You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Each communication exchange contains an identifier which may, or may not, be intended by the parties involved. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked infonnation society? th th From the 6 to the 10 August 2007, IFIP (International Federation for Infonnation Processing) working groups 9. 2 (Social Accountability), 9. 6/11. 7 (IT rd Misuse and the Law) and 11. 6 (Identity Management) hold the...
This book constitutes the refereed proceedings of the Second International Conference on Trust and Privacy in Digital Business, TrustBus 2005, held in Copenhagen, Denmark, in August 2005. The 32 revised full papers presented together with an invited paper were carefully reviewed and selected from more than 100 submissions. The papers are organized in topical sections on digital business, mobile/wireless services, certificate revocation/index search, trust, digital signature, privacy, e-auctions, and smart cards/authentication.
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
The Law of the Future and the Future of Law is a unique collection of 'think pieces' in which a wide variety of experts share their thoughts on how they envision the future of law. By asking the question -What do you see as the most significant challenges for the development of the law? What developments are we likely to see in the coming two to three decades? What do those developments mean for national legal systems as a whole?- the Hague Institute for the Internationalisation of Law (HiiL) has canvassed the views of a large number of renowned experts in particular areas of law. This volume was prepared as part of the Law of the Future Joint Action Programme and as the basis of the Law of the Future Conference on 23 and 24 June 2011. The Law of the Future Joint Action Programme is based on the premise that prospective thinking about law is not only desirable but also required in order to ensure that law and legal systems do not become obsolete, ineffective or unjust. The aim is to set a world standard in thinking ahead, to guide decision makers today. For more information, visit www.lawofthefuture.org.
This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021. The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The papers presented were carefully reviewed and selected. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.
Of interest to both researchers and professionals, this book constitutes the thoroughly refereed post-proceedings of the first International Conference on E-Voting and Identity, VOTE-ID 2007, held in Germany in 2007. The 16 revised full papers here were reviewed and selected from numerous submissions. The papers are organized in sections that include, among many others, remote electronic voting, evaluation of electronic voting systems, and electronic voting in different countries.
This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as ...
This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.
Data access is essential for serving the public good. This book provides new frameworks to address the resultant privacy issues.