標(biāo)題: Titlebook: Data Protection and Privacy: (In)visibilities and Infrastructures; Ronald Leenes,Rosamunde Brakel,Paul Hert Book 2017 Springer Internation [打印本頁(yè)] 作者: ALOOF 時(shí)間: 2025-3-21 19:59
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures影響因子(影響力)
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures影響因子(影響力)學(xué)科排名
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures被引頻次
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures被引頻次學(xué)科排名
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures年度引用
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures年度引用學(xué)科排名
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures讀者反饋
書(shū)目名稱Data Protection and Privacy: (In)visibilities and Infrastructures讀者反饋學(xué)科排名
作者: allergy 時(shí)間: 2025-3-21 20:53
Rod Hague,Martin Harrop,Shaun Breslinnt aspects of the current legal framework are presented, followed by an analysis of former and ongoing Internet of Things regulation initiatives, asking whether the right to offline alternatives may have already been recognized and part of regulatory balancing processes.作者: linear 時(shí)間: 2025-3-22 00:44 作者: Indelible 時(shí)間: 2025-3-22 05:24 作者: 依法逮捕 時(shí)間: 2025-3-22 12:08 作者: NAVEN 時(shí)間: 2025-3-22 14:11 作者: NAVEN 時(shí)間: 2025-3-22 18:16 作者: forebear 時(shí)間: 2025-3-23 00:16
Comparative Hemostasis in Vertebratesearch and innovation opportunities as well as incentivizes them to develop more user-centric business models. In the end, a better governance of personal data can help citizens become more responsible for the choices they make.作者: 最低點(diǎn) 時(shí)間: 2025-3-23 03:54
Comparative Higher Education Politicsdata protection regulation. In this paper, we use one MUSES component, namely the Real-Time Risk and Trust Analysis Engine (MUSES RT2AE), as a use case to study in which way privacy and data protection legislation limits the monitoring of employees through company security technologies.作者: hair-bulb 時(shí)間: 2025-3-23 08:43
https://doi.org/10.1007/978-3-031-25867-1formation provided by companies. We found out that most companies do not transfer personal data without consent. Requirements on commercial e-mails are fulfilled as well. However, the situation of the right of access is much worse. Most information provided by companies is insufficient.作者: 議程 時(shí)間: 2025-3-23 10:38 作者: 可忽略 時(shí)間: 2025-3-23 13:57
On the Road to Privacy- and Data Protection-Friendly Security Technologies in the Workplace – A Casedata protection regulation. In this paper, we use one MUSES component, namely the Real-Time Risk and Trust Analysis Engine (MUSES RT2AE), as a use case to study in which way privacy and data protection legislation limits the monitoring of employees through company security technologies.作者: 撫慰 時(shí)間: 2025-3-23 19:03
A Study on Corporate Compliance with Transparency Requirements of Data Protection Lawformation provided by companies. We found out that most companies do not transfer personal data without consent. Requirements on commercial e-mails are fulfilled as well. However, the situation of the right of access is much worse. Most information provided by companies is insufficient.作者: staging 時(shí)間: 2025-3-24 01:13
Book 2017thors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud com作者: 辯論的終結(jié) 時(shí)間: 2025-3-24 04:03
Legal Fundamentalism: Is Data Protection Really a Fundamental Right?as been coined a fundamental right itself. The Charter of Fundamental Rights of the European Union grants citizens the right to privacy in Article 7 and the right to data protection in Article 8. The question is what this means and whether protecting personal data should in fact be qualified as ‘fundamental’.作者: 老巫婆 時(shí)間: 2025-3-24 08:37 作者: 巫婆 時(shí)間: 2025-3-24 11:04
Rod Hague,Martin Harrop,Shaun Breslinas been coined a fundamental right itself. The Charter of Fundamental Rights of the European Union grants citizens the right to privacy in Article 7 and the right to data protection in Article 8. The question is what this means and whether protecting personal data should in fact be qualified as ‘fundamental’.作者: 消息靈通 時(shí)間: 2025-3-24 15:56
Human Hemostatic/Coagulation Mechanisms associated features. The resulting framework makes the key difference between privacy engineering for IoT systems targeting data controllers, data processors and associated integrators, and privacy engineering for IoT subsystems, targeting suppliers.作者: TAP 時(shí)間: 2025-3-24 21:00 作者: 口訣 時(shí)間: 2025-3-25 01:26
Meng-Hsuan Chou,Mari Elken,Jens Jungblutumber one cause for data breach incidents. The chapter uses a case study approach to extend the work and provide novel analysis of maladministration and its role as a leading cause of data breaches. Through these analyses we examine the extent of avoidability of such incidents and the crucial role o作者: 尾隨 時(shí)間: 2025-3-25 04:56
What Is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges on Shand new levels and layers of connectivity and communication; (ii) collective, rather than individual, data protection; (iii) technological convergence, e.g. robotics and other forms of artificial agency, that may impact some further pillars of the field, such as data controllers; and, (iv) the relati作者: 排斥 時(shí)間: 2025-3-25 10:14
Dangers from Within? Looking Inwards at the Role of Maladministration as the Leading Cause of Healthumber one cause for data breach incidents. The chapter uses a case study approach to extend the work and provide novel analysis of maladministration and its role as a leading cause of data breaches. Through these analyses we examine the extent of avoidability of such incidents and the crucial role o作者: OPINE 時(shí)間: 2025-3-25 14:37
Book 2017ndamental rights and offline alternatives, through transparency requirements to health databreaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders...Researchers with an inter作者: enchant 時(shí)間: 2025-3-25 18:29
2352-1902 abreaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders...Researchers with an inter978-3-319-56177-6978-3-319-50796-5Series ISSN 2352-1902 Series E-ISSN 2352-1910 作者: 貪心 時(shí)間: 2025-3-25 22:07 作者: CLOT 時(shí)間: 2025-3-26 01:37
Legal Fundamentalism: Is Data Protection Really a Fundamental Right?se ‘fundamental rights’. The question is, however, what this concept actually entails and whether, and if so, how it differs from the more classic understanding of human rights. This question is important because data protection has been disconnected from the right to privacy in EU legislation and h作者: CHIDE 時(shí)間: 2025-3-26 07:12 作者: HIKE 時(shí)間: 2025-3-26 11:49
What Is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges on Shaacts to communicate, directly or indirectly, with each other and the internet. This network is rapidly and increasingly evolving into the networked connection of people, processes, data and things (i.e., the web of “everything”). While the latter promises to improve our lives, by anticipating our pr作者: 感情 時(shí)間: 2025-3-26 14:35 作者: cathartic 時(shí)間: 2025-3-26 19:14 作者: vocation 時(shí)間: 2025-3-26 21:00
A Purpose-Based Taxonomy for Better Governance of Personal Data in the Internet of Things Era: The Enon will unlock new opportunities both in health- and non-health-related sectors but also challenge the frontiers of what we used to consider private. Beyond these frontiers, not all data is created with the same level of sensitivity and risk, and we propose a new taxonomy based on purpose rather th作者: 避開(kāi) 時(shí)間: 2025-3-27 04:13 作者: demote 時(shí)間: 2025-3-27 05:51
Dangers from Within? Looking Inwards at the Role of Maladministration as the Leading Cause of Healthctors leading to the misuse of health data and therefore uncertainty remains as to the best means of prevention and mitigation. Furthermore, in light of the forthcoming General Data Protection Regulation, the stakes are higher and pressure will continue to increase for organisations to adopt more ro作者: CRATE 時(shí)間: 2025-3-27 12:59 作者: Initial 時(shí)間: 2025-3-27 14:27 作者: contrast-medium 時(shí)間: 2025-3-27 18:43 作者: 生銹 時(shí)間: 2025-3-28 01:15
Rod Hague,Martin Harrop,Shaun Breslinisks for users’ privacy and self-determination. In this paper, we discuss whether a right to offline alternatives, hence to lead a non-digital life, might be a reasonable demand to counter such worries. In the search for answers, we investigate the – possible – societal utility and reasonability of 作者: separate 時(shí)間: 2025-3-28 04:16 作者: glans-penis 時(shí)間: 2025-3-28 09:39
Comparative Hemostasis in Vertebratesfor continuous patient monitoring and the ubiquitous exchange of sensitive health information, raise important questions about privacy and security. A recent development in the ongoing debate about privacy and mHealth is the Draft Code of Conduct on privacy for mobile health applications. Developed 作者: Mortar 時(shí)間: 2025-3-28 13:33 作者: scoliosis 時(shí)間: 2025-3-28 14:51
Comparative Hemostasis in Vertebratesnon will unlock new opportunities both in health- and non-health-related sectors but also challenge the frontiers of what we used to consider private. Beyond these frontiers, not all data is created with the same level of sensitivity and risk, and we propose a new taxonomy based on purpose rather th作者: 感情脆弱 時(shí)間: 2025-3-28 20:44 作者: obviate 時(shí)間: 2025-3-29 02:08 作者: FLING 時(shí)間: 2025-3-29 05:47 作者: Notify 時(shí)間: 2025-3-29 10:46 作者: 減去 時(shí)間: 2025-3-29 14:35
https://doi.org/10.1007/978-3-319-50796-5Data Protection; Privacy Protection; Current Legal Evolution; Current Technological/ICT Evolution; Cloud作者: BET 時(shí)間: 2025-3-29 16:49 作者: ALIEN 時(shí)間: 2025-3-29 21:35