COMPUTERSPDF电子书下载
- 电子书积分:15 积分如何计算积分?
- 作 者:PRIVACY AND DATA PROTECTION:AN ELEMENT OF CHOICE
- 出 版 社:SPRINGER
- 出版年份:2011
- ISBN:
- 页数:457 页
Part Ⅰ Building and Rebuilding Legal Concepts for Privacy and Data Protection 3
1 The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?)&Katja de Vries, Rocco Bellanova, Paul De Hert, and Serge Gutwirth 3
2 The Noise in the Archive: Oblivion in the Age of Total Recall&Jean-Francois Blanchette 25
3 Property in Personal Data: Second Life of an Old Idea in the Age of Cloud Computing, Chain Informatisation, and Ambient Intelligence&Nadezhda Purtova 39
4 Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization&Norberto Nuno Gomes de Andrade 65
Part Ⅱ The Dark Side: Suspicions, Distrust and Surveillance 101
5 Frames from the Life and Death of Jean Charles de Menezes&Amos Bianchi and Denis J. Roio 101
6 Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden&Christel Backman 111
7 Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions&Johann Cas 139
8 EU PNR: European Flight Passengers Under General Suspicion - The Envisaged European Model of Analyzing Flight Passenger Data&Franziska Boehm 171
9 Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing"&Arnd Weber and Dirk Weber 201
Part Ⅲ Privacy Practices as Vectors of Reflection 211
10 Keeping Up Appearances: Audience Segregation in Social Network Sites&Bibi van den Berg and Ronald Leenes 211
11 Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second Life&Katja de Vries 233
12 Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking&Fadhila Mazanderani and Ian Brown 251
13 Rise and Phall: Lessons from the Phorm Saga&Paul Bernal 269
14 Disclosing or Protecting? Teenagers' Online Self-Disclosure&Michel Walrave and Wannes Heirman 285
15 Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much Time&John J. Borking 309
Part Ⅳ Privacy and Data Protection in the Cloud 345
16 Can a Cloud Be Really Secure? A Socratic Dialogue&Gurpreet Dhillon and Ella Kolkowska 345
17 Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice&Joep Ruiter and Martijn Warnier 361
18 Data Protection in the Clouds&Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gerard, and Claire Gayrel 377
19 Privacy-Preserving Data Mining from Outsourced Databases&Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang 411
20 Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study&Valentina Casola, Raffaele Lettiero, Massimiliano Rak, and Umberto Villano 427
21 Security and Privacy in the Clouds: A Bird's Eye View&Wolter Pieters 445