点此搜书

当前位置:COMPUTERSpdf电子书下载 > 其他书籍
COMPUTERS
  • 作 者:PRIVACY AND DATA PROTECTION:AN ELEMENT OF CHOICE
  • 出 版 社:SPRINGER
  • 出版年份:2011
  • ISBN:
  • 标注页数:457 页
  • PDF页数:479 页
  • 请阅读订购服务说明与试读!

文档类型

价格(积分)

购买连接

试读

PDF格式

14

立即购买

点击试读

订购服务说明

1、本站所有的书默认都是PDF格式,该格式图书只能阅读和打印,不能再次编辑。

2、除分上下册或者多册的情况下,一般PDF页数一定要大于标注页数才建议下单购买。【本资源479 ≥457页】

图书下载及付费说明

1、所有的电子图书为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。

2、电子图书在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)

3、所有的电子图书都是原书直接扫描方式制作而成。

Part Ⅰ Building and Rebuilding Legal Concepts for Privacy and Data Protection 3

1 The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?)&Katja de Vries, Rocco Bellanova, Paul De Hert, and Serge Gutwirth 3

2 The Noise in the Archive: Oblivion in the Age of Total Recall&Jean-Francois Blanchette 25

3 Property in Personal Data: Second Life of an Old Idea in the Age of Cloud Computing, Chain Informatisation, and Ambient Intelligence&Nadezhda Purtova 39

4 Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization&Norberto Nuno Gomes de Andrade 65

Part Ⅱ The Dark Side: Suspicions, Distrust and Surveillance 101

5 Frames from the Life and Death of Jean Charles de Menezes&Amos Bianchi and Denis J. Roio 101

6 Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden&Christel Backman 111

7 Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions&Johann Cas 139

8 EU PNR: European Flight Passengers Under General Suspicion - The Envisaged European Model of Analyzing Flight Passenger Data&Franziska Boehm 171

9 Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing"&Arnd Weber and Dirk Weber 201

Part Ⅲ Privacy Practices as Vectors of Reflection 211

10 Keeping Up Appearances: Audience Segregation in Social Network Sites&Bibi van den Berg and Ronald Leenes 211

11 Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second Life&Katja de Vries 233

12 Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking&Fadhila Mazanderani and Ian Brown 251

13 Rise and Phall: Lessons from the Phorm Saga&Paul Bernal 269

14 Disclosing or Protecting? Teenagers' Online Self-Disclosure&Michel Walrave and Wannes Heirman 285

15 Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much Time&John J. Borking 309

Part Ⅳ Privacy and Data Protection in the Cloud 345

16 Can a Cloud Be Really Secure? A Socratic Dialogue&Gurpreet Dhillon and Ella Kolkowska 345

17 Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice&Joep Ruiter and Martijn Warnier 361

18 Data Protection in the Clouds&Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gerard, and Claire Gayrel 377

19 Privacy-Preserving Data Mining from Outsourced Databases&Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang 411

20 Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study&Valentina Casola, Raffaele Lettiero, Massimiliano Rak, and Umberto Villano 427

21 Security and Privacy in the Clouds: A Bird's Eye View&Wolter Pieters 445

购买PDF格式(14分)
返回顶部