Coverart for item
The Resource Data Protection and Privacy: (In)visibilities and Infrastructures, edited by Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert, (electronic resource)

Data Protection and Privacy: (In)visibilities and Infrastructures, edited by Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert, (electronic resource)

Label
Data Protection and Privacy: (In)visibilities and Infrastructures
Title
Data Protection and Privacy: (In)visibilities and Infrastructures
Statement of responsibility
edited by Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert
Contributor
Editor
Subject
Language
eng
Summary
This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders. Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.--
Member of
Assigning source
Provided by publisher
Image bit depth
0
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Leenes, Ronald
  • van Brakel, Rosamunde
  • Gutwirth, Serge
  • De Hert, Paul
Series statement
  • Springer eBooks
  • Law, Governance and Technology Series,
Series volume
36
http://library.link/vocab/subjectName
  • Law
  • Political science
  • Philosophy
  • Computer security
  • Computers and civilization
  • International law
  • Intellectual property
Label
Data Protection and Privacy: (In)visibilities and Infrastructures, edited by Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert, (electronic resource)
Link
http://ezproxy.eui.eu/login?url=http://dx.doi.org/10.1007/978-3-319-50796-5
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Part 1: Fundamental and legal questions. 1. Legal fundamentalism: is data protection really a fundamental right? Bart Van der Sloot -- 2. Is there a Right to Offline Alternatives in a Digital World? Murat Karaboga, Tobias Matzner, Hannah Obersteller and Carsten Ochs -- 3. What is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges. Ugo Pagallo, Massimo Durante and Shara Monteleone -- Part 2: Concepts and tools. 4. Towards a code of Conduct on privacy for mHealth to foster trust among users of mobile health applications. Eugenio Mantovani, Joan Antokol, Sjaak Nouwt, Marian Hoekstra, Nico Schutte, Pēteris Zilgalvis, Juan-Pedro Castro and Claudia Prettner -- 5. Minimum Harm by Design. Reworking Privacy by Design to mitigate the risks of surveillance. Elisa Orru -- 6. A purpose-based taxonomy for better governance of personal data in the Internet of Things era: the example of wellness data. Claire Levallois-Barth and Hugo Zylberberg -- 7. A Privacy Engineering Framework for the Internet of Things. Antonio Kung, Frank Kargl, Santiago Suppan, Jorge Cuellar, Henrich C. Pöhls, Adam Kapovits, Nicolas Notario and Yod Samuel Martin -- Part 3: Case studies. 8. Dangers from Within? Looking Inwards at the Role of Maladministration as the Leading Cause of Health Data Breaches in the UK. Leslie Stevens, Christine Dobbs, Kerina Jones and Graeme Laurie -- 9. On the road to privacy- and data protection-friendly security technologies in the workplace - A case-study of the MUSES Risk and Trust Analysis Engine. Yung Shin Van Der Sype, Jonathan Guislain, Seigneur Jean-Marc and Xavier Titi -- 10. A Study on Corporate Compliance with Transparency Requirements of Data Protection Law. Christoph Bier, Simon Kömpf and Jürgen Beyerer -- Part 4: closing. 11. Closing remarks: 9th International Computers, Privacy and Data Protection Conference. Giovanni Buttarelli
Control code
978-3-319-50796-5
Dimensions
unknown
Extent
1 online resource (XXIV, 295 pages)
File format
multiple file formats
Form of item
  • online
  • electronic
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9783319507965
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-50796-5
Other physical details
14 illustrations
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)973013599
Label
Data Protection and Privacy: (In)visibilities and Infrastructures, edited by Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert, (electronic resource)
Link
http://ezproxy.eui.eu/login?url=http://dx.doi.org/10.1007/978-3-319-50796-5
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Part 1: Fundamental and legal questions. 1. Legal fundamentalism: is data protection really a fundamental right? Bart Van der Sloot -- 2. Is there a Right to Offline Alternatives in a Digital World? Murat Karaboga, Tobias Matzner, Hannah Obersteller and Carsten Ochs -- 3. What is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges. Ugo Pagallo, Massimo Durante and Shara Monteleone -- Part 2: Concepts and tools. 4. Towards a code of Conduct on privacy for mHealth to foster trust among users of mobile health applications. Eugenio Mantovani, Joan Antokol, Sjaak Nouwt, Marian Hoekstra, Nico Schutte, Pēteris Zilgalvis, Juan-Pedro Castro and Claudia Prettner -- 5. Minimum Harm by Design. Reworking Privacy by Design to mitigate the risks of surveillance. Elisa Orru -- 6. A purpose-based taxonomy for better governance of personal data in the Internet of Things era: the example of wellness data. Claire Levallois-Barth and Hugo Zylberberg -- 7. A Privacy Engineering Framework for the Internet of Things. Antonio Kung, Frank Kargl, Santiago Suppan, Jorge Cuellar, Henrich C. Pöhls, Adam Kapovits, Nicolas Notario and Yod Samuel Martin -- Part 3: Case studies. 8. Dangers from Within? Looking Inwards at the Role of Maladministration as the Leading Cause of Health Data Breaches in the UK. Leslie Stevens, Christine Dobbs, Kerina Jones and Graeme Laurie -- 9. On the road to privacy- and data protection-friendly security technologies in the workplace - A case-study of the MUSES Risk and Trust Analysis Engine. Yung Shin Van Der Sype, Jonathan Guislain, Seigneur Jean-Marc and Xavier Titi -- 10. A Study on Corporate Compliance with Transparency Requirements of Data Protection Law. Christoph Bier, Simon Kömpf and Jürgen Beyerer -- Part 4: closing. 11. Closing remarks: 9th International Computers, Privacy and Data Protection Conference. Giovanni Buttarelli
Control code
978-3-319-50796-5
Dimensions
unknown
Extent
1 online resource (XXIV, 295 pages)
File format
multiple file formats
Form of item
  • online
  • electronic
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9783319507965
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-50796-5
Other physical details
14 illustrations
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)973013599

Library Locations

    • Badia FiesolanaBorrow it
      Via dei Roccettini 9, San Domenico di Fiesole, 50014, IT
      43.803074 11.283055
Processing Feedback ...