You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Today, consent is a fundamental concept in the European legal framework on data protection. The analysis of the historical and theoretical context carried out in this book reveals that consent was not an intrinsic notion in the birth of data protection. The concept of consent was included in data protection legislation in order to enhance the role of the data subject in the data protection arena, and to allow the data subject to have more control over the collection and processing of his/her personal information. This book examines the concept of consent and its requirements in the Data Protection Directive, taking into account contemporary considerations on bioethics and medical ethics, as well as recent developments in the framework of the review of the Directive. It further studies issues of consent in electronic communications, carrying out an analysis of the consent-related provisions of the ePrivacy Directive.
Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." –V. Reding, Commissioner, Responsible for Information Society and Media (EU)
How does one ensure information security for a computer that is entangled with the structures and processes of a human brain – and for the human mind that is interconnected with such a device? The need to provide information security for neuroprosthetic devices grows more pressing as increasing numbers of people utilize therapeutic technologies such as cochlear implants, retinal prostheses, robotic prosthetic limbs, and deep brain stimulation devices. Moreover, emerging neuroprosthetic technologies for human enhancement are expected to increasingly transform their human users’ sensory, motor, and cognitive capacities in ways that generate new ‘posthumanized’ sociotechnological realit...
This collection considers the implications for privacy of the utilisation of new technologies in the criminal process. In most modern liberal democratic states, privacy is considered a basic right. Many national constitutions, and almost all international human rights instruments, include some guarantee of privacy. Yet privacy interests appear to have had relatively little influence on criminal justice policy making. The threat that technology poses to these interests demands critical re-evaluation of current law, policy, and practice. This is provided by the contributions to this volume. They offer legal, criminological, philosophical and comparative perspectives. The book will be of interest to legal and criminological scholars and postgraduate students. Its interdisciplinary methodology and focus on the intersection between law and technology make it also relevant for philosophers, and those interested in science and technology studies.
The book in front of you is the first international academic volume on the legal, philosophical and economic aspects of the rise of 3D printing. In recent years 3D printing has become a hot topic. Some claim that it will revolutionize production and mass consumption, enabling consumers to print anything from clothing, automobile parts and guns to various foods, medication and spare parts for their home appliances. This may significantly reduce our environmental footprint, but also offers potential for innovation and creativity. At the same time 3D printing raises social, ethical, regulatory and legal questions. If individuals can print anything they want, how does this affect existing system...
What are the best practices for leading a workforce in which human employees have merged cognitively and physically with electronic information systems and work alongside social robots, artificial life-forms, and self-aware networks that are ‘colleagues’ rather than simply ‘tools’? How does one manage organizational structures and activities that span actual and virtual worlds? How are the forces of technological posthumanization transforming the theory and practice of management? This volume explores the reality that an organization’s workers, managers, customers, and other stakeholders increasingly comprise a complex network of human agents, artificial agents, and hybrid human-sy...
This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as ...
Village Potters of the Troodos Mountains: Ceramic Production in Agios Demetrios, Cyprus 1891-2002, by Gloria London, is a study of four generations of female potters working in a remote Cypriot mountain village. Their coil-built jars, jugs, cookware, beehives, ovens, and decorative pots are the subject of the author's ethnoarchaeological research, including her quantitative data on pot sizes, production rates, firing times, and rate of loss. This data will serve archaeologists worldwide who are concerned with craft specialization and standardization, learning frameworks, markings on pots, and identifying production locations.
Bringing together leading European scholars, this thought-provoking Research Handbook provides a state-of-the-art overview of the scope of research and current thinking in the area of European data protection. Offering critical insights on prominent strands of research, it examines key challenges and potential solutions in the field. Chapters explore the fundamental right to personal data protection, government-to-business data sharing, data protection as performance-based regulation, privacy and marketing in data-driven business models, data protection and judicial automation, and the role of consent in an algorithmic society.
This book constitutes the refereed proceedings of the 20th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2014, held in Essen, Germany, in April 2013. The 23 papers presented together with 1 keynote were carefully reviewed and selected from 62 submissions. The REFSQ'15 conference is organized as a three-day symposium. The REFSQ'15 has chosen a special conference theme “I heard it first at RefsQ”. Two conference days were devoted to presentation and discussion of scientific papers. The two days connect to the conference theme with a keynote, an invited talk and poster presentations. There were two parallel tracks on the third day: the Industry Track and the new Research Methodology Track. REFSQ 2015 seeks reports of novel ideas and techniques that enhance the quality of RE’s products and processes, as well as reflections on current research and industrial RE practices.