0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • R5,000 - R10,000 (5)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

European Data Protection: Coming of Age (Paperback, 2013 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet European Data Protection: Coming of Age (Paperback, 2013 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet
R5,829 Discovery Miles 58 290 Ships in 10 - 15 working days

On 25 January 2012, the European Commission presented its long awaited new "Data protection package". With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory network was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.

Computers, Privacy and Data Protection: an Element of Choice (Paperback, 2011 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert,... Computers, Privacy and Data Protection: an Element of Choice (Paperback, 2011 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert, Ronald Leenes
R5,818 Discovery Miles 58 180 Ships in 10 - 15 working days

This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.

Data Protection in a Profiled World (Paperback, 2010 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert Data Protection in a Profiled World (Paperback, 2010 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert
R2,978 Discovery Miles 29 780 Ships in 10 - 15 working days

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.

European Data Protection: Coming of Age (Hardcover, 2013 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet European Data Protection: Coming of Age (Hardcover, 2013 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet
R4,580 Discovery Miles 45 800 Ships in 10 - 15 working days

On 25 January 2012, the European Commission presented its long awaited new Data protection package . With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory network was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed.

This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.

This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media."

European Data Protection: In Good Health? (Hardcover, 2012 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet European Data Protection: In Good Health? (Hardcover, 2012 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert, Yves Poullet
R4,545 Discovery Miles 45 450 Ships in 10 - 15 working days

Although Europe has a significant legal data protection framework, built up around EU Directive 95/46/EC and the Charter of Fundamental Rights, the question of whether data protection and its legal framework are 'in good health' is increasingly being posed. Advanced technologies raise fundamental issues regarding key concepts of data protection. Falling storage prices, increasing chips performance, the fact that technology is becoming increasingly embedded and ubiquitous, the convergence of technologies and other technological developments are broadening the scope and possibilities of applications rapidly. Society however, is also changing, affecting the privacy and data protection landscape. The 'demand' for free services, security, convenience, governance, etc, changes the mindsets of all the stakeholders involved. Privacy is being proclaimed dead or at least worthy of dying by the captains of industry; governments and policy makers are having to manoeuvre between competing and incompatible aims; and citizens and customers are considered to be indifferent. In the year in which the plans for the revision of the Data Protection Directive will be revealed, the current volume brings together a number of chapters highlighting issues, describing and discussing practices, and offering conceptual analysis of core concepts within the domain of privacy and data protection. The book's first part focuses on surveillance, profiling and prediction; the second on regulation, enforcement, and security; and the third on some of the fundamental concepts in the area of privacy and data protection. Reading the various chapters it appears that the 'patient' needs to be cured of quite some weak spots, illnesses and malformations. European data protection is at a turning point and the new challenges are not only accentuating the existing flaws and the anticipated difficulties, but also, more positively, the merits and the need for strong and accurate data protection practices and rules in Europe, and elsewhere.

Computers, Privacy and Data Protection: an Element of Choice (Hardcover, Edition.): Serge Gutwirth, Yves Poullet, Paul De Hert,... Computers, Privacy and Data Protection: an Element of Choice (Hardcover, Edition.)
Serge Gutwirth, Yves Poullet, Paul De Hert, Ronald Leenes
R5,868 Discovery Miles 58 680 Ships in 10 - 15 working days

This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.

Reinventing Data Protection? (Paperback, Softcover reprint of hardcover 1st ed. 2009): Serge Gutwirth, Yves Poullet, Paul De... Reinventing Data Protection? (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Serge Gutwirth, Yves Poullet, Paul De Hert, Cecile de Terwangne, Sjaak Nouwt
R5,791 Discovery Miles 57 910 Ships in 10 - 15 working days

data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen - utilizing the full potential of what ICT-technology has to offer - seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one's own identity. Transactiondata-bothtraf?candlocationdata-deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person's contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.

Data Protection in a Profiled World (Hardcover, 2010 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert Data Protection in a Profiled World (Hardcover, 2010 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert
R3,179 Discovery Miles 31 790 Ships in 10 - 15 working days

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.

Reinventing Data Protection? (Hardcover, 2009 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert, Cecile de Terwangne, Sjaak Nouwt Reinventing Data Protection? (Hardcover, 2009 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert, Cecile de Terwangne, Sjaak Nouwt
R5,991 Discovery Miles 59 910 Ships in 10 - 15 working days

data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen - utilizing the full potential of what ICT-technology has to offer - seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one's own identity. Transactiondata-bothtraf?candlocationdata-deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person's contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sello Stands His Ground
Wendy Maartens Paperback R99 R69 Discovery Miles 690
The Rule Of Three
Sam Ripley Paperback R390 R312 Discovery Miles 3 120
Katryn kry `n Ster
Wendy Maartens Paperback R99 R69 Discovery Miles 690
Necroscope II: Vamphyri!
Brian Lumley Paperback R536 R451 Discovery Miles 4 510
Empire of the Vampire
Jay Kristoff Paperback R300 R240 Discovery Miles 2 400
Paw Patrol Treasury - Story Collection…
Paw Patrol Hardcover R290 R232 Discovery Miles 2 320
Winnie-the-Pooh Little Learners Pocket…
Disney Board book R151 Discovery Miles 1 510
I Cannot Draw a Horse
Charise Mericle Harper Hardcover R422 R348 Discovery Miles 3 480
Paw Patrol Pocket Library
Paw Patrol Board book R150 Discovery Miles 1 500
All the White Spaces
Ally Wilkes Paperback R517 R430 Discovery Miles 4 300

 

Partners