Data Protection and Privacy: (In)visibilities and Infrastructures (eBook)

eBook Download: PDF
2017 | 1st ed. 2017
XXIV, 295 Seiten
Springer International Publishing (Verlag)
978-3-319-50796-5 (ISBN)

Lese- und Medienproben

Data Protection and Privacy: (In)visibilities and Infrastructures -
Systemvoraussetzungen
171,19 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical.   

Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders.  

Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.  

 

Part 1: Fundamental and legal questions1. Legal fundamentalism: is data protection really a fundamental right?Bart Van der Sloot2. Is there a Right to Offline Alternatives in a Digital World?Murat Karaboga, Tobias Matzner, Hannah Obersteller and Carsten Ochs3. What is New with the Internet of Things in Privacy and Data Protection? Four Legal ChallengesUgo Pagallo, Massimo Durante and Shara MonteleonePart 2: Concepts and tools4. Towards a code of Conduct on privacy for mHealth to foster trust among users of mobile health applicationsEugenio Mantovani, Joan Antokol, Sjaak Nouwt, Marian Hoekstra, Nico Schutte, Pēteris Zilgalvis, Juan-Pedro Castro and Claudia Prettner5. Minimum Harm by Design. Reworking Privacy by Design to mitigate the risks of surveillanceElisa Orru6. A purpose-based taxonomy for better governance of personal data in the Internet of Things era: the example of wellness dataClaire Levallois-Barth and Hugo Zylberberg7. A Privacy Engineering Framework for the Internet of ThingsAntonio Kung, Frank Kargl, Santiago Suppan, Jorge Cuellar, Henrich C. Pöhls, Adam Kapovits, Nicolas Notario and Yod Samuel Martin Part 3: Case studies8. Dangers from Within? Looking Inwards at the Role of Maladministration as the Leading Cause of Health Data Breaches in the UKLeslie Stevens, Christine Dobbs, Kerina Jones and Graeme Laurie9. On the road to privacy- and data protection-friendly security technologies in the workplace - A case-study of the MUSES Risk and Trust Analysis EngineYung Shin Van Der Sype, Jonathan Guislain, Seigneur Jean-Marc and Xavier Titi10. A Study on Corporate Compliance with Transparency Requirements of Data Protection LawChristoph Bier, Simon Kömpf and Jürgen Beyerer Part 4: closing11.Closing remarks: 9th International Computers, Privacy and Data Protection Conference

Erscheint lt. Verlag 7.2.2017
Reihe/Serie Issues in Privacy and Data Protection
Issues in Privacy and Data Protection
Law, Governance and Technology Series
Law, Governance and Technology Series
Zusatzinfo XXIV, 295 p. 14 illus.
Verlagsort Cham
Sprache englisch
Themenwelt Geisteswissenschaften
Informatik Netzwerke Sicherheit / Firewall
Recht / Steuern EU / Internationales Recht
Recht / Steuern Öffentliches Recht
Schlagworte Cloud Computing • Current Legal Evolution • Current Technological/ICT Evolution • data protection • Data Protection Law • Health Data Breaches • mobile health applications • Privacy and Data Protection • Privacy Protection • risks of surveillance
ISBN-10 3-319-50796-6 / 3319507966
ISBN-13 978-3-319-50796-5 / 9783319507965
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 5,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99