Browse Results

Showing 45,051 through 45,075 of 62,991 results

Privacy Online

by Sabine Trepte Leonard Reinecke

Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users' virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users' concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.

Privacy Preservation in Distributed Systems: Algorithms and Applications (Signals and Communication Technology)

by Anqi Zhang Ping Zhao Guanglin Zhang

This book provides a discussion of privacy in the following three parts: Privacy Issues in Data Aggregation; Privacy Issues in Indoor Localization; and Privacy-Preserving Offloading in MEC. In Part 1, the book proposes LocMIA, which shifts from membership inference attacks against aggregated location data to a binary classification problem, synthesizing privacy preserving traces by enhancing the plausibility of synthetic traces with social networks. In Part 2, the book highlights Indoor Localization to propose a lightweight scheme that can protect both location privacy and data privacy of LS. In Part 3, it investigates the tradeoff between computation rate and privacy protection for task offloading a multi-user MEC system, and verifies that the proposed load balancing strategy improves the computing service capability of the MEC system. In summary, all the algorithms discussed in this book are of great significance in demonstrating the importance of privacy.

Privacy Preservation in IoT: A Comprehensive Survey and Use Cases (SpringerBriefs in Computer Science)

by Shui Yu Longxiang Gao Yong Xiang Youyang Qu

This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.

Privacy Preservation of Genomic and Medical Data

by Amit Kumar Tyagi

PRIVACY PRESERVATION of GENOMIC and MEDICAL DATA Discusses topics concerning the privacy preservation of genomic data in the digital era, including data security, data standards, and privacy laws so that researchers in biomedical informatics, computer privacy and ELSI can assess the latest advances in privacy-preserving techniques for the protection of human genomic data. Privacy Preservation of Genomic and Medical Data focuses on genomic data sources, analytical tools, and the importance of privacy preservation. Topics discussed include tensor flow and Bio-Weka, privacy laws, HIPAA, and other emerging technologies like Internet of Things, IoT-based cloud environments, cloud computing, edge computing, and blockchain technology for smart applications. The book starts with an introduction to genomes, genomics, genetics, transcriptomes, proteomes, and other basic concepts of modern molecular biology. DNA sequencing methodology, DNA-binding proteins, and other related terms concerning genomes and genetics, and the privacy issues are discussed in detail. The book also focuses on genomic data sources, analyzing tools, and the importance of privacy preservation. It concludes with future predictions for genomic and genomic privacy, emerging technologies, and applications. Audience Researchers in information technology, data mining, health informatics and health technologies, clinical informatics, bioinformatics, security and privacy in healthcare, as well as health policy developers in public and private health departments and public health.

Privacy Symposium 2022: Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)

by Stefan Schiffner Sebastien Ziegler Adrian Quesada Rodriguez

This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services.Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Privacy Symposium 2023: Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)

by Stefan Schiffner Sébastien Ziegler Meiko Jensen

This book presents the proceedings of the Privacy Symposium 2023. the book features a collection of high-quality research works and professional perspectives on personal data protection and emerging technologies. Gathering legal and technology expertise, it provides cutting-edge perspective on international data protection regulations convergence, as well as data protection compliance of emerging technologies, such as artificial intelligence, e-health, blockchain, edge computing, Internet of Things, V2X and smart grid. Papers encompass various topics, including international law and comparative law in data protection and compliance, cross-border data transfer, emerging technologies and data protection compliance, data protection by design, technology for compliance and data protection, data protection good practices across industries and verticals, cybersecurity and data protection, assessment and certification of data protection compliance, and data subject rights implementation.

Privacy Symposium 2024: Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)

by Stefan Schiffner Jaap-Henk Hoepman Sébastien Ziegler Maria Grazia Porcedda Meiko Jensen

This book presents the proceedings of the Privacy Symposium 2024. The book features a collection of high-quality research works and professional perspectives on personal data protection and emerging technologies. Gathering legal and technology expertise, it provides cutting-edge perspective on international data protection regulations convergence, as well as data protection compliance of emerging technologies, such as artificial intelligence, e-health, blockchain, edge computing, Internet of Things, V2X, and smart grid. Papers encompass various topics, including international law and comparative law in data protection and compliance, cross-border data transfer, emerging technologies and data protection compliance, data protection by design, technology for compliance and data protection, data protection good practices across industries and verticals, cybersecurity and data protection, assessment and certification of data protection compliance, and data subject rights implementation.

Privacy Technologies and Policy: 10th Annual Privacy Forum, APF 2022, Warsaw, Poland, June 23–24, 2022, Proceedings (Lecture Notes in Computer Science #13279)

by Kai Rannenberg Nils Gruschka Agnieszka Gryszczyńska Przemysław Polański Monika Adamczyk

This book constitutes the refereed conference proceedings of the 10th Annual Privacy Forum, APF 2022 in Warsaw, Poland in June 2022. The 8 full papers were carefully reviewed and selected from 38 submissions. The papers are organized in the area of privacy and data protection while focusing on privacy related application areas. A large focus of the 2022 conference was on the General Data Protection Regulation (GDPR).

Privacy Technologies and Policy

by Kai Rannenberg Erich Schweighofer Herbert Leitold Andreas Mitrakas

This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, "Data Protection Regulation", discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, "Neutralisation and Anonymization", discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, "Privacy Policies in Practice", discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.

Privacy Technologies and Policy

by Bettina Berendt Thomas Engel Demosthenes Ikonomou Daniel Le Métayer Stefan Schiffner

This book constitutes the thoroughly refereedpost-conference proceedings of the Third Annual Privacy Forum, APF 2015, heldin Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume werecarefully reviewed and selected from 24 submissions. The topics focus onprivacy by design (PbD), i. e. the attempt to combine technical and organizationalmeasures to ensure the basic rights of the individual. The papers are organizedin three sessions: measuring privacy; rules and principles; legal and economicperspectives on privacy.

Privacy Technologies and Policy

by Demosthenes Ikonomou Stefan Schiffner Jetzabel Serna Kai Rannenberg

This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design", with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.

Privacy Technologies and Policy: 11th Annual Privacy Forum, APF 2023, Lyon, France, June 1–2, 2023, Proceedings (Lecture Notes in Computer Science #13888)

by Kai Rannenberg Prokopios Drogkaris Cédric Lauradoux

This book constitutes the refereed conference proceedings of the 11th Annual Privacy Forum, APF 2023 in Lyon, France in June 2023. The 8 full papers were carefully reviewed and selected from 37 submissions. The papers are organized in the following topical sections: Emerging Technologies and Protection of Personal Data, Data Protection Principles and Data Subject Rights, Modelling Data Protection and Privacy, and Modelling Perceptions of Privacy.

Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024, Karlstad, Sweden, September 4–5, 2024, Proceedings (Lecture Notes in Computer Science #14831)

by Kai Rannenberg Meiko Jensen Cédric Lauradoux

This book constitutes the refereed proceedings of the 12th Annual Privacy Forum on Privacy Technologies and Policy, APF 2024, held in Karlstad, Sweden, during September 4–5, 2024. The 12 full papers were carefully reviewed and selected from 60 submissions. This conference was established as an opportunity to bring together key communities, namely policy, academia, and industry, in the broader area of privacy and data protection while focusing on privacy-related application areas. Like in the previous edition, a large focus of the 2024 conference was on the General Data Protection Regulation (GDPR) and the emerging legislation around the European Data Spaces and Arti cial Intelligence. Chapter 3, 9, 12 are licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/). For further details see license information in the chapter.

Privacy Technologies and Policy: 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017. Revised Selected Papers (Lecture Notes in Computer Science #10518)

by Kai Rannenberg Erich Schweighofer Andreas Mitrakas Manel Medina Nikolaos Tsouroulas

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. <P><P>The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.

Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings (Lecture Notes in Computer Science #11498)

by Kai Rannenberg Manel Medina Maurizio Naldi Giuseppe F. Italiano Athena Bourka

This book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome,Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications.

Privacy Technologies and Policy: 8th Annual Privacy Forum, APF 2020, Lisbon, Portugal, October 22–23, 2020, Proceedings (Lecture Notes in Computer Science #12121)

by Kai Rannenberg Maurizio Naldi Giuseppe F. Italiano Luís Antunes Prokopios Drogkaris

This book constitutes the refereed conference proceedings of the 8th Annual Privacy Forum, APF 2020, held in Lisbon, Portugal, in October 2020.The 12 revised full papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on impact assessment; privacy by design; data protection and security; and transparency.

Privacy Technologies and Policy: 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17–18, 2021, Proceedings (Lecture Notes in Computer Science #12703)

by Kai Rannenberg Nils Gruschka Prokopios Drogkaris Luís Filipe Coelho Antunes

This book constitutes the refereed conference proceedings of the 9th Annual Privacy Forum, APF 2021. Due to COVID-19 pandemic the conference was held virtually. The 9 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on Implementing Personal Data Processing Principles; Privacy Enhancing Technologies; Promoting Compliance with the GDPR.

Privacy Vulnerabilities and Data Security Challenges in the IoT (Internet of Everything (IoE))

by Shivani Agarwal, Sandhya Makkar, and Duc-Tan Tran

This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT security and privacy issues. This edited book discusses the use of security engineering and privacy-by-design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding security issues in IoT-enabled technologies and how these can be applied in various sectors. It walks readers through engaging with security challenges and building a safe infrastructure for IoT devices. The book helps researchers and practitioners understand the security architecture of IoT and the state-of-the-art in IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID and WSNs in IoT. This book aims to highlight the concepts of related technologies and novel findings by researchers through its chapter organization. The primary audience comprises specialists, researchers, graduate students, designers, experts, and engineers undertaking research on security-related issues.

Privacy and Anonymity in Information Management Systems

by Jordi Nin Javier Herranz

The development of information technologies in the last few years has been remarkable. Large amounts of data are collected and stored by both public institutions and private companies every day. There are clear threats to the privacy of citizens if no care is taken when collecting, storing and disseminating data. Ensuring privacy for individuals in a society when dealing with digital information, is a task which involves many agents, including politicians, legal authorities, managers, developers, and system administrators. Privacy and Anonymity in Information Management Systems deals with the more technical parts of this `privacy cycle', those issues that are mostly related to computer science, and discusses the process by which different privacy mechanisms are motivated, designed, analyzed, tested and finally implemented in companies or institutions. The book is written in such a way that several of the chapters are self-contained and accessible to students, covering topics such as the problem of Statistical Disclosure Control (SDC), i.e. how to modify datasets that contain statistical information before publicly releasing them, and doing so in such a way that the privacy of the confidential original information is preserved; and specific distributed applications involving privacy - how different agents have private inputs but want to cooperate to run some protocol in their own interest, without revealing unnecessary parts of their private inputs. Graduate students and researchers will find this book an excellent resource.

Privacy and Big Data: The Players, Regulators, and Stakeholders

by Mary E. Ludloff Terence Craig

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.Personal data is the hottest commodity on the market today—truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Privacy and Big Data introduces you to the players in the personal data game, and explains the stark differences in how the U.S., Europe, and the rest of the world approach the privacy issue.You'll learn about:Collectors: social networking titans that collect, share, and sell user dataUsers: marketing organizations, government agencies, and many othersData markets: companies that aggregate and sell datasets to anyoneRegulators: governments with one policy for commercial data use, and another for providing security

Privacy and Capitalism in the Age of Social Media (Routledge Research in Information Technology and Society #18)

by Sebastian Sevignani

This book explores commodification processes of personal data and provides a critical framing of the ongoing debate of privacy in the Internet age, using the example of social media and referring to interviews with users. It advocates and expands upon two main theses: First, people’s privacy is structurally invaded in contemporary informational capitalism. Second, the best response to this problem is not accomplished by invoking the privacy framework as it stands, because it is itself part of the problematic nexus that it struggles against. Informational capitalism poses weighty problems for making the Internet a truly social medium, and aspiring to sustainable privacy simultaneously means to struggle against alienation and exploitation. In the last instance, this means opposing the capitalist form of association – online and offline.

Privacy and Data Protection Challenges in the Distributed Era (Learning and Analytics in Intelligent Systems #26)

by Maria Virvou Efthimios Alepis Eugenia Politou Constantinos Patsakis

This book examines the conflicts arising from the implementation of privacy principles enshrined in the GDPR, and most particularly of the ``Right to be Forgotten'', on a wide range of contemporary organizational processes, business practices, and emerging computing platforms and decentralized technologies. Among others, we study two ground-breaking innovations of our distributed era: the ubiquitous mobile computing and the decentralized p2p networks such as the blockchain and the IPFS, and we explore their risks to privacy in relation to the principles stipulated by the GDPR. In that context, we identify major inconsistencies between these state-of-the-art technologies with the GDPR and we propose efficient solutions to mitigate their conflicts while safeguarding the privacy and data protection rights. Last but not least, we analyse the security and privacy challenges arising from the COVID-19 pandemic during which digital technologies are extensively utilized to surveil people’s lives.

Privacy and Data Protection Issues of Biometric Applications

by Els J. Kindt

This book discusses all critical privacy and data protection aspects of biometric systems from a legal perspective. It contains a systematic and complete analysis of the many issues raised by these systems based on examples worldwide and provides several recommendations for a transnational regulatory framework. An appropriate legal framework is in most countries not yet in place. Biometric systems use facial images, fingerprints, iris and/or voice in an automated way to identify or to verify (identity) claims of persons. The treatise which has an interdisciplinary approach starts with explaining the functioning of biometric systems in general terms for non-specialists. It continues with a description of the legal nature of biometric data and makes a comparison with DNA and biological material and the regulation thereof. After describing the risks, the work further reviews the opinions of data protection authorities in relation to biometric systems and current and future (EU) law. A detailed legal comparative analysis is made of the situation in Belgium, France and the Netherlands. The author concludes with an evaluation of the proportionality principle and the application of data protection law to biometric data processing operations, mainly in the private sector. Pleading for more safeguards in legislation, the author makes several suggestions for a regulatory framework aiming at reducing the risks of biometric systems. They include limitations to the collection and storage of biometric data as well as technical measures, which could influence the proportionality of the processing. The text is supported by several figures and tables providing a summary of particular points of the discussion. The book also uses the 2012 biometric vocabulary adopted by ISO and contains an extensive bibliography and literature sources.

Privacy and Data Protection Seals (Information Technology and Law Series #28)

by Vagelis Papakonstantinou Rowena Rodrigues

The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives. It covers data protection certification in the EU (i.e., the possibilities, actors and building blocks); the Schleswig-Holstein Data Protection Seal; the French Privacy Seal Scheme; privacy seals in the USA, Europe, Japan, Canada, India and Australia; controversies, challenges and lessons for privacy seals; the potential for privacy seals in emerging technologies; and an economic analysis. This book is particularly relevant in the EU context, given the General Data Protection Regulation (GDPR) impetus to data protection certification mechanisms and the dedication of specific provisions to certification. Its coverage of practices in jurisdictions outside the EU also makes it relevant globally. This book will appeal to European legislators and policy-makers, privacy and data protection practitioners, certification bodies, international organisations, and academics.Rowena Rodrigues is a Senior Research Analyst with Trilateral Research Ltd. in London and Vagelis Papakonstantinou is a Senior Researcher at the Vrije Universiteit Brussel in Brussels.

Privacy and Data Protection in Software Services (Services and Business Process Reengineering)

by Roberto Senigaglia Claudia Irti Alessandro Bernes

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal rules should be bound together for moulding a special ‘toolbox’ to solve present and future issues. The volume is intended to contribute to this ‘toolbox’ in the area of software services, while addressing how to make legal studies work closely with engineers’ and computer scientists’ fields of expertise, who are increasingly involved in tangled choices on daily programming and software development. In this respect, law has not lost its importance and its own categories in the digital world, but as well as any social science needs to experience a new realistic approach amid technological development and individuals’ fundamental rights and freedoms.

Refine Search

Showing 45,051 through 45,075 of 62,991 results