layout -- 2. The value of privacy -- Defining privacy -- Why privacy is valuable: Reputation ; Avoiding unjust punishment, and the "right to be forgotten" ; Property ; A lack of privacy is objectively harmful ; Intimacy, relational harms, and the need to compartmentalize ; No harm no foul? ; Trust ; Dignity and respect for persons ; Privacy, toleration, and community -- Summary -- 3. Legitimate privacy interests -- Terminology: legitimate privacy interests and reasonable expectations of privacy -- The plain view principle, modified -- Which means of observation are legitimate? -- the careful and carefree societies -- Qualifying the plain view principle: One may reasonably expect privacy when one's dignity is implicated ; One can have a legitimate privacy interest that information not be spread to circles wider than one willingly exposed oneself to ; Controlling the intended audience of one's message ; Clarifying what counts as "readily accessible through legitimate means" ; Consent -- Conclusion: privacy in public places -- 4. The value of free speech -- Reasons free speech is valuable -- Should interests in free speech be put on a balancing scale?: The E.U. vs the U.S. -- The slippery slope objection to protecting only some speech -- The speech that merits legal protection -- Do legal protections of free speech apply only to professional journalists? -- Deciding what is newsworthy: Substitutability (Finger and Kim Phuc) ; Non-newsworthy details of a newsworthy event (Y.G and L.G.) ; Newsworthy for a select group, non-newsworthy for the general public (Parnigoni) -- Conclusion -- 5. Balancing privacy and free speech: Utilitarianism, its limits, and tolerating the sensitive -- Introduction -- The framework: Interests and rights ; Balancing privacy against free speech (as opposed to public safety) ; The utilitarian approach ; Limits of a utilitarian approach -- Feasibility problems -- The respect and dignity problem -- Toleration and respect for persons -- Weighing reasons and considerations without making a utilitarian calculation -- 6. Cases -- Publicizing private facts: Private facts in private places (Rear Window, Lake v. Wal-Mart) ; Private facts that are newsworthy (Alvarado, Kaysen) ; Private facts in public places (Upskirt videos, Dennison, Turnbull) -- Cases at the border (Riley, Vazquez, and Wood) -- Publicizing public facts: Public facts that are not newsworthy (the baseball fan) ; Publicizing newsworthy public facts (Public meetings and lectures, police conduct, arrests) -- 7. Remedies -- Google Glass with face recognition -- Remedies: New social norms ; Legal remedies and their limits -- Other alternatives -- Technology and architecture -- Market solutions and their limits -- Conclusion. |
Record Nr. | UNINA-9910545199403321 |
Tunick Mark
![]() |
||
Taylor & Francis, 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Big data : come stanno cambiando il nostro mondo / Marco Delmastro, Antonio Nicita |
Autore | Delmastro, Marco |
Pubbl/distr/stampa | Bologna, : Il Mulino, 2019 |
Descrizione fisica | 147 p. : ill. ; 22 cm |
Disciplina |
323.448
005.74 |
Altri autori (Persone) | Nicita, Antonio |
Collana | Farsi un'idea |
Soggetto non controllato |
Archivi di dati - Aspetti economici ed etici
Vita privata |
ISBN | 978-88-15-28329-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-9910341456003321 |
Delmastro, Marco
![]() |
||
Bologna, : Il Mulino, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Big data : 8th CCF conference, big data 2020, Chongqing, China, October 22-24, 2020, revised selected papers / / Edited by Hong Mei [and eight others] |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (261 pages) : illustrations |
Disciplina | 323.448 |
Collana | Communications in Computer and Information Science |
Soggetto topico | Big data |
ISBN | 981-16-0705-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464428203316 |
Gateway East, Singapore : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Big data : 8th CCF conference, big data 2020, Chongqing, China, October 22-24, 2020, revised selected papers / / Edited by Hong Mei [and eight others] |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (261 pages) : illustrations |
Disciplina | 323.448 |
Collana | Communications in Computer and Information Science |
Soggetto topico | Big data |
ISBN | 981-16-0705-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483151103321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain and Trustworthy Systems : 5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part II / / edited by Jiachi Chen, Bin Wen, Ting Chen |
Autore | Chen Jiachi |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (366 pages) |
Disciplina |
005.8
323.448 |
Altri autori (Persone) |
WenBin
ChenTing |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection - Law and legislation
Artificial intelligence Data structures (Computer science) Information theory Operating systems (Computers) Computers, Special purpose Privacy Artificial Intelligence Data Structures and Information Theory Operating Systems Special Purpose and Application-Based Systems |
ISBN | 981-9981-04-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | AI for Blockchain -- A General Smart Contract Vulnerability Detection Framework with Self-Attention Graph Pooling -- The Best of Both Worlds: Integrating Semantic Features with Expert Features for Smart Contract Vulnerability Detection -- A LSTM and GRU-based hybrid model in the Cryptocurrency price prediction -- Smart Contract Code Clone Detection Based on Pre-Training Techniques -- MF-Net: Encrypted Malicious Traffic Detection Based on MultiFlow Temporal Features -- Blockchain Applications -- When Supply Chain Security Meets Blockchain: Applications and Challenges -- ePoW: Energy-efficient Blockchain Consensus Algorithm for Decentralize Federated Learning System in Resource constrained Drone Swarm -- Applications of Consortium Blockchain in Power Grid Security: A Systematic Review -- Blockchain and OR based data sharing solution for Internet of Things -- Rearranging Inv Message in the Bitcoin to Construct Covert Channels -- Long-term Blockchain Transactions Spanning Multiplicity of Smart Contract Methods -- Market Derivative Risks and Regulation of Virtual Currency Trading Using "PaoFen" Platforms -- Research on Regulation Oriented Decentralized Oracle Machine -- Obric: Oblivious Keyword Search in Hyperledger Fabric Platform -- Blockchain Architecture and Optimization -- A distributed, penetrative and all-dimensional supervision architecture for consortium blockchain -- SC-Chain: a multi-modal collaborative storage system for medical resource -- Congestion Control with Receiver-aided Network Status Awareness in RDMA Transmission -- VPBFT: Improved PBFT consensus algorithm based on VRF and PageRank algorithm -- Consensusless Blockchain: A Promising High-Performance Blockchain without Consensus -- Protocols and Consensus -- Ouroboros Taktikos: Regularizing Proof-of-Stake via Dynamic Difficulty -- Petrichor: An Efficient Consensus Protocol Leveraging DAG and Sharding for Asynchronous BFT -- A Kind of Optimization Method for Committee and Reward Mechanism -- MagpieBFT: An Efficient Asynchronous BFT Protocol for Blockchain -- A Hierarchical Blockchain Framework with Selectable Consensus Scope for Data Sharing in Internet of Vehicles -- An Improved PBFT Consensus Algorithm for Supply Chain Finance. . |
Record Nr. | UNINA-9910766885503321 |
Chen Jiachi
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain and Trustworthy Systems : 5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part I / / edited by Jiachi Chen, Bin Wen, Ting Chen |
Autore | Chen Jiachi |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (308 pages) |
Disciplina |
005.8
323.448 |
Altri autori (Persone) |
WenBin
ChenTing |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection - Law and legislation
Artificial intelligence Data structures (Computer science) Information theory Operating systems (Computers) Computers, Special purpose Privacy Artificial Intelligence Data Structures and Information Theory Operating Systems Special Purpose and Application-Based Systems |
ISBN | 981-9981-01-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Anomaly detection on blockchain -- Blockchain Scam Detection: State-of-the-art, Challenges, and Future Directions -- ScamRadar: Identifying Blockchain Scams When They are Promoting -- Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology -- Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology -- Edge Intelligence and Metaverse Services -- Dynamic Computation Offloading Leveraging Horizontal Task Offloading and Service Migration in Edge Networks -- Blockchain-Assisted Authentication and Key Agreement Protocol for Cloud-Edge Collaboration -- Towards Efficient and Privacy-preserving Hierarchical Federated Learning for Distributed Edge Network -- Blockchain System Security -- Securing Blockchain Using Propagation Chain Learning -- Privacy Protection Multi-copy Provable Data Possession supporting Data Reliability -- Research On Comprehensive Blockchain Regulation And Antifraud System -- Analysis of Peeling Chain Model in Bitcoin Mixing Service -- A Blockchain-based On-chain and Off-chain Dual-trusted Carbon Emission Trading System with Reputation Mechanism -- Empirical Study and Surveys -- Smart Contract Vulnerability Detection Methods: A Survey -- Who Needs the Most Research Effort? Investigating the Importance of Smart Contract Weaknesses -- A Survey on Blockchain Abnormal Transaction Detection -- A Systematic Literature Review on Smart Contract Vulnerability Detection by Symbolic Execution -- Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges -- Federated Learning for Blockchain -- A Blockchain-enabled Decentralized Federated Learning System with Transparent and Open Incentive and Audit Contracts -- Blockchain-based Federated Learning for IoT Sharing: Incentive Scheme with Reputation Mechanism -- An Optimized Scheme of Federated Learning Based on Differential Privacy. |
Record Nr. | UNINA-9910767547203321 |
Chen Jiachi
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Challenges in Cybersecurity and Privacy : the European Research Landscape / / edited by Jorge Bernal Bernabe and Antonio Skarmeta |
Autore | Bernabe Jorge Bernal |
Pubbl/distr/stampa | Taylor & Francis, 2019 |
Descrizione fisica | 1 online resource (xli, 328 pages) : illustrations |
Disciplina | 323.448 |
Soggetto topico |
Computer security
Computer crimes - Prevention Privacy, Right of |
Soggetto non controllato |
Computer security
Online safety and behaviour |
ISBN |
1-00-333749-X
1-000-79218-8 1-003-33749-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1.Introducing the European Research Landscape on Cybersecurity and Privacy 2. Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS / IOT Architectures 3. Statistical analysis and economic models for enhancing cyber-security in SAINT 4. The YAKSHA project 5. The FORTIKA edge solution for Automating SMEs Security 6. CYBECO: Supporting cyber-insurance from a behavioural choice perspective 7. Cyber Threat Intelligence from European-wide sensor network in SISSDEN 8. CIPSEC- Enhancing Critical Infrastructure Protection with innovative SECurity framework 9. A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis: The CS-AWARE project 10. Complex project to develop real tools for fighting counter terrorism: Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event 11. TRUESSEC: Trustworthiness Label Recommendations 12. An overview on ARIES: Reliable European Identity Ecosystem 13. The LIGHTest Project: Overview, Reference Architecture and Trust Scheme Publication Authority 14. Secure and Privacy-Preserving Identity and Access Management in CREDENTIAL 15. FutureTrust -- Future Trust Services for Trustworthy Global Transactions 16. LEPS. Leveraging eID in the Private Sector |
Record Nr. | UNINA-9910632994203321 |
Bernabe Jorge Bernal
![]() |
||
Taylor & Francis, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cognitive Computing - ICCC 2024 : 8th International Conference, Held as Part of the Services Conference Federation, SCF 2024, Bangkok, Thailand, November 16–19, 2024, Proceedings / / edited by Ruifeng Xu, Huan Chen, Yirui Wu, Liang-Jie Zhang |
Autore | Xu Ruifeng |
Edizione | [1st ed. 2025.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
Descrizione fisica | 1 online resource (137 pages) |
Disciplina |
005.8
323.448 |
Altri autori (Persone) |
ChenHuan
WuYirui ZhangLiang-Jie |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection - Law and legislation
Computer engineering Computer networks Data protection Operating systems (Computers) Privacy Computer Engineering and Networks Data and Information Security Operating Systems |
ISBN |
9783031779541
3031779541 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | -- Research Track. -- A Review of Link Prediction on Heterogeneous Networks. -- Research on Firefly Algorithm Enhancement by Diversifying Swarm. -- A Survey on Anomaly Detection With Few-Shot Learning. -- Electromyography-Based Intentional-Deception Behavior Analysis in an Interactive Social Context: Statistical Analysis and Machine Learning. -- Application Track. -- An Adaptive Hot Ranking Algorithm for Popular Item Recommendation in the Express Industry. -- Retrieval-Augmented Generation Architecture Framework: Harnessing the Power of RAG. -- Short Paper Track. -- Application and Optimization of Multi-Agent Reinforcement Learning in Collaborative Decision-Making. -- LLM-Based Automating Product Information Retrieval for Industry Analysis: A Real-World Application. |
Record Nr. | UNISA-996630869903316 |
Xu Ruifeng
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Das Datenschutzgesetz im Privatbereich : unter besonderer Berucksichtigung seiner motivationalen Grundlage / James Thomas Peter |
Autore | Peter, James Thomas |
Pubbl/distr/stampa | Zurich : Schulthess Pol., 1994 |
Disciplina | 323.448 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNINA-990006380580403321 |
Peter, James Thomas
![]() |
||
Zurich : Schulthess Pol., 1994 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data privacy and GDPR handbook [[electronic resource] /] / Sanjay Sharma ; with research associate Pranav Menon |
Autore | Sharma Sanjay |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, , [2020] |
Descrizione fisica | 1 online resource (499 pages) |
Disciplina | 323.448 |
Soggetto topico |
Privacy, Right of
Computer security Data protection |
ISBN |
1-119-59419-7
1-119-59425-1 1-119-59430-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Origin and Concept of Data Privacy -- A Brief History of Data Privacy -- GDPR's Scope of Application -- Technical & Organizational Requirements under GDPR -- Material Requisites for Processing under the GDPR -- Data Subject's Rights -- GDPR Enforcement -- Remedies -- Governmental use of Data -- Facebook : A Perennial Abuser of Data Privacy -- Facebook & GDPR -- Creating a GDPR Compliance Department. |
Record Nr. | UNINA-9910555084603321 |
Sharma Sanjay
![]() |
||
Hoboken, New Jersey : , : John Wiley & Sons, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|