European University Institute Library

Privacy, Data Protection and Cybersecurity in Europe, edited by Wolf J. Schünemann, Max-Otto Baumann

Label
Privacy, Data Protection and Cybersecurity in Europe, edited by Wolf J. Schünemann, Max-Otto Baumann
Language
eng
resource.imageBitDepth
0
Literary Form
non fiction
Main title
Privacy, Data Protection and Cybersecurity in Europe
Medium
electronic resource
Nature of contents
dictionaries
Oclc number
981463428
Responsibility statement
edited by Wolf J. Schünemann, Max-Otto Baumann
Series statement
Springer eBooks
Summary
This book offers a comparative perspective on data protection and cybersecurity in Europe. In light of the digital revolution and the implementation of social media applications and big data innovations, it analyzes threat perceptions regarding privacy and cyber security, and examines socio-political differences in the fundamental conceptions and narratives of privacy, and in data protection regimes, across various European countries. The first part of the book raises fundamental legal and ethical questions concerning data protection; the second analyses discourses on cybersecurity and data protection in various European countries; and the third part discusses EU regulations and norms intended to create harmonized data protection regimes.--, Provided by publisher
Table Of Contents
Chapter 1: Introduction: Privacy, data protection and cybersecurity in Europe -- Part 1: Fundamental issues of privacy and data protection -- Chapter 2: Spain – The right to be forgotten -- Chapter 3: Harvesting social media for journalistic purposes in the UK -- Part 2: Discourses on cybersecurity and data protection in comparative perspective -- Chapter 4: Analysing the French discourse about “surveillance and data protection“ in the context of the NSA scandal -- Chapter 5: Solving the surveillance problem -- Chapter 6: The unshaken role of GCHQ -- Chapter 7: The ambiguous relation between privacy and security in German cyber politics -- Part 3: Europeanisation – centre and periphery -- Chapter 8: Protecting or processing? -- Chapter 9: Lithuania and Romania to introduce cybersecurity laws
Content
Mapped to

Incoming Resources