Inhaltsverzeichnis
Introduction. - Part 1 Building and Rebuilding Legal Concepts for Privacy and Data Protection. - Chapter 1 The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn t It?); Katja de Vries, Rocco Bellanova, Paul De Hert and Serge Gutwirth. - Chapter 2 The Noise in the Archive: Oblivion in the Age of Total Recall; Jean-François Blanchette. - Chapter 3 Property in personal data. Second life of an old idea in the age of cloud computing, chain informatisation, and ambient intelligence; Nadezhda Purtova. - Chapter 4, Right to Personal Identity. The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization ; Norberto Nuno Gomes de Andrade. - Part 2 The Dark Side: Suspicions, Distrust and Surveillance. - Chapter 5 Frames from the life and death of Jean Charles de Menezes; Amos Bianchi & Denis J. Roio (a. k. a. Jaromil). - Chapter 6 Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden; Christel Backman. - Chapter 7 Ubiquitous computing, privacy and data protection: options and limitations to reconcile the unprecedented contradictions; Johann as. - Chapter 8 Franziska Boehm, EU PNR: European Flight passengers under general suspicion. The envisaged European model of analyzing flight passenger data. - Chapter 9 Options for securing PCs against phishing and espionage. A report from the EU-project " Open Trusted Computing" ; Arnd Weber and Dirk Weber. - Part 3 Privacy Practices as Vectors of Reflection. - Chapter 10 Keeping up appearances: Audience segregation in social network sites; Bibi Van den Berg and Ronald Leenes. - Chapter 11 Avatars out of Control. Gazira Babeli, Pose Balls and `Rape in Second Life; Katja De Vries. - Chapter 12 Privacy as a practice: exploring the relational and spatial dynamics of HIV-related information seeking; Fadhila Mazanderani and Ian Brown. - Chapter 13 Rise and Phall:Lessons from the Phorm Saga; Paul Bernal. - Chapter 14 Disclosing or protecting? Teenagers online self-disclosure; Michel Walrave and Wannes Heirman. - Chapter 15 Why Adopting Privacy Enhancing Technologies (PETs) Takes So Much Time; John J. Borking. - Part 4 Privacy and Data Protection in the Cloud. - Chapter 16 Can a Cloud be Really Secure? A Socratic Dialogue; Gurpreet Dhillon and Ella Kolkowska. - Chapter 17 Privacy Regulations for Cloud Computing. Compliance and Implementation in Theory and Practice; Joep Ruiter and Martijn Warnier. - Chapter 18 Data Protection in the Clouds ; Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gérard and Claire Gayrel. - Chapter 19 Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases; Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi and Hui (Wendy) Wang. - Chapter 20 Access Control in Cloud-on-GRID Systems: the PerfCloud Case Study; Valentina Casola, Raffaele Lettiero, Massimiliano Rak and Umberto Villano. - Chapter 21 Security and privacy in the clouds: a bird s eye view; Wolter Pieters.
Es wurden noch keine Bewertungen abgegeben. Schreiben Sie die erste Bewertung zu "Computers, Privacy and Data Protection: an Element of Choice" und helfen Sie damit anderen bei der Kaufentscheidung.