Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges

Buy

This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important and much disputed, theme of the Computers, Privacy and Data Protection (CPDP) conferences : the surveillance, control and steering of individuals and groups of people and the increasing number of performing tools (data mining, profiling, convergence) to achieve those objectives. This part is illustrated by examples from the domain of law enforcement and smart surveillance. The book concludes with five chapters that advance our understanding of the changing nature of privacy (concerns) and data protection.

(HTML tags aren't allowed.)

Global Warming: The Complete Briefing
Global Warming: The Complete Briefing
John Houghton's market-leading textbook is now in full color and includes the latest IPCC findings, making it the definitive guide to climate change. Written for students across a wide range of disciplines, its simple, logical flow of ideas gives an invaluable grounding in the science and impacts of climate change and highlights the need for action...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Algorithmic Game Theory
Algorithmic Game Theory
In the last few years game theory has had a substantial impact on computer science, especially on Internet- and e-commerce-related issues. More than 40 of the top researchers in this field have written chapters that go from the foundations to the state of the art. Basic chapters on algorithmic methods for equilibria, mechanism design and...

Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications

How to Design a Secure Multimedia Encryption Scheme

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

Blender 3D Printing Essentials
Blender 3D Printing Essentials

Learn 3D printing using the free open-source Blender software. This book gives you both an overview and practical instructions, enabling you to learn how to scale, build, color, and detail a model for a 3D printer.

Overview

  • Design beautiful, colourful, and practical objects in Blender to print or...
Excel 2010 Workbook For Dummies
Excel 2010 Workbook For Dummies

Reinforce your understanding of Excel with these Workbook exercises

Boost your knowledge of important Excel tasks by putting your skills to work in real-world situations. The For Dummies Workbook format provides more than 100 exercises that help you create actual results with Excel so you can gain proficiency.

...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy