519 results on '"DATA protection"'
Search Results
2. Cyber-Physical Systems Security.
- Author
-
Koç, Çetin Kaya
- Subjects
Data protection ,Data structures (Computer science) ,Public safety ,System safety ,Data Structures and Information Theory ,Crime Control and Security ,Security Science and Technology - Abstract
Summary: The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
- Published
- 2018
3. Future crimes : inside the digital underground and the battle for our connected world.
- Author
-
Goodman, Marc
- Subjects
Computer crimes -- Prevention ,Computer security ,Data protection ,Technological innovations -- Moral and ethical aspects - Abstract
Summary: Technological advances have benefited our world in immeasurable ways, but there is an ominous flipside. Criminals are often the earliest, and most innovative, adopters of technology and modern times have lead to modern crimes. Today's criminals are stealing identities, draining online bank-accounts and wiping out computer servers. It's disturbingly easy to activate baby cam monitors to spy on families, pacemakers can be hacked to deliver a lethal jolt, and thieves are analyzing your social media in order to determine the best time for a home invasion.Meanwhile, 3D printers produce AK-47s, terrorists can download the recipe for the Ebola virus, and drug cartels are building drones. This is just the beginning of the tsunami of technological threats coming our way. In Future Crimes, Marc Goodman rips open his database of hundreds of real cases to give us front-row access to these impending perils. Reading like a sci-fi thriller, but based in startling fact, Goodman raises tough questions about the expanding role of technology in our lives. Future Crimes is a call to action for better security measures worldwide, but most importantly, will empower readers to protect themselves against these looming technological threats - before it's too late.
- Published
- 2016
4. Security engineering for cloud computing : approaches and tools.
- Author
-
Fernandez-Medina, Eduardo, Mellado, Daniel, Piattini, Mario, and Rosado, David G.
- Subjects
Security measures ,Cloud computing ,Computer networks ,Computer security ,Data protection - Abstract
Summary: "This book provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications"-- Provided by publisher.
- Published
- 2013
5. The seven veils of privacy: How our debates about privacy conceal its nature
- Author
-
O'Hara, Kieron, author and O'Hara, Kieron
- Published
- 2023
- Full Text
- View/download PDF
6. CISO Soft Skills.
- Author
-
Collette, Ron, Gentile, Mike, and Gentile, Skye
- Subjects
Computer security ,Data protection - Abstract
Summary: As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure security success. CISO Soft Skills: Securing Organizations
- Published
- 2008
7. Information assurance architecture.
- Author
-
Willett, Keith D.
- Subjects
Business enterprises -- Communication systems -- Management ,Computer networks ,Computer security ,Data protection ,Information resources management ,Information technology -- Management - Abstract
Summary: Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak; consequently, information architecture must be dynamic and fully integrated within all facets of the enterprise. In Information Assurance Architecture, Keith W. Willett draws on his over 25 years of technical, security, and business experience to provide a framework for organizations to align information assurance with the enterprise and their overall mission.
- Published
- 2008
8. Role and Significance of Data Protection in Risk Management Practices in the Insurance Market
- Author
-
Trivedi, Sonal, author and Malik, Reena, author
- Published
- 2022
- Full Text
- View/download PDF
9. Privacy as Vulnerability Protection: Optimizing Trade-Offs with Opportunities to Gain Knowledge
- Author
-
Fasterling, Björn
- Published
- 2022
- Full Text
- View/download PDF
10. Health Data, Public Interest, and Surveillance for Non-health-Related Purposes
- Author
-
Taylor, Mark and Kirkham, Richard
- Published
- 2021
- Full Text
- View/download PDF
11. Our Data-driven Future: Promise, Perils, and Prognoses
- Author
-
Turjeman, Dana and Feinberg, Fred M.
- Published
- 2020
- Full Text
- View/download PDF
12. International Trade Law and Global Data Governance
- Author
-
Mishra, Neha
- Subjects
digital trade ,electronic commerce ,World Trade Organization ,Regional Trade Agreements ,internet governance ,online censorship ,cybersecurity ,privacy ,law enforcement ,digital development ,data protection ,thema EDItEUR::L Law::LB International law::LBB Public international law::LBBM Public international law: economic and trade ,thema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNQ IT and Communications law / Postal laws and regulations - Abstract
This open access book examines how international trade agreements apply to domestic regulations on cross-border data flows and then proposes a multilayered framework to align international trade law with evolving norms and practices in global data governance. Digital trade and global data governance are at a unique crossroads, raising significant policy challenges. The book focuses on five policy areas at the interface of digital trade and global data governance: privacy, cybersecurity, governmental access to data, data divide, and competition. In five separate chapters, the book analyses how different types of domestic laws in each of these policy areas interface with existing provisions in international trade law. Thereafter, each of these chapters explores the challenges and possibilities for aligning international trade law with evolving norms, standards and best practices in that specific area of data regulation, both at the domestic and transnational level. Drawing upon these findings, the final chapter proposes a multilayered framework for aligning international trade law with evolving norms and practices in global data governance. The key message of the book is that international trade law can and should meaningfully align with and contribute to the development of transnational data governance norms and practices. It can also foster robust regulatory cooperation among various stakeholders of the digital economy. As the book offers a broad perspective on the significance of digital trade rules in a datafied world, it will benefit scholars, practitioners and policymakers working on digital trade and data regulation, helping its readers explore fresh avenues in the future development of digital trade rules. The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com. Open access was funded by the Swiss National Science Foundation.
- Published
- 2024
- Full Text
- View/download PDF
13. Regulating the Synthetic Society
- Author
-
van der Sloot, Bart
- Subjects
Humanoid Robots ,Deepfakes ,Augmented Reality ,Virtual Reality ,AI ,artificial intelligence ,privacy ,data protection ,regulatory gaps ,thema EDItEUR::L Law::LN Laws of specific jurisdictions and specific areas of law::LNQ IT and Communications law / Postal laws and regulations - Abstract
Experts predict that in 5 years’ time, more than 90% of all digital content will be wholly or partially AI generated. In a synthetic society, it may no longer be possible to establish what is real and what is not. Central to this open access book are 4 technologies on the frontline of this trend: humanoid robots, deepfakes, augmented reality, and virtual reality. Although they are only in their relative infancy, these technologies can already produce content that is indistinguishable from authentic material. The impact of this new reality on democracy, the judicial system, the functioning of the press, as well as on personal relationships will be unprecedented. Van der Sloot describes the technological fundaments of each of those technologies and maps their positive uses for educational purposes as well as for the treatment of patients, for the entertainment and creative industries, and the retail and financial sectors. The book also conceptualises their negative uses for fraud, deception, exploitation, identity-theft and exploitation, and shows their deeper effects on the post-truth society, the privatisation of the public sphere, and the loss of individual autonomy and societal trust. The book evaluates how the current European legal paradigm applies to these technologies, focussing on the right to privacy and data protection, freedom of expression, procedural law, tort law, and the regulation of AI. It discusses regulatory alternatives to solve existing regulatory gaps and shows that there are no easy answers. The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com.
- Published
- 2024
- Full Text
- View/download PDF
14. The Law and Economics of Privacy, Personal Data, Artificial Intelligence, and Incomplete Monitoring
- Author
-
Fagan, Frank and Langenfeld, James
- Published
- 2022
- Full Text
- View/download PDF
15. Trust and Financial Services: The Impact of Increasing Digitalisation and the Financial Crisis
- Author
-
Oehler, Andreas, author and Wendt, Stefan, author
- Published
- 2018
- Full Text
- View/download PDF
16. Big data: Ethical debates
- Author
-
Richterich, Annika
- Published
- 2018
17. Data in Society: Challenging Statistics in an Age of Globalisation
- Author
-
Evans, Jeff, editor, Ruane, Sally, editor, and Southall, Humphrey, editor
- Published
- 2019
- Full Text
- View/download PDF
18. Buying your Self on the Internet: Wrap Contracts and Personal Genomics
- Author
-
Phillips, Andelka M., author and Phillips, Andelka M.
- Published
- 2019
- Full Text
- View/download PDF
19. Data Governance and Policy in Africa
- Author
-
Ndemo, Bitange, Ndung’u, Njuguna, Odhiambo, Scholastica, and Shimeles, Abebe
- Subjects
Data governance ,Data protection ,Policy making ,Digital revolution ,Africa ,bic Book Industry Communication::J Society & social sciences::JP Politics & government::JPP Public administration ,bic Book Industry Communication::J Society & social sciences::JP Politics & government::JPH Political structure & processes ,bic Book Industry Communication::J Society & social sciences::JP Politics & government - Abstract
This open access book examines data governance and its implications for policymaking in Africa. Bringing together economists, lawyers, statisticians, and technology experts, it assesses gaps in both the availability and use of existing data across the continent, and argues that data creation, management and governance need to improve if private and public sectors are to reap the benefits of big data and digital technologies. It also considers lessons from across the globe to assess principles, norms and practices that can guide the development of data governance in Africa. The book will appeal to scholars and students of data governance, technology and public policy, as well as practitioners and policy makers.
- Published
- 2023
- Full Text
- View/download PDF
20. Quantitative Daten in bildungswissenschaftlichen Disziplinen
- Author
-
Gröber, Jessica, Kellert, Marc André, and Hofäcker, Dirk
- Subjects
Quantitative Methoden ,quantitative methods ,data literacy ,Datenkompetenz ,social research ,Sozialforschung ,Methodenkompetenz ,methodological competence ,empirical research ,Empirische Forschung ,Forschungsmethodik ,research methods ,Rekrutierung ,subject recruitment ,data protection ,Datenschutz ,Bildungswissenschaften ,educational science ,bic Book Industry Communication::J Society & social sciences::JH Sociology & anthropology::JHB Sociology::JHBC Social research & statistics - Abstract
In bildungswissenschaftlichen Disziplinen galt die Anwendung quantitativer Forschungsmethoden bislang nicht unbedingt als disziplinärer Standardzugang in der Datensuche, -erhebung und -analyse. Gleichzeitig gewinnt im Zuge besserer Datenverfügbarkeit, u.a. auch infolge zunehmender Digitalisierung, die Arbeit mit quantitativen Daten ebenso wie die individuelle Kompetenz zu ihrer Erhebung und Analyse an Bedeutung. Diese forschungsmethodische „Soft Skill“-Lücke greift dieser Sammelband auf und schließt sie: Die Handreichung des multiprofessionellen Autor:innenteams beleuchtet und diskutiert die Möglichkeiten der Nutzung quantitativer Daten in bildungswissenschaftlichen Disziplinen kritisch und vermittelt hilfreiche Kompetenzen im Bereich des Findens geeigneter (Sekundär-)Daten, der Umsetzung eigener Datenerhebungen, sowie weiterer forschungspraktischer Datenkompetenzen (bspw. Datenschutz)., In educational science, quantitative research methods are not necessarily considered the ultimate in data collection. But why does quantitative social research only play a secondary role? Do students and teachers lack knowledge about the subject-specific usability of quantitative data at this point? The anthology addresses this "soft skill" gap and closes it: The handbook by the multi-professional team of authors - consisting of established experts and practitioners in the field of quantitative social research - sheds light on the possibilities of using quantitative data and teaches helpful skills in the field of data finding, data collection and data protection.
- Published
- 2023
- Full Text
- View/download PDF
21. Data Privacy and Crowdsourcing
- Author
-
Hornuf, Lars, Mangold, Sonja, and Yang, Yayun
- Subjects
Data Privacy ,Data Regulation ,Digitalization ,Data Protection ,Crowdfounding ,Platform Economics ,Crowdsourcing ,bic Book Industry Communication::K Economics, finance, business & management::KF Finance & accounting::KFF Finance ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJQ Business mathematics & systems ,bic Book Industry Communication::L Law::LN Laws of Specific jurisdictions::LNC Company, commercial & competition law ,bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJH Entrepreneurship - Abstract
This open access book describes the most important legal sources and principles of data privacy and data protection in China, Germany and the United States. The authors collected privacy statements from more than 400 crowdsourcing platforms, which allowed them to empirically evaluate their data privacy and data protection practices. The book compares the practices in the three countries and develops empirically-grounded policy recommendations. A profound analysis on workers´ privacy in new forms of work in China, Germany, and the United States. Prof. Dr. Wolfgang Däubler, University of Bremen This is a comprehensive and timely book for legal and business scholars as well as practitioners, especially with the increasingly important role of raw data in machine learning and artificial intelligence. Professor Mingfeng Lin, Georgia Institute of Technology
- Published
- 2023
- Full Text
- View/download PDF
22. Trends in Data Protection and Encryption Technologies
- Author
-
Mulder, Valentin, Mermoud, Alain, Lenders, Vincent, and Tellenbach, Bernhard
- Subjects
Trusted Execution ,Blockchain ,Digital Rights Management ,Data Protection ,Authentication ,Encryption ,Cyber-Defence ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology - Abstract
This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a reference for organizations and individuals that need to elaborate coherent and efficient data protection and encryption strategies in the coming years. The 38 technologies have been sorted into five categories. First, encryption foundations represent the technologies used to create other encryption applications. Second, low-level applications represent the technologies that focus on micro functionalities. Third, high-level applications represent the technologies that focus on more abstract and macro functionalities. Fourth, data protection represents the technologies used to protect data without encrypting these data. Finally, use cases represent concrete ways the different technologies can be used together to create a working solution. The book serves as a guide for decision-making within administrations, government organizations, and industry. It will also be interesting for the tech-savvy board member or engineers looking to get an entry point into data protection topics. Last not least, the book will also be a valuable reading for anyone interested in data protection and encryption.
- Published
- 2023
- Full Text
- View/download PDF
23. Wie der Verwaltungscomputer die Arbeitsmigration programmierte
- Author
-
Mähr, Moritz
- Subjects
Central Foreigners Register ,Computergeschichte ,Datenschutz ,Digitale Transformation ,EDV ,History of technology ,Informationssystem ,Migrationsgeschichte ,Technikgeschichte ,Verwaltungsgeschichte ,ZAR ,Zentrales Ausländerregister ,data protection ,digital transformation ,history of administration ,history of computing ,history of migration ,information system ,thema EDItEUR::C Language and Linguistics::CF Linguistics::CFZ Sign languages, Braille and other linguistic communication - Abstract
In diesem Buch analysiert Moritz Mähr die Einführung und Entwicklung elektronischer Datenverarbeitungssysteme in der Schweizerischen Bundesverwaltung und deren Einfluss auf die Steuerung der Arbeitsmigration. Die Studie beleuchtet, wie der Einsatz von Computern und neuen Informationssystemen Verwaltungspraktiken, Handlungsspielräume und politische Entscheidungsprozesse verändert hat. Von der Einführung der ersten Großrechner in den 1960er Jahren über die Einrichtung des Zentralen Ausländerregisters bis hin zur Einführung von Bildschirmterminals zeichnet das Buch die wechselseitigen Anpassungsprozesse zwischen Technik und Verwaltung nach. Es zeigt, wie organisatorische Lernprozesse und technologische Innovationen ineinandergriffen und die Rolle der Verwaltung neu definierten.
- Published
- 2024
- Full Text
- View/download PDF
24. The Right To Be Forgotten
- Author
-
Carter, Edward L.
- Published
- 2016
- Full Text
- View/download PDF
25. The New Frontiers of Fashion Law.
- Author
-
Cerchia, Rossella Esther, Cerchia, Rossella Esther, and Pozzo, Barbara
- Subjects
Law ,Corporate Social Responsibility ,EU Waste Framework Directive ,GDPR ,Photoshop ,art ,artistic value ,circular fashion ,code of ethics ,collective works ,comparative law ,copyright ,copyright law ,corporate social responsibility ,cultural appropriation ,cybersecurity ,data breach ,data protection ,ethical consumer ,fashion ,fashion law ,fashion shows ,fast fashion ,folklore ,image ,influencer marketing ,intellectual property ,intellectual property law ,legal informatics ,models ,online advertising ,performers' rights ,privacy ,private governance ,right of privacy ,right of publicity ,self-regulation ,smart clothes ,smart fashion ,social media ,sustainability ,sustainable fashion ,textile and clothing waste ,traditional designs ,traditional knowledge ,transparency ,wearable devices - Abstract
Summary: Fashion law encompasses a wide variety of issues that concern an article of clothing or a fashion accessory, starting from the moment they are designed and following them through distribution and marketing phases, all the way until they reach the end-user. Contract law, intellectual property, company law, tax law, international trade, and customs law are of fundamental importance in defining this new field of law that is gradually taking shape. This volume focuses on the new frontiers of fashion law, taking into account the various fields that have recently emerged as being of great interest for the entire fashion world: from sustainable fashion to wearable technologies, from new remedies to cultural appropriation to the regulation of model weight, from advertising law on the digital market to the impact of new technologies on product distribution. The purpose is to stimulate discussion on contemporary problems that have the potential to define new boundaries of fashion law, such as the impact of the heightened ethical sensitivity of consumers (who increasingly require effective solutions), that a comparative law perspective renders more interesting. The volume seeks to sketch out the new legal fields in which the fashion industry is getting involved, identifying the new boundaries of fashion law that existing literature has not dealt with in a comprehensive manner.
26. Security in Computer and Information Sciences. First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers.
- Author
-
Gelenbe, Erol, Campegiani, Paolo, Czachórski, Tadeusz, Gelenbe, Erol, Katsikas, Sokratis K., Komnios, Ioannis, Romano, Luigi, and Tzovaras, Dimitrios
- Subjects
Coding theory & cryptology ,Computer security ,Expert systems / knowledge-based systems ,Information retrieval ,Network hardware ,Application software ,Computer communication systems ,Computer science ,Data encryption (Computer science) ,Data protection ,Special purpose computers - Abstract
Summary: This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has become a crucial aspect of the performance of computer systems. The papers deal with these issues, with a specific focus on societally critical systems such as health informatics systems, the Internet of Things, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.
27. Strafvorderlijke gegevensverwerking
- Author
-
Fedorova, M. I., te Molder, R. M., Dubelaar, M. J., Lestrade, S. M. A., and Walree, T. F.
- Subjects
Law of European states ,European Law ,Data protection ,Privacy ,Criminal investigations ,Criminal procedure ,bic Book Industry Communication::L Law::LN Laws of Specific jurisdictions::LNF Criminal law & procedure ,bic Book Industry Communication::L Law::LN Laws of Specific jurisdictions::LNQ IT & Communications law::LNQD Data protection law - Abstract
As a result of society’s increasing digitisation, the police have ever more opportunities to collect, investigate and combine huge amounts of personal data using advanced technology. Examples are provided from recent cases where police have gained access to millions of encrypted messages from various servers, including Ennetcom, EncroChat and Sky Global. However, the current legal framework is, as yet, ill-equipped to deal with this new reality. Partly for this reason, legislators are facing new questions about how the (further) processing of data in detection should be regulated by law. Commissioned by the WODC, this study examines the legal safeguards in criminal justice data collection in relation to the legal safeguards governing the processing of these data. The Code of Criminal Procedure mainly focuses on the collection of data and to a much lesser extent on its further use, but this may involve a (fresh) invasion of citizens’ privacy. The Police Data Act contains some provisions to data processing, but the relationship with the Dutch Code of Criminal Procedure is not entirely clear. This study identifies the requirements and safeguards under European law for the processing of data for criminal justice purposes. Further inspiration is drawn from experience with the Intelligence and Security Services Act 2017 in which powers of collection and (further) processing are regulated in a single law. Finally, it explores how, in several countries (Germany, Belgium and Norway), the requirements arising from European law have been translated into legal regulations and how these regulations are designed. This study provides tools that legislators can use to reconsider the methods of standardisation and legal regulation design to better protect citizens' privacy. The recommendations thus focus on strengthening the legal framework on data processing and its supervision by creating an explicit legal framework in the Code of Criminal Procedure and establishing an independent supervisor focused on the processing of personal data by investigative authorities.
- Published
- 2022
- Full Text
- View/download PDF
28. Beyond Data
- Author
-
Mantelero, Alessandro
- Subjects
Human Rights ,Artificial Intelligence ,Impact Assessment ,Ethics ,Data Protection ,Fundamental Rights ,Human Rights Impact Assessment (HRIA) ,AI Regulation ,bic Book Industry Communication::L Law::LN Laws of Specific jurisdictions::LNJ Entertainment & media law ,bic Book Industry Communication::J Society & social sciences::JP Politics & government::JPV Political control & freedoms::JPVH Human rights ,bic Book Industry Communication::L Law::LB International law ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::L Law::LB International law::LBB Public international law - Abstract
This open access book focuses on the impact of Artificial Intelligence (AI) on individuals and society from a legal perspective, providing a comprehensive risk-based methodological framework to address it. Building on the limitations of data protection in dealing with the challenges of AI, the author proposes an integrated approach to risk assessment that focuses on human rights and encompasses contextual social and ethical values. The core of the analysis concerns the assessment methodology and the role of experts in steering the design of AI products and services by business and public bodies in the direction of human rights and societal values. Taking into account the ongoing debate on AI regulation, the proposed assessment model also bridges the gap between risk-based provisions and their real-world implementation. The central focus of the book on human rights and societal values in AI and the proposed solutions will make it of interest to legal scholars, AI developers and providers, policy makers and regulators. Alessandro Mantelero is Associate Professor of Private Law and Law & Technology in the Department of Management and Production Engineering at the Politecnico di Torino in Turin, Italy.
- Published
- 2022
- Full Text
- View/download PDF
29. Le secret médical
- Author
-
Erard, Frédéric, Huerlimann, Daniel, and Thommen, Marc
- Subjects
medical secret ,professional secret ,data protection ,medical law ,bic Book Industry Communication::L Law - Abstract
Medical secrecy is going through a troubled period today. The multiplication of health care providers, technological progress and the pressure of financial policies tend to put pressure on this institution and to redefine its contours. In Swiss law, medical secrecy is now governed by an abundance of legal provisions whose implementation has become complex and unpredictable. After a first part dealing with the historical origins of medical secrecy, its main current factors of influence and its ethical justifications, the book systematically analyzes the multiple duties of confidentiality that may apply to caregivers, their respective limits and their articulation. The study concludes with an analysis of several scenarios for the future of medical confidentiality.
- Published
- 2021
- Full Text
- View/download PDF
30. The Elements of Big Data Value
- Author
-
Curry, Edward, Metzger, Andreas, Zillner, Sonja, Pazzaglia, Jean-Christophe, and García Robles, Ana
- Subjects
Information Storage and Retrieval ,Business and Management, general ,Innovation/Technology Management ,The Computer Industry ,Big Data ,Innovation and Technology Management ,Technology Commercialization ,Digital Transformation ,Innovation Spaces ,Data-Driven Innovation ,Data Analytics ,Technology Management ,Data Ecosystems ,Data Protection ,Big Data Business Models ,Open Access ,Information retrieval ,Data warehousing ,Business & Management ,Research & development management ,Industrial applications of scientific research & technological innovation ,Information technology industries ,Databases ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management ,bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJM Management & management techniques::KJMV Management of specific areas::KJMV6 Research & development management ,bic Book Industry Communication::K Economics, finance, business & management::KN Industry & industrial studies::KNT Media, information & communication industries::KNTX Information technology industries ,bic Book Industry Communication::U Computing & information technology::UN Databases - Abstract
This open access book presents the foundations of the Big Data research and innovation ecosystem and the associated enablers that facilitate delivering value from data for business and society. It provides insights into the key elements for research and innovation, technical architectures, business models, skills, and best practices to support the creation of data-driven solutions and organizations. The book is a compilation of selected high-quality chapters covering best practices, technologies, experiences, and practical recommendations on research and innovation for big data. The contributions are grouped into four parts: · Part I: Ecosystem Elements of Big Data Value focuses on establishing the big data value ecosystem using a holistic approach to make it attractive and valuable to all stakeholders. · Part II: Research and Innovation Elements of Big Data Value details the key technical and capability challenges to be addressed for delivering big data value. · Part III: Business, Policy, and Societal Elements of Big Data Value investigates the need to make more efficient use of big data and understanding that data is an asset that has significant potential for the economy and society. · Part IV: Emerging Elements of Big Data Value explores the critical elements to maximizing the future potential of big data value. Overall, readers are provided with insights which can support them in creating data-driven solutions, organizations, and productive data ecosystems. The material represents the results of a collective effort undertaken by the European data community as part of the Big Data Value Public-Private Partnership (PPP) between the European Commission and the Big Data Value Association (BDVA) to boost data-driven digital transformation.
- Published
- 2021
- Full Text
- View/download PDF
31. Private Daten
- Author
-
Wiesner, Barbara
- Subjects
Datensammlung ,Datenschutz ,Verschlüsselung ,Überwachung ,Kontrolle ,Freiheit ,Sicherheit ,Demokratie ,Datenverarbeitung ,Internet ,Sozialität ,Politik ,Digitale Medien ,Mediensoziologie ,Recht ,Medienwissenschaft ,Data Collections ,Data Protection ,Cryptography ,Surveillance ,Control ,Liberty ,Security ,Democracy ,Data Processing ,Social Relations ,Politics ,Digital Media ,Sociology of Media ,Law ,Media Studies ,bic Book Industry Communication::J Society & social sciences::JF Society & culture: general::JFD Media studies - Abstract
Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demokratische Gesellschaft, die es zu verstehen gilt. Barbara Wiesner stellt Aspekte der Verarbeitung von privaten Daten vor, die Laien selten bekannt sind. Dabei orientiert sie sich an Zitaten von Persönlichkeiten aus Wirtschaft, Wissenschaft und Politik und regt dazu an, sich eine eigene Meinung zu bilden. So wird das Thema Privatheit vor dem Hintergrund vielfältiger digitaler Datenkanäle ausgeleuchtet.
- Published
- 2021
32. GDPR and Biobanking
- Author
-
Slokenberga, Santa, Tzortzatou, Olga, and Reichel, Jane
- Subjects
European Law ,Systems and Data Security ,Human Genetics ,Data and Information Security ,Medical Genetics ,Biobank research ,GDPR ,Article 89 GDPR ,Data protection ,Informational privacy ,ELSI in genetics and genomics ,Human specimens ,Research Governance ,Public interest ,Regulatory framework ,Open Access ,International law ,Computer security ,Network security ,bic Book Industry Communication::L Law::LB International law ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::M Medicine::MF Pre-clinical medicine: basic sciences::MFN Medical genetics - Abstract
This open access book focuses on the discrepancies in biobank research regulations that are among the most significant hurdles to effective research collaboration. The General Data Protection Regulation (GDPR) has established stringent requirements for the processing of health and genetic data, while simultaneously allowing considerable multi-level exceptions for the purposes of scientific research. In addition to directly applicable exceptions, the GDPR places the regulatory responsibility for further defining how the Member States strike a balance between the individuals' rights and the public interest in research within their national legal orders. Since Member States' approaches to the trade-off between data subjects' rights on the one hand, and appropriate safeguards on the other, differ according to their ethical and legal traditions, their data protection requirements for research also differ considerably. This study takes a comprehensive approach to determine how the GDPR affects regulatory regimes on the use of personal data in biobanking research, with a particular focus on the balance between individuals' rights, public interest and scientific research. In this regard, it has two main goals: first, to scrutinize the GDPR research regime, its objective and constitutive elements, the impact it has on biobanking, and its role in a changing EU landscape post-Brexit; and second, to examine how various exceptions have been operationalized nationally, and what challenges and opportunities this diversification entails. The book not only captures the complexity GDPR creates for biobanking, but also sheds light on various approaches to tackling the corresponding challenges. It offers the first comprehensive analysis of GDPR for biobanking, and the most up-to-date overview of the national biobank regulatory frameworks in Europe.
- Published
- 2021
- Full Text
- View/download PDF
33. Digitales Verwaltungshandeln
- Author
-
Plattner, Roger
- Subjects
Algorithms ,government portals ,blockchain ,data protection ,digitalization ,e-government ,electronic legal transactions ,internet ,artificial intelligence ,administrative law ,bic Book Industry Communication::L Law - Abstract
"At a time when most everyday tasks can be performed online, public administration is also facing increasing demands in terms of accessibility, availability and simplification of its services. For this reason, numerous administrative services have been digitized in recent years under the term ""e-government"". In addition to all the positive aspects, this digitization is also associated with challenges and risks for the legal position of private individuals. This monograph is intended to contribute to answering the question of how the changes in the field of administrative action that accompany digitization are to be assessed in legal terms. On the one hand, technologies and phenomena that are already being used in the actions of public administration are examined for their compatibility with the existing legal framework. On the other hand, emerging future developments are highlighted and examined with a critical eye on possible legal problems. Translated with www.DeepL.com/Translator (free version)"
- Published
- 2021
- Full Text
- View/download PDF
34. DataPolitics
- Author
-
Bachor, Martina, Hug, Theo, and Pallaver, Günther
- Subjects
Media studies ,Politics ,digital ,Internet ,Data Protection ,bic Book Industry Communication::J Society & social sciences::JF Society & culture: general::JFD Media studies ,bic Book Industry Communication::J Society & social sciences::JP Politics & government ,bic Book Industry Communication::K Economics, finance, business & management::KN Industry & industrial studies::KNT Media, information & communication industries ,bic Book Industry Communication::U Computing & information technology::UD Digital lifestyle - Abstract
In our interaction with digital systems, we produce a great deal of data every day, which can be used for economic purposes as well as for political purposes. While democratic systems in Europe are looking for ways to deal with these personal traces as securely, anonymously and effectively as possible, data can also be used for political and social control, of which China is an example. This anthology contains contributions on current questions about opportunities and dangers of the political use of data. The contributions cover data-driven campaigning, the "naturalisation" of personal data production, the democratisation of digital control, data activism and digital citizenship, as well as digital literacy and the responsible use of educational data.
- Published
- 2021
35. Internet of Things and the Law
- Author
-
Noto La Diega, Guido
- Subjects
Amazon Echo ,Bluetooth ,Composite Things ,computer-implemented inventions ,concept of product ,consumer protection ,Contracting ,cross-border portability of online content services ,Cyber-risks ,cybersecurity ,data portability ,data protection ,Faulty products ,foreseeability ,Impression Products, Inc. v. Lexmark International ,insurance ,intellectual property rights ,jurisdiction ,Liability ,liability allocation ,M2M ,negligence ,Netflix Law ,NFC ,non-personal data ,online content services ,Patenting ,privacy ,Product liability ,RFID ,Spreadex Ltd v Cochrane ,The Internet of Things ,things of danger ,tortious liability ,Trade secrets ,transparency ,UK Consumer Rights Act 2015 ,bic Book Industry Communication::L Law::LA Jurisprudence & general issues ,bic Book Industry Communication::L Law::LN Laws of Specific jurisdictions::LNQ IT & Communications law ,bic Book Industry Communication::L Law::LN Laws of Specific jurisdictions::LNC Company, commercial & competition law::LNCJ Contract law ,bic Book Industry Communication::L Law::LN Laws of Specific jurisdictions::LNR Intellectual property law::LNRC Copyright law ,bic Book Industry Communication::L Law::LN Laws of Specific jurisdictions::LNR Intellectual property law::LNRD Patents law - Abstract
Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power – and the corresponding increasing significance of their disembodied counterparts – has been the subject of much legal analysis. For some time now, legal scholars have grappled with how laws drafted for tangible property and pre-digital ‘offline’ technologies can cope with dematerialisation, digitalisation, and the internet. As dematerialisation continues, this book aims to illuminate the opposite movement: re-materialisation, namely the return of data, knowledge, and power within a physical ‘smart’ world. This move frames the book’s central question: can the law steer re-materialisation in a human-centric and societally beneficial direction? To answer it, the book focuses on the IoT, the socio-technological phenomenon that is primarily responsible for this shift. After a thorough analysis of how existing laws can be interpreted to empower IoT end-users, Noto La Diega leaves us with the fundamental question of what happens when the law fails us and concludes with a call for collective resistance against ‘smart’ capitalism.
- Published
- 2023
36. Datenschutz bei drohnengestützter Datenbearbeitung durch Private
- Author
-
Henseler, David, Huerlimann, Daniel, and Thommen, Marc
- Subjects
data protection ,federal act on data protection ,privacy ,drones ,thema EDItEUR::L Law - Abstract
The usage of drones is constantly increasing, even among private individuals. Anyone who hears or sees a drone usually does not know whether he is being observed or filmed and whether the recorded material is being broadcast live or recorded. It also regularly remains unclear who is responsible for the drone. With this in mind, this book deals with the following question: How can the right to informational self-determination – substantiated in data protection law – be enforced in the case of drone based data processing by private individuals? The author analyses both the future data protection law and the new regulations on drone aviation and presents concrete proposals for an adjustment of the law.
- Published
- 2020
- Full Text
- View/download PDF
37. Facebook, the Media and Democracy
- Author
-
Andrews, Leighton
- Subjects
advertising ,algorithmic governance ,anti-trust ,big data ,celebrity technocrats ,data protection ,democracy ,Facebook ,Google ,hate-speech ,information utility ,regulation ,Silicon Valley libertarianism ,social media ,state security ,technological determinism ,venture capitalism ,thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBW Internet: general works ,thema EDItEUR::U Computing and Information Technology::UD Digital Lifestyle and online world: consumer and user guides::UDB Internet guides and online services::UDBS Social media / social networking ,thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPV Political control and freedoms ,thema EDItEUR::J Society and Social Sciences::JH Sociology and anthropology::JHB Sociology ,thema EDItEUR::J Society and Social Sciences::JB Society and culture: general::JBC Cultural and media studies::JBCT Media studies - Abstract
Facebook, the Media and Democracy examines Facebook Inc. and the impact that it has had and continues to have on media and democracy around the world. Drawing on interviews with Facebook users of different kinds and dialogue with politicians, regulators, civil society and media commentators, as well as detailed documentary scrutiny of legislative and regulatory proposals and Facebook’s corporate statements, the book presents a comprehensive but clear overview of the current debate around Facebook and the global debate on the regulation of social media in the era of ‘surveillance capitalism.’ Chapters examine the business and growing institutional power of Facebook as it has unfolded over the fifteen years since its creation, the benefits and meanings that it has provided for its users, its disruptive challenge to the contemporary media environment, its shaping of conversations, and the emerging calls for its further regulation. The book considers Facebook’s alleged role in the rise of democratic movements around the world as well as its suggested role in the election of Donald Trump and the UK vote to leave the European Union. This book argues that Facebook, in some shape or form, is likely to be with us into the foreseeable future and that how we address the societal challenges that it provokes, and the economic system that underpins it, will define how human societies demonstrate their capacity to protect and enhance democracy and ensure that no corporation can set itself above democratic institutions. This is an important research volume for academics and researchers in the areas of media studies, communications, social media and political science.
- Published
- 2020
- Full Text
- View/download PDF
38. Sekundärnutzung von Sozial- und Gesundheitsdaten
- Author
-
Dierks, Christian and Roßnagel, Alexander
- Subjects
health care ,data protection ,data science ,thema EDItEUR::M Medicine and Nursing::MB Medicine: general issues::MBN Public health and preventive medicine::MBNS Epidemiology and Medical statistics - Abstract
"Much of the data collected in the statutory health insurance system is of great value for the further development and improvement of health care. Social and health data as personal data are also subject to a tight legal framework in terms of data protection law. Their use in other contexts requires a deep understanding of the regulations at European and national level. This volume provides an overview of the current legal framework and an important orientation for the legally secure use of social and health data. The plant makes it possible to develop solutions and products that improve the quality of care. The first part sets out the social law framework for the use of social data for research. The second part provides an overview of how research data is handled after the application of the GDPR and corresponding national adjustments to the legal framework."
- Published
- 2020
- Full Text
- View/download PDF
39. CHAPTER 5: How Understanding Impacts Ethics and Privacy.
- Author
-
Brueggemann, Tim
- Subjects
PROFESSIONAL ethics ,INFORMATION technology ,DATA protection ,PRIVACY - Abstract
Chapter 5 of the book "The Refractive Thinker: An Anthology of Higher Learning: Ethics, Leadership and Globalization," Volume Four, edited by Cheryl A. Lentz is presented. It highlights the importance of the information technology (IT) professional being knowledgeable about Highly Sensitive Personally Identifiable Information (HSPII) programs. It discusses the study on privacy and the role of employees in the ethical treatment of the data stored on the company's system.
- Published
- 2010
40. Integrating Information Security into Quality Management Systems.
- Author
-
Stoll, Margareth
- Abstract
Due to globalization, stronger competition, increased complexity, information explosion, interconnection and extensive use of technology, information management is a main performance driver and key differentiator for sustainable organization success. Data, information, knowledge and asset are exposed to most different threats. Therefore more than 5800 organizations worldwide are implementing an information security management system in accordance with ISO/IEC 27001. Many organizations of different sizes are implementing also standard based management systems, such as ISO9001 or others. On the basis of several practical applications in most different organizations are described applied methods and experiences by implementing suitably holistic management systems for risk prevention and quality improvement. This promotes effectiveness, efficiency, legal conformity, information security awareness and organization development including improved information security for sustainable organization success. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
41. Security for XML Data Binding.
- Author
-
Gruschka, Nils and Iacono, Luigi Lo
- Abstract
This paper introduces a complementary extension to XML data binding enabling the (selective) protection of structured objects and members. By this contribution, an object can be transformed into a secured object which contains encrypted and/or signed parts according to an assigned security policy. The serialization of secured objects results in XML data which is protected by standard XML security means. Thus, this approach introduces a data-oriented security mechanism which seamlessly integrates into XML data binding and therefore enables cross-platform (de)serialization of secured objects without the need of programming against a specific XML security API. Distinct entities in a distributed processing environment then operate transparently either on plain or secured instances of a class. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
42. Building an Ecosystem for Cyber Security and Data Protection in India.
- Author
-
Godse, Vinayak
- Abstract
Governments across the globe are gearing up through policy enactments and necessary investments to fight the menace of rising cyber crimes. These policies and investments also assure citizens of their privacy rights in the cyber space. India, with its high growth rate, is rapidly integrating itself with Internet Economy, where transactions are predominantly carried out electronically. While Internet offers a new means for expanding economic and business avenues, it offers ease of operations and promises outreach. It is, however, subject to ever increasing dangers of cyber crimes and escalating misuse of personal information being collected by businesses. Individuals need legal protection to protect their personal rights and secure their transaction in cyber space. Institutes, industry and government need assurance that sufficient steps have been taken to secure the flourishing growth of economy. This requires setting up of an ecosystem that is capable of understanding new age complexities and offering swift response mechanism. The ecosystem for cyber security and data protection necessitates a strong legal framework, proactive government initiatives, active involvement of, and contribution by the industry and effective law enforcement mechanism. This paper discusses how India is responding to cyber security and data protection challenges, and how a new ecosystem is underway in recent years. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
43. The Dangers of Electronic Traces: Data Protection Challenges Presented by New Information Communication Technologies.
- Author
-
Musar, Nataša Pirc and Burnik, Jelena
- Abstract
Modern IT technologies are more and more invasive for peoples΄ privacy. E-ticketing involves processing of a significant amount of personal data at the time the cards are issued to users and every time the card is used. Personal data is being processed thanks to the identifiers that are associated with every subscriber and collected by the validation devices to be subsequently stored in the databases of transport companies. Biometric data always refers to an identified or at least identifiable person. And even when stored electronically in a form of a template it is still personal data, as it is not impossible to identify an individual. In terms of data protection rules applicability to online marketing practices a common misconception and the position usually held by the industry is that the processed data is anonymized due to the fact that IP-address is removed and supplemented by a unique identifier to differentiate between different users. Data Protection Authorities in Europe claim that the data collected and processed in the course of behavioural advertising definitely represents personal data as its core purpose is to differentiate between users. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
44. Multilateral Privacy in Clouds: Requirements for Use in Industry.
- Author
-
Schiering, Ina and Hansen, Markus
- Abstract
After the virtualisation of single components of computing systems such as storage, networks or computing devices the next step is the abstraction of the infrastructure as a whole: cloud computing. There are already cloud services on the market, but most of them rely on proprietary technology. Hence standards for cloud computing are needed that realise the requirements we have for present systems. In this context it is important to think of requirements for privacy when personal data are distributed in cloud services and on the other hand on restrictions an owner of computing resources wants to impose. It is important to note that the concepts that enable multilateral privacy are also needed by industry for the flexible realisation of service level agreements and governance to incorporate cloud services in business processes and to be compliant with legal regulations as e.g. SOX, EuroSOX. Therefore the methods that are needed to realise business critical IT services as cloud services are the same as for privacy. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
45. Facebook and Its EU Users – Applicability of the EU Data Protection Law to US Based SNS.
- Author
-
Kuczerawy, Aleksandra
- Abstract
The present paper examines the problem of applicable data protection law in a relationship between EU users and non-EU based Social Networking Site (SNS). The analysis will be conducted on the example of Facebook, which is one of the most popular SNS. The goal of the paper is to examine whether European users of Facebook can rely on their national data protection legislations in case of a privacy infringement by the SNS. The 95/46/EC Directive on Data Protection provides several options to protect EU residents in such relation. The paper will analyze whether Facebook΄s participation in the Safe Harbor Program means that it is a subject to the regulation of the Data Protection Directive. Then, the paper will discuss if data processing activities of Facebook fall under the scope of the Data Protection Directive at all. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
46. chapter 9: Keeping Your New Identity Safe.
- Author
-
Wilkening, David
- Subjects
RIGHT of privacy ,COMPUTER security ,DATA protection ,ONLINE social networks - Abstract
Chapter 9 of the book "How to Hide: A Practical Guide to Vanishing and Taking Your Assets With You" by David Wilkening is presented. It states the things to be considered when planning for disappearance including the need to delete all the online account and remove storage units to keep the disappearance safe. It mentions the tips to protect Internet privacy including reading privacy policies, update the security software and never to use the social networking sites.
- Published
- 2009
47. Limiting Disclosure of Sensitive Attribute Values: An Active Approach.
- Author
-
Junping Sun
- Subjects
ACCESS control ,ELECTRONIC information resources ,DISCLOSURE ,DATA protection ,DATABASE management ,COMPUTER security ,CONFIDENTIAL communication access control - Abstract
As computer and other technologies advance and various data and information are pervasively available, preservation of private information embedded in volume data are facing more and more challenges than ever before. Although there are available mechanisms in database management systems limiting access to some sensitive and private information, some inference techniques might still be able to bypass the access control mechanisms to acquire these unauthorized information inappropriately. This paper will propose an active approach to limiting disclosure of sensitive and private information. [ABSTRACT FROM AUTHOR]
- Published
- 2009
48. Dipper: A Data Integration with Privacy Protection Environment.
- Author
-
Rangsipan Marukatat
- Subjects
DATA protection ,COMPUTER security ,ACCESS control ,ELECTRONIC information resources ,PRIVACY ,GRAPHICAL user interfaces - Abstract
We have developed Dipper, a data integration with privacy protection environment, aiming to tackle the following challenges. Firstly, records can be matched albeit typographical differences between their attribute values. Secondly, they can be matched albeit some attribute values being suppressed to protect the privacy of an individual. Dipper enables data providers to suppress sensitive attributes before exporting their data sets. It then integrates the data sets based on matching rules specified by the users. Its simple graphical user interfaces (GUIs) guide the users through a few easy steps to complete their tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2009
49. History of Privacy.
- Author
-
Holvast, Jan
- Abstract
Discussion on privacy issues is as old as mankind. Starting with the protection of one΄s body and home, it soon evolved in the direction of controlling one΄s personal information. In 1891, the American lawyers Samuel Warren and Louis Brandeis described the right to privacy in a famous article: it is the right to be let alone. In 1967 a new milestone was reached with the publication of Alan Westin΄s Privacy and Freedom when he defined privacy in terms of self determination: privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. History of privacy makes clear that there is a strong relationship between privacy and the development of technology. The modern discussion started with the use of cameras and went on to include the development and use of computers in an information society in which personal data on every individual is collected and stored. Not only is it a great concern that privacy is eroding but also that we are entering a surveillance society. This loss of privacy seems to be even more the case since the protection of privacy is strongly dependant upon the political will to protect it. Since 9/11, however, this political will world-wide is oriented more toward the effective and efficient use of technology in the battle against criminality and terrorism than it is toward protecting privacy. Therefore it is time to re-evaluate the use of technology and the protection of privacy. It is not only privacy that is at stake but above all democracy. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
50. Ethical and Legal Aspects of Biometrics (Convention 108).
- Author
-
Tomova, Sylvia
- Abstract
The application of biometric technology in the domain of identity management raises important ethical and legal questions. Biometrics has therefore been the subject of heated debates, particularly with regard to its relation to the issue of fundamental human rights. While some experts are calling for the introduction of data protection legislations that are specific to biometric technology, others are claiming that biometric data is personal data and, as such, can be covered by existing legislation. This article looks at some of the principles of the Council of Europe's Convention 108 and how they can apply to the collection and processing of biometric data. [ABSTRACT FROM AUTHOR]
- Published
- 2009
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.