Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 19 of 19 matches in All Departments
This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.
Copy the following link for free access to the first chapter of this title: http://www.springerlink.com/content/j23468h304310755/fulltext.pdf This book is a warning. It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI). In the near future, every manufactured product - our clothes, money, appliances, the paint on our walls, the carpets on our floors, our cars, everything - will be embedded with intelligence, networks of tiny sensors and actuators, which some have termed "smart dust". The AmI world is not far off. We already have surveillance systems, biometrics, personal communicators, machine learning and more. AmI will provide personalised services - and know more about us - on a scale dwarfing anything hitherto available. In the AmI vision, ubiquitous computing, communications and interfaces converge and adapt to the user. AmI promises greater user-friendliness in an environment capable of recognising and responding to the presence of different individuals in a seamless, unobtrusive and often invisible way. While most stakeholders paint the promise of AmI in sunny colours, there is a dark side to AmI. This book aims to illustrate the threats and vulnerabilities by means of four "dark scenarios". The authors set out a structured methodology for analysing the four scenarios, and then identify safeguards to counter the foreseen threats and vulnerabilities. They make recommendations to policy-makers and other stakeholders about what they can do to maximise the benefits from ambient intelligence and minimise the negative consequences.
This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.
This volume examines the relationship between privacy, surveillance and security, and the alleged privacy-security trade-off, focusing on the citizen's perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen's perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies, critical security studies, intelligence studies, EU politics and IR in general. A PDF version of this book is available for free in open access via www.tandfebooks.com. It has been made available under a Creative Commons Attribution-Non Commercial 3.0 license.
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.
Privacy and data protection are recognized as fundamental human rights. Recent developments, however, indicate that security issues are used to undermine these fundamental rights. As new technologies effectively facilitate collection, storage, processing and combination of personal data government agencies take advantage for their own purposes. Increasingly, and for other reasons, the business sector threatens the privacy of citizens as well. The contributions to this book explore the different aspects of the relationship between technology and privacy. The emergence of new technologies threaten increasingly privacy and/or data protection; however, little is known about the potential of these technologies that call for innovative and prospective analysis, or even new conceptual frameworks. Technology and privacy are two intertwined notions that must be jointly analyzed and faced. Technology is a social practice that embodies the capacity of societies to transform themselves by creating the possibility to generate and manipulate not only physical objects, but also symbols, cultural forms and social relations. In turn, privacy describes a vital and complex aspect of these social relations. Thus technology influences people's understanding of privacy, and people's understanding of privacy is a key factor in defining the direction of technological development. This book was originally published as a special issue of Innovation: The European Journal of Social Science Research.
This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.
This volume examines the relationship between privacy, surveillance and security, and the alleged privacy-security trade-off, focusing on the citizen's perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen's perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies, critical security studies, intelligence studies, EU politics and IR in general. A PDF version of this book is available for free in open access via www.tandfebooks.com. It has been made available under a Creative Commons Attribution-Non Commercial 3.0 license.
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h304310755/fulltext.pdf This book is a warning. It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI). In the near future, every manufactured product - our clothes, money, appliances, the paint on our walls, the carpets on our floors, our cars, everything - will be embedded with intelligence, networks of tiny sensors and actuators, which some have termed "smart dust." The AmI world is not far off. We already have surveillance systems, biometrics, personal communicators, machine learning and more. AmI will provide personalised services - and know more about us - on a scale dwarfing anything hitherto available. In the AmI vision, ubiquitous computing, communications and interfaces converge and adapt to the user. AmI promises greater user-friendliness in an environment capable of recognising and responding to the presence of different individuals in a seamless, unobtrusive and often invisible way. While most stakeholders paint the promise of AmI in sunny colours, there is a dark side to AmI. This book aims to illustrate the threats and vulnerabilities by means of four "dark scenarios." The authors set out a structured methodology for analysing the four scenarios, and then identify safeguards to counter the foreseen threats and vulnerabilities. They make recommendations to policy-makers and other stakeholders about what they can do to maximise the benefits from ambient intelligence and minimise the negative consequences.
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h304310755/fulltext.pdf This book is a warning. It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI). In the near future, every manufactured product our clothes, money, appliances, the paint on our walls, the carpets on our floors, our cars, everything will be embedded with intelligence, networks of tiny sensors and actuators, which some have termed smart dust . The AmI world is not far off. We already have surveillance systems, biometrics, personal communicators, machine learning and more. AmI will provide personalised services and know more about us on a scale dwarfing anything hitherto available. In the AmI vision, ubiquitous computing, communications and interfaces converge and adapt to the user. AmI promises greater user-friendliness in an environment capable of recognising and responding to the presence of different individuals in a seamless, unobtrusive and often invisible way. While most stakeholders paint the promise of AmI in sunny colours, there is a dark side to AmI. This book aims to illustrate the threats and vulnerabilities by means of four dark scenarios . The authors set out a structured methodology for analysing the four scenarios, and then identify safeguards to counter the foreseen threats and vulnerabilities. They make recommendations to policy-makers and other stakeholders about what they can do to maximise the benefits from ambient intelligence and minimise the negative consequences."
There has been a continued debate in Europe over whether to change the patentability of software - or so-called computer-implemented inventions - and to follow the US model of allowing software patents. Albeit as European regulation has been stopped in July 2005, this heated debate stays with us for the time being. The European debate has shown a severe lack of empirical analysis on the possible impact of software patenting that goes beyond interest-driven rhetoric. This book seeks to address this shortcoming by taking a two-fold approach. Firstly, a survey of German software companies provides a representative overview of both general strategies to protect inventions and opinions regarding the future IPR regime in the context of innovation strategies - including the importance and use of Open Source software. Secondly, a series of case studies illustrate the varying impacts that patents and other protection strategies can have in specific contexts. foundation as for the economic impacts and policy implications of software patents upon which to base a discussion on how to shape the intellectual property regime for software. Thus, this volume will be of interest to industrial economists and students, as well as legal scientists and analysts and students of governance in innovation systems. It will also appeal to all policy stakeholders dealing with IPR issues and/or software developing industries.
This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.
Die in diesem Open-Access-Buch zusammengefuhrten interdisziplinaren Untersuchungen des "Forums Privatheit" gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal andern. Nahezu jede Lebensregung hinterlasst Datenspuren, ermoeglicht vielfaltige und intensive Datensammlungen uber Menschen, unterstutzt Verhaltensbeeinflussungen und verstarkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die oekonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, oekonomisch und rechtlich gestaltet werden koennen, um Privatheit und Selbstbestimmung zu schutzen.
Digitale Daten gelten sowohl als Quelle fur Wirtschaftswachstum, Innovation und Arbeitsplatze wie auch als Treiber der datenbasierten Reorganisation praktisch aller gesellschaftlichen Bereiche ("Datafizierung"). Die datenoekonomisch befeuerten Transformationsprozesse des Sozialen werfen dementsprechend vielfaltige Fragen auf: Welche Daten sollen von wem wie verwertbar sein? Wie lasst sich legitime Verfugungsmacht gestalten? Usw. Der Band behandelt diese Fragen aus interdisziplinarer Perspektive.
Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, kunstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch fur die Datenschutz-Grundverordnung. Die Beitrage des Sammelbandes untersuchen die Anforderungen des digitalen Wandels an Konzepte, Instrumente und Institutionen des Datenschutzes; sie eroertern Loesungen fur bisher ungeregelte Datenschutzprobleme, entwerfen Konzepte fur einen modernen Grundrechts- und Datenschutz und entwickeln Modelle fur eine Evolution des Datenschutzes in der kunftigen digitalen Welt.
|
You may like...
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, …
Blu-ray disc
(1)
|