You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected...
This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, technique...
Sesenta y cinco años después de la publicación de 1984, las prevenciones realizadas por Orwell han dejado ya de pertenecer a un futuro distópico y se nos presentan hoy como parte indiscutible de nuestra realidad. Las tecnologías de la información y la comunicación rodean y controlan todos los aspectos de nuestras vidas. La creciente interconexión y digitalización de las telecomunicaciones conlleva una serie de cambios radicales en la manera en que los ciudadanos del mundo se comunican y acceden a la información. En este contexto, resulta fundamental identificar claramente la normativa, las técnicas y las herramientas que tutelan y hacen efectiva la protección de los datos persona...
Includes opinions of the Corte Suprema de Justicia.
"Constituição, Política e Direitos Fundamentais" inscreve-se numa trilogia inovadora de estudos em homenagem a José Carlos Vieira de Andrade, a partir de alguns dos tópicos da sua obra. Reunindo uma plêiade de autores de diferentes gerações, testemunhando diversidade na receção, assumindo convergências e divergências doutrinárias, propõe-se aos leitores um percurso por um conjunto de temas essenciais para a compreensão da teoria e da dogmática constitucionais, em especial dos direitos fundamentais.