Acquisti A., Gritzalis S., Lambrinoudakis C., di Vimercati S. (eds.) Digital Privacy. Theory, Technologies, and Practices

Acquisti A., Gritzalis S., Lambrinoudakis C., di Vimercati S. (eds.) Digital Privacy. Theory, Technologies, and Practices
  • разное
  • pdf
  • 2.96 МБ
  • добавлен 09.11.2011
Издательство Auerbach Publications, 2008, -494 pp.

Privacy as a social and legal issue has been a concern of social scientists, philosophers, and lawyers for a long time. Back in 1890, two American lawyers, S. Warren and L. Brandeis, defined privacy as the right of an individual to be alone, and it has been recognized as a fundamental human right by the United Nations Declaration of Human Rights, the International Convenant on Civil and Political Rights, the Charter of Fundamental Rights of the European Union, and many other international treaties. Therefore, in democratic societies the protection of privacy is a crucial issue.
Meanwhile, the intensive development of information and communication technologies has resulted in numerous new electronic services that aim to improve people’s lives by allowing them to communicate and exchange data through the Internet, advertise their ideas through the World Wide Web, and purchase goods and services. To a large extent, the raw material for most of these electronic services is the personal data of individuals. Alongside the benefits for the people, these developments have introduced new risks such as identity theft, discriminatory profiling, continuous surveillance, and fraud. According to recent surveys, privacy and (especially) anonymity, are the fundamental issues of concern for most Internet users, ranked higher than issues like ease-of-use, spam-mail, cost, and security. In view of the above, the OECD Declaration on the Protection of Privacy on Global Networks (for developing a culture of privacy in the Global Village) is especially well timed.
In this volume, privacy is considered as the indefeasible right of an individual to control the ways in which personal information is obtained, processed, distributed, shared, and used by any other entity.


Part I: The Privacy Space
Privacy-Enhancing Technologies for the Internet III: Ten Years Later
Communication Privacy
Privacy-Preserving Cryptographic Protocols
Part II: Privacy Attacks
Byzantine Attacks on Anonymity Systems
Introducing Traffic Analysis
Privacy, Profiling, Targeted Marketing, and Data Mining
Part III: Privacy-Enhancing Technologies
Enterprise Privacy Policies and Languages
Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation
Privacy Protection with Uncertainty and Indistinguishability
Privacy-Preservation Techniques in Data Mining
Part IV: User Privacy
HCI Designs for Privacy-Enhancing Identity Management
Privacy Perceptions among Members of Online Communities
Perceived Control: Scales for Privacy in Ubiquitous Computing
Part V: Privacy in Ubiquitous Computing
RFID: Technological Issues and Privacy Concerns
Privacy-Enhanced Location Services Information
Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp)
Part VI: The Economics of Privacy
A Risk Model for Privacy Insurance
What Can Behavioral Economics Teach Us about Privacy?
Part VII: Privacy and Policy
Privacy of Outsourced Data
Communications Data Retention: A Pandora’s Box for Rights and Liberties?
Surveillance of Emergent Associations: Freedom of Association in a Network Society

Смотрите также


Liu K.J.R., Trappe W., Wang Z.J., Wu M., Zhao H. Multimedia Fingerprinting Forensics for Traitor Tracing

Liu K.J.R., Trappe W., Wang Z.J., Wu M., Zhao H. Multimedia Fingerprinting Forensics for Traitor Tracing

  • разное
  • pdf
  • 9.07 МБ
  • добавлен 07.10.2011
Издательство Hindawi, 2005, -260 pp.

Multimedia is becoming an integral part of our daily life. It is a means for us to communicate important information with each other, as well as a way to express our creative sides. The information and art contained inside media have economic value, personal value, and often broader ...
Bidwell Teri. Cross Michael. Russell Ryan. Hack Proofing Your Identity

Bidwell Teri. Cross Michael. Russell Ryan. Hack Proofing Your Identity

  • разное
  • pdf
  • 8.9 МБ
  • добавлен 17.09.2011
PUBLISHED BY Syngress Publishing, Inc. Copyright © 2002. ISBN: 1-931836-51-
5. (393 pages).

Protect Your Family on the Internet!
Hack Proofing Your Identity is designed to answer these questions, and teach you the
methodology of how to find answers to questions this book will inevitably be unab...
Saadawi T., Jordan L. (eds.) Cyber Infrastructure Protection

Saadawi T., Jordan L. (eds.) Cyber Infrastructure Protection

  • разное
  • pdf
  • 3.22 МБ
  • добавлен 06.01.2012
Strategic Studies Institute, 2011, -324 pp.

The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks...