You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General ...
Implementation of the Committee of Ministers of the Council of Europe Recommendation No. R (2000) 13 on a European policy on access to archives Recommendation No. R (2000) 13 on a European policy on access to archives was adopted by the Committee of Ministers of the Council of Europe on 13 July 2000 on the basis that archives constitute an essential and irreplaceable element of culture. The recommendation was the first international standard in this field and it formulated several principles with a view to inspiring sound policies in the member states on access to archives, through legislation or by bringing existing legislation into line with the recommendation. Following the adoption of th...
This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016. The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engi...
This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August/September 2022. The 9 full papers and 5 workshop and tutorial papers included in this volume were carefully reviewed and selected from 23 submissions. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.
Desinformation, Identitätsmissbrauch, Facial Reenactment, Face Morphing, Face Swapping, Gesichtsgeneration, Full Body Puppetry, Deepfake-Audio Die Imitation von Stimmen und Gesichtern mittels neuer KI-Technologien wird zunehmend einfacher – und die Resultate sind schon heute kaum mehr von echten Stimmen und Gesichtern zu unterscheiden. Diese Technologien bieten viele kreative und innovative Nutzungspotenziale, sowohl für Privatnutzende als auch für verschiedene Wirtschaftsbereiche. Andererseits sind Deepfake-Videos und Deepfake-Audios auch Quell zahlreicher Risiken: Sie können z.B. politische Desinformation vereinfachen, Mobbing Vorschub leisten und kriminelle Aktivitäten begünstigen...
In light of the increased utilization of information technologies, such as social media and the ‘Internet of Things,’ this book investigates how this digital transformation process creates new challenges and opportunities for political participation, political election campaigns and political regulation of the Internet. Within the context of Western democracies and China, the contributors analyze these challenges and opportunities from three perspectives: the regulatory state, the political use of social media, and through the lens of the public sphere. The first part of the book discusses key challenges for Internet regulation, such as data protection and censorship, while the second ad...
This book presents the current state of research in information systems and digital transformation. Due to the global trend of digitalization and the impact of the Covid 19 pandemic, the need for innovative, high-quality research on information systems is higher than ever. In this context, the book covers a wide range of topics, such as digital innovation, business analytics, artificial intelligence, and IT strategy, which affect companies, individuals, and societies. This volume gathers the revised and peer-reviewed papers on the topic "Technology" presented at the International Conference on Information Systems, held at the University of Duisburg-Essen in 2021.
Biometrie, Gesichtserkennung, Spracherkennung, Smarte Lautsprecher, Jedermann-Identifikation, Emotionserkennung, Privatsphäre, Datenschutz, Social Scoring Technologien zur Stimm-, Sprach- und Gesichtserkennung werden im Alltag bereits angewendet. Etwa in smarten Lautsprechern, die auf Kommando die gewünschte Musik abspielen oder Nutzerfragen beantworten, durch Strafverfolger zur Suche nach dem Gesicht von Verdächtigen in Videomaterial oder bei Bankkunden, die am Telefon anhand ihrer Stimme identifiziert werden. Diese Technologien versprechen, den Alltag ihrer Nutzerinnen und Nutzer zu vereinfachen, ihnen frühzeitige Hinweise auf Krankheiten zu geben und der Polizei neue Möglichkeiten be...
Bei der „Netzpolitik“ handelt es sich politisch und akademisch gesehen um ein relativ neues Gebiet, auf dem eine Vielzahl von Themen verhandelt wird. Der vorliegende Band will Orientierung geben, indem er das Feld strukturiert darstellt und zu den wichtigsten Themen fundierte Darstellungen und Analysen vorlegt. Die Beiträge greifen das Thema aus politikwissenschaftlicher Perspektive auf, beziehen es auf Fachdebatten und stellen Material bereit, das sowohl zur Information wie zur Anregung der weiteren Diskussion dienen soll. Der Inhalt Untersuchungsgegenstand Internet ● Ein Analyserahmen und die Theoriediskussion zur Netzpolitik in Deutschland ● Internet Governance: Von der Selbstreg...