0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (6)
  • R5,000 - R10,000 (3)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

European Data Protection: Coming of Age (Hardcover, 2013 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet European Data Protection: Coming of Age (Hardcover, 2013 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet
R4,093 Discovery Miles 40 930 Ships in 18 - 22 working days

On 25 January 2012, the European Commission presented its long awaited new Data protection package . With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory network was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed.

This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.

This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media."

Data Protection in a Profiled World (Hardcover, 2010 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert Data Protection in a Profiled World (Hardcover, 2010 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert
R2,842 Discovery Miles 28 420 Ships in 18 - 22 working days

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.

Computers, Privacy and Data Protection: an Element of Choice (Hardcover, Edition.): Serge Gutwirth, Yves Poullet, Paul De Hert,... Computers, Privacy and Data Protection: an Element of Choice (Hardcover, Edition.)
Serge Gutwirth, Yves Poullet, Paul De Hert, Ronald Leenes
R5,238 Discovery Miles 52 380 Ships in 18 - 22 working days

This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.

European Data Protection: In Good Health? (Hardcover, 2012 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet European Data Protection: In Good Health? (Hardcover, 2012 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet
R4,063 Discovery Miles 40 630 Ships in 18 - 22 working days

Although Europe has a significant legal data protection framework, built up around EU Directive 95/46/EC and the Charter of Fundamental Rights, the question of whether data protection and its legal framework are 'in good health' is increasingly being posed. Advanced technologies raise fundamental issues regarding key concepts of data protection. Falling storage prices, increasing chips performance, the fact that technology is becoming increasingly embedded and ubiquitous, the convergence of technologies and other technological developments are broadening the scope and possibilities of applications rapidly. Society however, is also changing, affecting the privacy and data protection landscape. The 'demand' for free services, security, convenience, governance, etc, changes the mindsets of all the stakeholders involved. Privacy is being proclaimed dead or at least worthy of dying by the captains of industry; governments and policy makers are having to manoeuvre between competing and incompatible aims; and citizens and customers are considered to be indifferent. In the year in which the plans for the revision of the Data Protection Directive will be revealed, the current volume brings together a number of chapters highlighting issues, describing and discussing practices, and offering conceptual analysis of core concepts within the domain of privacy and data protection. The book's first part focuses on surveillance, profiling and prediction; the second on regulation, enforcement, and security; and the third on some of the fundamental concepts in the area of privacy and data protection. Reading the various chapters it appears that the 'patient' needs to be cured of quite some weak spots, illnesses and malformations. European data protection is at a turning point and the new challenges are not only accentuating the existing flaws and the anticipated difficulties, but also, more positively, the merits and the need for strong and accurate data protection practices and rules in Europe, and elsewhere.

Reinventing Data Protection? (Hardcover, 2009 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert, Cecile de Terwangne, Sjaak Nouwt Reinventing Data Protection? (Hardcover, 2009 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert, Cecile de Terwangne, Sjaak Nouwt
R5,342 Discovery Miles 53 420 Ships in 18 - 22 working days

data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen - utilizing the full potential of what ICT-technology has to offer - seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one's own identity. Transactiondata-bothtraf?candlocationdata-deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person's contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.

European Data Protection: Coming of Age (Paperback, 2013 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet European Data Protection: Coming of Age (Paperback, 2013 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet
R5,159 Discovery Miles 51 590 Ships in 18 - 22 working days

On 25 January 2012, the European Commission presented its long awaited new "Data protection package". With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory network was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.

Data Protection in a Profiled World (Paperback, 2010 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert Data Protection in a Profiled World (Paperback, 2010 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert
R2,670 Discovery Miles 26 700 Ships in 18 - 22 working days

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.

Computers, Privacy and Data Protection: an Element of Choice (Paperback, 2011 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert,... Computers, Privacy and Data Protection: an Element of Choice (Paperback, 2011 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert, Ronald Leenes
R5,194 Discovery Miles 51 940 Ships in 18 - 22 working days

This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.

Reinventing Data Protection? (Paperback, Softcover reprint of hardcover 1st ed. 2009): Serge Gutwirth, Yves Poullet, Paul De... Reinventing Data Protection? (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Serge Gutwirth, Yves Poullet, Paul De Hert, Cecile de Terwangne, Sjaak Nouwt
R5,171 Discovery Miles 51 710 Ships in 18 - 22 working days

data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen - utilizing the full potential of what ICT-technology has to offer - seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one's own identity. Transactiondata-bothtraf?candlocationdata-deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person's contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Black Tax - Burden Or Ubuntu?
Niq Mhlongo Paperback  (2)
R340 R304 Discovery Miles 3 040
Dala Leather Paint - Ash #3 (25ml)
R46 R39 Discovery Miles 390
Journey of Faith Teens Enlightenment
Redemptorist Pastoral Publication Loose-leaf R130 R119 Discovery Miles 1 190
Dala Tempera Paint Block - Pearl Orange…
R26 Discovery Miles 260
The Rollo Philosophy ... - Air
Jacob Abbott Paperback R459 Discovery Miles 4 590
How To Draw Animals - Your Step By Step…
Howexpert, Therese Barleta Hardcover R751 Discovery Miles 7 510
Writing Skills REVISION AND EXAM…
Mike Gould Paperback  (1)
R179 Discovery Miles 1 790
Heads, Features and Faces (Dover Anatomy…
George B. Bridgman Hardcover R571 Discovery Miles 5 710
Putting on Your Pantos
John Cooper Hardcover R356 Discovery Miles 3 560
Damaged Goods - The Rise and Fall of Sir…
Oliver Shah Paperback  (1)
R289 R264 Discovery Miles 2 640

 

Partners