当前位置:首页 > 其他书籍
COMPUTERS
COMPUTERS

COMPUTERSPDF电子书下载

其他书籍

  • 电子书积分:15 积分如何计算积分?
  • 作 者:PRIVACY AND DATA PROTECTION:AN ELEMENT OF CHOICE
  • 出 版 社:SPRINGER
  • 出版年份:2011
  • ISBN:
  • 页数:457 页
图书介绍:
《COMPUTERS》目录
标签:

Part Ⅰ Building and Rebuilding Legal Concepts for Privacy and Data Protection 3

1 The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?)&Katja de Vries, Rocco Bellanova, Paul De Hert, and Serge Gutwirth 3

2 The Noise in the Archive: Oblivion in the Age of Total Recall&Jean-Francois Blanchette 25

3 Property in Personal Data: Second Life of an Old Idea in the Age of Cloud Computing, Chain Informatisation, and Ambient Intelligence&Nadezhda Purtova 39

4 Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization&Norberto Nuno Gomes de Andrade 65

Part Ⅱ The Dark Side: Suspicions, Distrust and Surveillance 101

5 Frames from the Life and Death of Jean Charles de Menezes&Amos Bianchi and Denis J. Roio 101

6 Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden&Christel Backman 111

7 Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions&Johann Cas 139

8 EU PNR: European Flight Passengers Under General Suspicion - The Envisaged European Model of Analyzing Flight Passenger Data&Franziska Boehm 171

9 Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing"&Arnd Weber and Dirk Weber 201

Part Ⅲ Privacy Practices as Vectors of Reflection 211

10 Keeping Up Appearances: Audience Segregation in Social Network Sites&Bibi van den Berg and Ronald Leenes 211

11 Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second Life&Katja de Vries 233

12 Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking&Fadhila Mazanderani and Ian Brown 251

13 Rise and Phall: Lessons from the Phorm Saga&Paul Bernal 269

14 Disclosing or Protecting? Teenagers' Online Self-Disclosure&Michel Walrave and Wannes Heirman 285

15 Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much Time&John J. Borking 309

Part Ⅳ Privacy and Data Protection in the Cloud 345

16 Can a Cloud Be Really Secure? A Socratic Dialogue&Gurpreet Dhillon and Ella Kolkowska 345

17 Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice&Joep Ruiter and Martijn Warnier 361

18 Data Protection in the Clouds&Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gerard, and Claire Gayrel 377

19 Privacy-Preserving Data Mining from Outsourced Databases&Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang 411

20 Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study&Valentina Casola, Raffaele Lettiero, Massimiliano Rak, and Umberto Villano 427

21 Security and Privacy in the Clouds: A Bird's Eye View&Wolter Pieters 445

返回顶部