標題: Titlebook: European Data Protection: Coming of Age; Serge Gutwirth,Ronald Leenes,Yves Poullet Book 2013 Springer Science+Business Media Dordrecht 201 [打印本頁] 作者: Inveigle 時間: 2025-3-21 17:07
書目名稱European Data Protection: Coming of Age影響因子(影響力)
書目名稱European Data Protection: Coming of Age影響因子(影響力)學科排名
書目名稱European Data Protection: Coming of Age網(wǎng)絡公開度
書目名稱European Data Protection: Coming of Age網(wǎng)絡公開度學科排名
書目名稱European Data Protection: Coming of Age被引頻次
書目名稱European Data Protection: Coming of Age被引頻次學科排名
書目名稱European Data Protection: Coming of Age年度引用
書目名稱European Data Protection: Coming of Age年度引用學科排名
書目名稱European Data Protection: Coming of Age讀者反饋
書目名稱European Data Protection: Coming of Age讀者反饋學科排名
作者: Water-Brash 時間: 2025-3-21 21:50 作者: 勛章 時間: 2025-3-22 01:00 作者: 擁擠前 時間: 2025-3-22 05:55 作者: Medley 時間: 2025-3-22 12:21 作者: AGATE 時間: 2025-3-22 14:47
Michael Jaekel,Karsten Bronnert and therefore smart metering has to strike a careful balance between detailed energy metering and privacy protection..In this paper, we present the recent developments in smart metering and describe the Dutch case in detail. From this, we draw key lessons for countries that want to introduce smart 作者: AGATE 時間: 2025-3-22 20:49
https://doi.org/10.1007/978-3-658-27965-3derlying German approach to the regulation of smart grid privacy is examined and critically discussed in the light of the necessary functional provisions within an electricity grid under the regulatory regime of a liberalized market. Alternative approaches from the Netherlands and the UK are present作者: 知道 時間: 2025-3-22 22:18
Seven Types of Privacysues that each of these technologies present and argues that there are seven different types of privacy. We also use this case study information to suggest that an imprecise conceptualisation of privacy may be necessary to maintain a fluidity that enables new dimensions of privacy to be identified, 作者: PAN 時間: 2025-3-23 02:31 作者: 大氣層 時間: 2025-3-23 08:08 作者: Felicitous 時間: 2025-3-23 10:44
Smart Metering and Privacy in Europe: Lessons from the Dutch Case and therefore smart metering has to strike a careful balance between detailed energy metering and privacy protection..In this paper, we present the recent developments in smart metering and describe the Dutch case in detail. From this, we draw key lessons for countries that want to introduce smart 作者: Conduit 時間: 2025-3-23 17:14
Beyond Gut Level – Some Critical Remarks on the German Privacy Approach to Smart Meteringderlying German approach to the regulation of smart grid privacy is examined and critically discussed in the light of the necessary functional provisions within an electricity grid under the regulatory regime of a liberalized market. Alternative approaches from the Netherlands and the UK are present作者: 預感 時間: 2025-3-23 22:04 作者: Phenothiazines 時間: 2025-3-24 02:03
https://doi.org/10.1007/978-3-642-92321-0veillance is connected to the “digital labour” debate in Critical Media and Communication Studies. It is maintained that the commercial Internet is a workplace and factory, in which commodities and value are created and where workplace surveillance plays a crucial role in the exploitation of labour.作者: exquisite 時間: 2025-3-24 03:47 作者: 廣大 時間: 2025-3-24 09:40 作者: 縮減了 時間: 2025-3-24 10:58 作者: 華而不實 時間: 2025-3-24 18:14
https://doi.org/10.1007/978-3-322-98864-5vacy and data protection; and autonomy in ICT for older persons as an achievement on account of by care-in-practice in long-term care. Learning from these modes of enacting autonomy is important in order to prevent ICT for older people from getting trapped either in excessive proceduralised mechanis作者: Monocle 時間: 2025-3-24 22:35 作者: 破譯密碼 時間: 2025-3-25 03:09
,Die f?derale Staatsform in der Krise?,aches to preserving and promoting informational privacy must also evolve with changing contexts and threats.. Foundational Principles are a response to this evolving need. They build upon, and extend, universal Fair Information Practice principles by emphasizing proactive leadership, systemic and ve作者: inquisitive 時間: 2025-3-25 03:41 作者: 沒花的是打擾 時間: 2025-3-25 10:24 作者: NUL 時間: 2025-3-25 11:48
https://doi.org/10.1007/978-3-663-04613-4ent and adjustment of SNS technology. More in particular we identify the necessary social requirements of SNS in order to optimize the privacy from a user perspective. For this, one of the application domains of privacy by design, the seven laws of identity proposed by Kim Cameron, is assessed and a作者: ARM 時間: 2025-3-25 17:23
Michael Jaekel,Karsten Bronnertmetering systems. The vision of smart grids will require one or more decades yet to be fully realised, but since a roll-out of smart meters is a lengthy process, countries are already starting to implement smart metering legislation, following the European legal framework on energy efficiency. Rolli作者: sparse 時間: 2025-3-25 23:53
Simone Kimpeler,Wolfgang Schweigerh capabilities could increase user satisfaction with applications’ privacy protections, they might also produce greater rejection of data collection. The current study investigated these issues using a mobile application that provided simplified disclosures and some user choice in data collection. R作者: 進取心 時間: 2025-3-26 03:28 作者: follicular-unit 時間: 2025-3-26 05:25
https://doi.org/10.1007/978-3-322-82739-5ar suspect of law-breaking behavior. By applying data matching technologies, indiscriminately collected surveillance data are combined with data from other sources to select individual citizens. Inspired by insights from behavioral research, these citizens may be proactively approached in order to s作者: Vsd168 時間: 2025-3-26 11:38 作者: 窩轉(zhuǎn)脊椎動物 時間: 2025-3-26 12:45
http://image.papertrans.cn/e/image/316753.jpg作者: BILIO 時間: 2025-3-26 20:41 作者: AVOW 時間: 2025-3-26 21:22
https://doi.org/10.1007/978-94-007-5170-5Computers Reading Our Minds?; Data Protection; Data Protection’s Identity Crisis; Enhanced Privacy Lead作者: 討好女人 時間: 2025-3-27 05:09
The Internet as Surveilled Workplayplace and Factory The discussion is connected o Herbert Marcuse’s interpretation of Freud’s theory of drives, Dallas Smythe’s concept of the audience commodity, and Hardt’s and Negri’s concepts of the commons and the social worker/factory.作者: SUE 時間: 2025-3-27 08:01 作者: 燒烤 時間: 2025-3-27 10:37
Book 2013e data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we ca作者: Evolve 時間: 2025-3-27 15:10
https://doi.org/10.1007/978-3-663-06994-2 the internal market while placing increasing emphasis on the fundamental rights vocation of data protection. One common theme emerges from the paper; the aims of European Data Protection policy are unclear and as such it is bound to suffer an ‘identity crisis’.作者: conquer 時間: 2025-3-27 19:54 作者: 我吃花盤旋 時間: 2025-3-28 01:58
https://doi.org/10.1007/978-3-658-19612-7e for their implications on privacy and future research in the field. The ultimate goal is to foster cross-disciplinary discussion on the requirements and limits of Position PETs in the light of emerging privacy demands and on-going research.作者: Nomadic 時間: 2025-3-28 03:24 作者: biosphere 時間: 2025-3-28 09:22 作者: EPT 時間: 2025-3-28 10:48 作者: 眼界 時間: 2025-3-28 16:13
Anonymity: A Comparison Between the Legal and Computer Science Perspectiveswe compare the different notions of anonymity provided in the European data protection Law with the formal models proposed in Computer Science. This analysis allows us to identify the main similarities and differences between the two points of view, hence highlighting the need for a joint research effort.作者: 非秘密 時間: 2025-3-28 19:01
Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Tree for their implications on privacy and future research in the field. The ultimate goal is to foster cross-disciplinary discussion on the requirements and limits of Position PETs in the light of emerging privacy demands and on-going research.作者: 協(xié)迫 時間: 2025-3-29 00:59 作者: airborne 時間: 2025-3-29 06:06
Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposeson between control and investigation. Practical examples are provided through three case studies, and a number of procedural improvements are suggested to reduce the potentially intimidating character of the practices.作者: 榨取 時間: 2025-3-29 07:52 作者: Morphine 時間: 2025-3-29 14:52
Privacy by Design Through a Social Requirements Analysis of Social Network Sites form a User Perspecuser perspective. For this, one of the application domains of privacy by design, the seven laws of identity proposed by Kim Cameron, is assessed and adjusted. This should help to mitigate the responsibilization of individuals who use or are affected by social networking services.作者: handle 時間: 2025-3-29 17:18 作者: Rodent 時間: 2025-3-29 22:00 作者: 尖酸一點 時間: 2025-3-30 03:19 作者: 壓碎 時間: 2025-3-30 04:54
https://doi.org/10.1007/978-3-322-98864-5hese modes of enacting autonomy is important in order to prevent ICT for older people from getting trapped either in excessive proceduralised mechanisms or in coercive care practices that may disregard the autonomy of older people.作者: rectum 時間: 2025-3-30 09:42
https://doi.org/10.1007/978-3-663-04613-4user perspective. For this, one of the application domains of privacy by design, the seven laws of identity proposed by Kim Cameron, is assessed and adjusted. This should help to mitigate the responsibilization of individuals who use or are affected by social networking services.作者: Amylase 時間: 2025-3-30 14:39
Die dezentrale Hauptversammlungthen present selected privacy-preserving mechanisms specially tailored for mobile sensing applications and identify future research directions to further enhance the privacy protection of users contributing to such applications.作者: Frequency 時間: 2025-3-30 19:55
Roadmap for Privacy Protection in Mobile Sensing Applicationsthen present selected privacy-preserving mechanisms specially tailored for mobile sensing applications and identify future research directions to further enhance the privacy protection of users contributing to such applications.作者: 抵押貸款 時間: 2025-3-30 22:40
Seven Types of Privacyplexity of privacy issues within frameworks that highlight the legal, social-psychological, economic or political concerns that technologies present. However, this reactive highlighting of concerns or intrusions does not provide an adequate framework though which to understand the ways in which priv作者: 小樣他閑聊 時間: 2025-3-31 01:56 作者: 思想流動 時間: 2025-3-31 07:11 作者: Asperity 時間: 2025-3-31 11:46 作者: 極大的痛苦 時間: 2025-3-31 13:26 作者: 要控制 時間: 2025-3-31 18:02