Search results:
Found 39
Listing 1 - 10 of 39 | << page >> |
Sort by
|
Choose an application
A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world.Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population.In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original—and prescient—discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.
Choose an application
Service-oriented architectures (SOA) with the interoperable software components Web Services employs a loose coupling between the participants. This provides economic and greater flexibility for companies. The young technology becomes more and more important, e.g. for companies organization and E-Commerce. Judith Nink writes about the legal requirements for SOAs used with Web Services. The dissertation is organized in three complexes, engaged with contracting questions, non-contracting liability and requirements for data protection in the scope of SOAs with Web Services.
Choose an application
Digital communications technology has immeasurably enhanced our capacity to store, retrieve, and exchange information. But who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy. Aiming to clarify rather than mystify, Stefanick outlines the history and application of FOIP legislation, with special focus on how these laws affect the individual. To illustrate the impact of FOIP, she examines the notion of informed consent, looks at concerns about surveillance in the digital age, and explores the sometimes insidious influence of Facebook. Specialists in public policy and public administration, information technology, communications, law, criminal justice, sociology, and health care will find much here that bears directly on their work, while students and general readers will welcome the book's down-to-earth language and accessible style. Intended to serve as a "citizen's guide," Controlling Knowledge is a vital resource for anyone seeking to understand how freedom of information and privacy protection are legally defined and how this legislation is shaping our individual rights as citizens of the information age.
Choose an application
Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies. It addresses privacy in electric, natural gas, and water grids and supplies two different perspectives of the topic—one from a Smart Grid expert and another from a privacy and information security expert. The authors have extensive experience with utilities and leading the U.S. government’s National Institute of Standards and Technologies (NIST) Cyber Security Working Group (CSWG)/Smart Grid Interoperability Group (SGIP) Privacy Subgroup. This comprehensive book is understandable for all those involved in the Smart Grid. The authors detail the facts about Smart Grid privacy so readers can separate truth from myth about Smart Grid privacy. While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine (M2M) applications and associated legal issues. The text details guidelines based on the Organization for Economic Cooperation and Development Privacy Guidelines and the U.S. Federal Trade Commission Fair Information Practices. It includes privacy training recommendations and references to additional Smart Grid privacy resources. After reading the book, readers will be prepared to develop informed opinions, establish fact-based decisions, make meaningful contributions to Smart Grid legislation and policies, and to build technologies to preserve and protect privacy.
Choose an application
Das Zeitalter der immer weiter fortschreitenden Digitalisierung und die stetige Verbesserung der technischen Rahmenbedingungen bieten Forschungseinrichtung neue Mittel und Wege, ihre gewonnenen Daten zu archivieren und öffentlich zugänglich zu machen. Nicht selten gehen damit rechtliche Problematiken einher. Angefangen bei der Frage, wem denn diese Daten „gehören“ bis hin zu der Problematik, ob bestimmte Daten überhaupt archiviert werden dürfen und wer für einen eventuellen Datenverlust haften muss. Das vorliegende Werk legt dabei besonderes Augenmerk auf die urheberrechtlichen, datenschutzrechtlichen sowie haftungsrechtlichen Problematiken, welche eine digitale Archivierung mit sich bringen kann. Des Weiteren wird beleuchtet, welche Überlegungen im Vorfeld einer Archivierung angestellt werden müssen und welche Maßnahmen getroffen werden sollten, um rechtlichen Schwierigkeiten vorzubeugen. Die Arbeit soll daher auch als rechtlicher Leitfaden für Archivierungsprojekte dienen, weshalb unter anderem auch Vorschläge für die Formulierung entsprechender Vertragsklauseln enthalten sind. Aus diesem Grund wird außerdem ausführlich auf die rechtlichen Konsequenzen von Verstößen gegen urheber- und datenschutzrechtliche Vorschriften eingegangen.
Digitization --- Long-Term Archiving --- Copyright --- Privacy Policy --- Privacy Law
Choose an application
The technical design of security systems has a high impact on its acceptance. To understand the influencing factors, an acceptance model for smart video surveillance is developed. To improve acceptance different technical components are designed and implemented. Lastly they are integrated into a prototype for fall detection in hospital environments and evaluated for the acceptance. The book combined theoretical work on understanding acceptance with practical work into developing new systems.
Choose an application
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ’s Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking on the other. Addressing the interests of researchers and practitioners alike, it provides a comprehensive overview of and introduction to the emerging challenges regarding big data.All contributions are based on papers submitted in connection with ABIDA (Assessing Big Data), an interdisciplinary research project exploring the societal aspects of big data and funded by the German Federal Ministry of Education and Research.This volume was produced as a part of the ABIDA project (Assessing Big Data, 01IS15016A-F). ABIDA is a four-year collaborative project funded by the Federal Ministry of Education and Research. However the views and opinions expressed in this book reflect only the authors’ point of view and not necessarily those of all members of the ABIDA project or the Federal Ministry of Education and Research.
privacy --- data protection --- data mining --- predictive analytics
Choose an application
Überwachungssysteme haben sich in den letzten Jahren zu intelligenten Anlagen entwickelt. Sie erzeugen eine große Menge von sensiblen Informationen. Die rechtlichen Datenschutzgrundlagen für diese Systeme werden in dieser Arbeit herausgearbeitet. Es wird der technische Aufbau eines Überwachungssystems nach Privacy by Design aufgezeigt, das geringer in die in Privatsphäre der Betroffenen eingreift als konventionelle Systeme und dabei die technischen Vorteile intelligenter Verarbeitung bietet.
Choose an application
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.
Choose an application
This research introduces a conceptual framework for enforcing privacy-related restrictions in smart video surveillance systems based on danger levels and incident types to be handled. It increases the selectivity of surveillance by restricting data processing to individuals associated to incidents under investigation. Constraints are enforced by usage control, which is instantiated for video surveillance for the first time and enables tailoring such systems to comply with data protection law.
Listing 1 - 10 of 39 | << page >> |
Sort by
|