Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Access to archives in the digital age
  • Language: en
  • Pages: 72

Access to archives in the digital age

Implementation of the Committee of Ministers of the Council of Europe Recommendation No. R (2000) 13 on a European policy on access to archives Recommendation No. R (2000) 13 on a European policy on access to archives was adopted by the Committee of Ministers of the Council of Europe on 13 July 2000 on the basis that archives constitute an essential and irreplaceable element of culture. The recommendation was the first international standard in this field and it formulated several principles with a view to inspiring sound policies in the member states on access to archives, through legislation or by bringing existing legislation into line with the recommendation. Following the adoption of th...

Privacy and Identity Management. Facing up to Next Steps
  • Language: en
  • Pages: 285

Privacy and Identity Management. Facing up to Next Steps

  • Type: Book
  • -
  • Published: 2017-03-30
  • -
  • Publisher: Springer

This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016. The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.

Computer Security. ESORICS 2022 International Workshops
  • Language: en
  • Pages: 715

Computer Security. ESORICS 2022 International Workshops

This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engi...

Deepfakes und manipulierte Realitäten
  • Language: de
  • Pages: 438

Deepfakes und manipulierte Realitäten

Desinformation, Identitätsmissbrauch, Facial Reenactment, Face Morphing, Face Swapping, Gesichtsgeneration, Full Body Puppetry, Deepfake-Audio Die Imitation von Stimmen und Gesichtern mittels neuer KI-Technologien wird zunehmend einfacher – und die Resultate sind schon heute kaum mehr von echten Stimmen und Gesichtern zu unterscheiden. Diese Technologien bieten viele kreative und innovative Nutzungspotenziale, sowohl für Privatnutzende als auch für verschiedene Wirtschaftsbereiche. Andererseits sind Deepfake-Videos und Deepfake-Audios auch Quell zahlreicher Risiken: Sie können z.B. politische Desinformation vereinfachen, Mobbing Vorschub leisten und kriminelle Aktivitäten begünstigen...

Tackling Deepfakes in European Policy
  • Language: en
  • Pages: 95

Tackling Deepfakes in European Policy

  • Type: Book
  • -
  • Published: 2021
  • -
  • Publisher: Unknown

The emergence of a new generation of digitally manipulated media - also known as deepfakes - has generated substantial concerns about possible misuse. In response to these concerns, this report assesses the technical, societal and regulatory aspects of deepfakes. The rapid development and spread of deepfakes is taking place within the wider context of a changing media system. An assessment of the risks associated with deepfakes shows that they can be psychological, financial and societal in nature, and their impacts can range from the individual to the societal level. The report identifies five dimensions of the deepfake lifecycle that policy-makers could take into account to prevent and address the adverse impacts of deepfakes. The report includes policy options under each of the five dimensions, which could be incorporated into the AI legislative framework, the digital service act package and beyond. A combination of measures will likely be necessary to limit the risks of deepfakes, while harnessing their potential.

Data Protection and Privacy: (In)visibilities and Infrastructures
  • Language: en
  • Pages: 309

Data Protection and Privacy: (In)visibilities and Infrastructures

  • Categories: Law
  • Type: Book
  • -
  • Published: 2017-02-07
  • -
  • Publisher: Springer

This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General ...

Managing Democracy in the Digital Age
  • Language: en
  • Pages: 268

Managing Democracy in the Digital Age

  • Type: Book
  • -
  • Published: 2017-09-13
  • -
  • Publisher: Springer

In light of the increased utilization of information technologies, such as social media and the ‘Internet of Things,’ this book investigates how this digital transformation process creates new challenges and opportunities for political participation, political election campaigns and political regulation of the Internet. Within the context of Western democracies and China, the contributors analyze these challenges and opportunities from three perspectives: the regulatory state, the political use of social media, and through the lens of the public sphere. The first part of the book discusses key challenges for Internet regulation, such as data protection and censorship, while the second ad...

Privacy and Identity Management
  • Language: en
  • Pages: 220

Privacy and Identity Management

This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August/September 2022. The 9 full papers and 5 workshop and tutorial papers included in this volume were carefully reviewed and selected from 23 submissions. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

Automatisierte Erkennung von Stimme, Sprache und Gesicht
  • Language: de
  • Pages: 371

Automatisierte Erkennung von Stimme, Sprache und Gesicht

Biometrie, Gesichtserkennung, Spracherkennung, Smarte Lautsprecher, Jedermann-Identifikation, Emotionserkennung, Privatsphäre, Datenschutz, Social Scoring Technologien zur Stimm-, Sprach- und Gesichtserkennung werden im Alltag bereits angewendet. Etwa in smarten Lautsprechern, die auf Kommando die gewünschte Musik abspielen oder Nutzerfragen beantworten, durch Strafverfolger zur Suche nach dem Gesicht von Verdächtigen in Videomaterial oder bei Bankkunden, die am Telefon anhand ihrer Stimme identifiziert werden. Diese Technologien versprechen, den Alltag ihrer Nutzerinnen und Nutzer zu vereinfachen, ihnen frühzeitige Hinweise auf Krankheiten zu geben und der Polizei neue Möglichkeiten be...