• формат pdf
  • размер 2.96 МБ
  • добавлен 09 ноября 2011 г.
Acquisti A., Gritzalis S., Lambrinoudakis C., di Vimercati S. (eds.) Digital Privacy. Theory, Technologies, and Practices
Издательство Auerbach Publications, 2008, -494 pp.

Privacy as a social and legal issue has been a conce of social scientists, philosophers, and lawyers for a long time. Back in 1890, two American lawyers, S. Warren and L. Brandeis, defined privacy as the right of an individual to be alone, and it has been recognized as a fundamental human right by the United Nations Declaration of Human Rights, the Inteational Convenant on Civil and Political Rights, the Charter of Fundamental Rights of the European Union, and many other inteational treaties. Therefore, in democratic societies the protection of privacy is a crucial issue.
Meanwhile, the intensive development of information and communication technologies has resulted in numerous new electronic services that aim to improve people’s lives by allowing them to communicate and exchange data through the Inteet, advertise their ideas through the World Wide Web, and purchase goods and services. To a large extent, the raw material for most of these electronic services is the personal data of individuals. Alongside the benefits for the people, these developments have introduced new risks such as identity theft, discriminatory profiling, continuous surveillance, and fraud. According to recent surveys, privacy and (especially) anonymity, are the fundamental issues of conce for most Inteet users, ranked higher than issues like ease-of-use, spam-mail, cost, and security. In view of the above, the OECD Declaration on the Protection of Privacy on Global Networks (for developing a culture of privacy in the Global Village) is especially well timed.
In this volume, privacy is considered as the indefeasible right of an individual to control the ways in which personal information is obtained, processed, distributed, shared, and used by any other entity.


Part I: The Privacy Space
Privacy-Enhancing Technologies for the Inteet III: Ten Years Later
Communication Privacy
Privacy-Preserving Cryptographic Protocols
Part II: Privacy Attacks
Byzantine Attacks on Anonymity Systems
Introducing Traffic Analysis
Privacy, Profiling, Targeted Marketing, and Data Mining
Part III: Privacy-Enhancing Technologies
Enterprise Privacy Policies and Languages
Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation
Privacy Protection with Uncertainty and Indistinguishability
Privacy-Preservation Techniques in Data Mining
Part IV: User Privacy
HCI Designs for Privacy-Enhancing Identity Management
Privacy Perceptions among Members of Online Communities
Perceived Control: Scales for Privacy in Ubiquitous Computing
Part V: Privacy in Ubiquitous Computing
RFID: Technological Issues and Privacy Conces
Privacy-Enhanced Location Services Information
Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp)
Part VI: The Economics of Privacy
A Risk Model for Privacy Insurance
What Can Behavioral Economics Teach Us about Privacy?
Part VII: Privacy and Policy
Privacy of Outsourced Data
Communications Data Retention: A Pandora’s Box for Rights and Liberties?
Surveillance of Emergent Associations: Freedom of Association in a Network Society
Похожие разделы
Смотрите также

Bidwell Teri. Cross Michael. Russell Ryan. Hack Proofing Your Identity

  • формат pdf
  • размер 8.9 МБ
  • добавлен 17 сентября 2011 г.
PUBLISHED BY Syngress Publishing, Inc. Copyright © 2002. ISBN: 1-931836-51- 5. (393 pages). Protect Your Family on the Internet! Hack Proofing Your Identity is designed to answer these questions, and teach you the methodology of how to find answers to questions this book will inevitably be unable to address. Unfortunately, it is impossible to anticipate all the possible ways in which someone might steal your identity given the current rapid evol...

Liu K.J.R., Trappe W., Wang Z.J., Wu M., Zhao H. Multimedia Fingerprinting Forensics for Traitor Tracing

  • формат pdf
  • размер 9.07 МБ
  • добавлен 07 октября 2011 г.
Издательство Hindawi, 2005, -260 pp. Multimedia is becoming an integral part of our daily life. It is a means for us to communicate important information with each other, as well as a way to express our creative sides. The information and art contained inside media have economic value, personal value, and often broader impacts on the general welfare of our society. Consequently, multimedia is a form of digital information that must be protected....

Saadawi T., Jordan L. (eds.) Cyber Infrastructure Protection

  • формат pdf
  • размер 3.22 МБ
  • добавлен 06 января 2012 г.
Strategic Studies Institute, 2011, -324 pp. The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these informa...