
- 作 者:PRIVACY AND DATA PROTECTION:AN ELEMENT OF CHOICE
- 出 版 社:SPRINGER
- 出版年份:2011
- ISBN:
- 标注页数:457 页
- PDF页数:479 页
请阅读订购服务说明与试读!
订购服务说明
1、本站所有的书默认都是PDF格式,该格式图书只能阅读和打印,不能再次编辑。
2、除分上下册或者多册的情况下,一般PDF页数一定要大于标注页数才建议下单购买。【本资源479 ≥457页】
图书下载及付费说明
1、所有的电子图书为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。
2、电子图书在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)
3、所有的电子图书都是原书直接扫描方式制作而成。
Part Ⅰ Building and Rebuilding Legal Concepts for Privacy and Data Protection 3
1 The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?)&Katja de Vries, Rocco Bellanova, Paul De Hert, and Serge Gutwirth 3
2 The Noise in the Archive: Oblivion in the Age of Total Recall&Jean-Francois Blanchette 25
3 Property in Personal Data: Second Life of an Old Idea in the Age of Cloud Computing, Chain Informatisation, and Ambient Intelligence&Nadezhda Purtova 39
4 Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization&Norberto Nuno Gomes de Andrade 65
Part Ⅱ The Dark Side: Suspicions, Distrust and Surveillance 101
5 Frames from the Life and Death of Jean Charles de Menezes&Amos Bianchi and Denis J. Roio 101
6 Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden&Christel Backman 111
7 Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions&Johann Cas 139
8 EU PNR: European Flight Passengers Under General Suspicion - The Envisaged European Model of Analyzing Flight Passenger Data&Franziska Boehm 171
9 Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing"&Arnd Weber and Dirk Weber 201
Part Ⅲ Privacy Practices as Vectors of Reflection 211
10 Keeping Up Appearances: Audience Segregation in Social Network Sites&Bibi van den Berg and Ronald Leenes 211
11 Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second Life&Katja de Vries 233
12 Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking&Fadhila Mazanderani and Ian Brown 251
13 Rise and Phall: Lessons from the Phorm Saga&Paul Bernal 269
14 Disclosing or Protecting? Teenagers' Online Self-Disclosure&Michel Walrave and Wannes Heirman 285
15 Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much Time&John J. Borking 309
Part Ⅳ Privacy and Data Protection in the Cloud 345
16 Can a Cloud Be Really Secure? A Socratic Dialogue&Gurpreet Dhillon and Ella Kolkowska 345
17 Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice&Joep Ruiter and Martijn Warnier 361
18 Data Protection in the Clouds&Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gerard, and Claire Gayrel 377
19 Privacy-Preserving Data Mining from Outsourced Databases&Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang 411
20 Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study&Valentina Casola, Raffaele Lettiero, Massimiliano Rak, and Umberto Villano 427
21 Security and Privacy in the Clouds: A Bird's Eye View&Wolter Pieters 445