Author: Ronald Leenes
Release Date: 2017-02-07
This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders. Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.
Author: Tan, Joseph
Publisher: IGI Global
Release Date: 2018-05-11
Over the decades, the fields of health information systems and informatics have seen rapid growth. Such integrative efforts within the two disciplines have resulted in emerging innovations within the realm of medicine and healthcare. The Handbook of Research on Emerging Perspectives on Healthcare Information Systems and Informatics provides emerging research on the innovative practices of information systems and informatic software in providing efficient, safe, and impactful healthcare systems. While highlighting topics such as conceptual modeling, surveillance data, and decision support systems, this handbook explores the applications and advancements in technological adoption and application of information technology in health institutions. This publication is a vital resource for hospital administrators, healthcare professionals, researchers, and practitioners seeking current research on health information systems in the digital era.
Author: Julia Schwanholz
Release Date: 2017-09-13
Genre: Political Science
In light of the increased utilization of information technologies, such as social media and the ‘Internet of Things,’ this book investigates how this digital transformation process creates new challenges and opportunities for political participation, political election campaigns and political regulation of the Internet. Within the context of Western democracies and China, the contributors analyze these challenges and opportunities from three perspectives: the regulatory state, the political use of social media, and through the lens of the public sphere. The first part of the book discusses key challenges for Internet regulation, such as data protection and censorship, while the second addresses the use of social media in political communication and political elections. In turn, the third and last part highlights various opportunities offered by digital media for online civic engagement and protest in the public sphere. Drawing on different academic fields, including political science, communication science, and journalism studies, the contributors raise a number of innovative research questions and provide fascinating theoretical and empirical insights into the topic of digital transformation.
Author: Ronald Leenes
Publisher: Bloomsbury Publishing
Release Date: 2017-12-28
The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the tenth annual International Conference on Computers, Privacy and Data Protection, CPDP 2017, held in Brussels in January 2017. The book explores Directive 95/46/EU and the GDPR moving from a market framing to a 'treaty-base games frame', the GDPR requirements regarding machine learning, the need for transparency in automated decision-making systems to warrant against wrong decisions and protect privacy, the riskrevolution in EU data protection law, data security challenges of Industry 4.0, (new) types of data introduced in the GDPR, privacy design implications of conversational agents, and reasonable expectations of data protection in Intelligent Orthoses. This interdisciplinary book was written while the implications of the General Data Protection Regulation 2016/679 were beginning to become clear. It discusses open issues, and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in computers, privacy and data protection.
Author: David Wright
Publisher: Springer Science & Business Media
Release Date: 2012-01-31
Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be exposing themselves to risks, from threats and vulnerabilities, of that data being breached or compromised by negligent or wayward employees, hackers, the police, intelligence agencies or third-party service providers. A recent study by the Ponemon Institute found that 70 per cent of organisations surveyed had suffered a data breach in the previous year. Privacy impact assessment is a tool, a process, a methodology to identify, assess, mitigate or avoid privacy risks and, in collaboration with stakeholders, to identify solutions. Contributors to this book – privacy commissioners, academics, consultants, practitioners, industry representatives – are among the world’s leading PIA experts. They share their experience and offer their insights to the reader in the policy and practice of PIA in Australia, Canada, New Zealand, the United Kingdom, the United States and elsewhere. This book, the first such on privacy impact assessment, will be of interest to any organisation that collects or uses personal data and, in particular, to regulators, policy-makers, privacy professionals, including privacy, security and information officials, consultants, system architects, engineers and integrators, compliance lawyers and marketing professionals. In his Foreword, surveillance studies guru Gary Marx says, “This state-of-the-art book describes the most comprehensive tool yet available for policy-makers to evaluate new personal data information technologies before they are introduced.” This book could save your organisation many thousands or even millions of euros (or dollars) and the damage to your organisation’s reputation and to the trust of employees, customers or citizens if it suffers a data breach that could have been avoided if only it had performed a privacy impact assessment before deploying a new technology, product, service or other initiative involving personal data.
Digital data collection and surveillance is pervasive and no one can protect your privacy without your help. Before you can help yourself, you need to understand the new technologies, what benefits they provide, and what trade-offs they require. Some of those trade-offs – privacy for convenience – could be softened by our own behavior or be reduced by legislation if we fight for it. This book analyzes why privacy is important to all of us, and it describes the technologies that place your privacy most at risk, starting with modern computing and the Internet.
Author: Olga Mironenko Enerstvedt
Release Date: 2017-09-18
This book sheds light on aviation security, considering both technologies and legal principles. It considers the protection of individuals in particular their rights to privacy and data protection and raises aspects of international law, human rights and data security, among other relevant topics. Technologies and practices which arise in this volume include body scanners, camera surveillance, biometrics, profiling, behaviour analysis, and the transfer of air passenger personal data from airlines to state authorities. Readers are invited to explore questions such as: What right to privacy and data protection do air passengers have? How can air passenger rights be safeguarded, whilst also dealing appropriately with security threats at airports and in airplanes? Chapters explore these dilemmas and examine approaches to aviation security which may be transferred to other areas of transport or management of public spaces, thus making the issues dealt with here of paramou nt importance to privacy and human rights more broadly. The work presented here reveals current processes and tendencies in aviation security, such as globalization, harmonization of regulation, modernization of existing data privacy regulation, mechanisms of self-regulation, the growing use of Privacy by Design, and improving passenger experience. This book makes an important contribution to the debate on what can be considered proportionate security, taking into account concerns of privacy and related human rights including the right to health, freedom of movement, equal treatment and non-discrimination, freedom of thought, conscience and religion, and the rights of the child. It will be of interest to graduates and researchers in areas of human rights, international law, data security and related areas of law or information science and technology. I think it will also be of interest to other categories (please see e.g. what the reviewers have written) "I think that the book would be of great appeal for airports managing bodies, regulators, Civil Aviation Authorities, Data Protection Authorities, air carriers, any kind of security companies, European Commission Transport Directorate, European Air Safety Agency (EASA), security equipment producers, security agencies like the US TSA, university researchers and teachers." "Lawyers (aviation, privacy and IT lawyers), security experts, aviation experts (security managers of airports, managers and officers from ANSPs and National Aviation Authorities), decision makers, policy makers (EASA, EUROCONTROL, EU commission)"
Author: Gloria González Fuster
Publisher: Springer Science & Business
Release Date: 2014-04-28
This book explores the coming into being in European Union (EU) law of the fundamental right to personal data protection. Approaching legal evolution through the lens of law as text, it unearths the steps that led to the emergence of this new right. It throws light on the right’s significance, and reveals the intricacies of its relationship with privacy. The right to personal data protection is now officially recognised as an EU fundamental right. As such, it is expected to play a critical role in the future European personal data protection legal landscape, seemingly displacing the right to privacy. This volume is based on the premise that an accurate understanding of the right’s emergence is crucial to ensure its correct interpretation and development. Key questions addressed include: How did the new right surface in EU law? How could the EU Charter of Fundamental Rights claim to render ‘more visible’ an invisible right? And how did EU law allow for the creation of a new right while ensuring consistency with existing legal instruments and case law? The book first investigates the roots of personal data protection, studying the redefinition of privacy in the United States in the 1960s, as well as pioneering developments in European countries and in international organisations. It then analyses the EU’s involvement since the 1970s up to the introduction of legislative proposals in 2012. It grants particular attention to changes triggered in law by language and, specifically, by the coexistence of languages and legal systems that determine meaning in EU law. Embracing simultaneously EU law’s multilingualism and the challenging notion of the untranslatability of words, this work opens up an inspiring way of understanding legal change. This book will appeal to legal scholars, policy makers, legal practitioners, privacy and personal data protection activists, and philosophers of law, as well as, more generally, anyone interested in how law works.
Presents theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices. Provides recent, comprehensive coverage of all issues related to information security and ethics, as well as the opportunities, future challenges, and emerging trends related to this subject.
Author: Kenneth A. Bamberger
Publisher: MIT Press
Release Date: 2015-10-23
Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation -- to put more laws "on the books." But there was scant evidence of how well tighter regulation actually worked "on the ground" in changing corporate (or government) behavior -- until now. This intensive five-nation study goes inside corporations to examine how the people charged with protecting privacy actually do their work, and what kinds of regulation effectively shape their behavior. And the research yields a surprising result. The countries with more ambiguous regulation -- Germany and the United States -- had the strongest corporate privacy management practices, despite very different cultural and legal environments. The more rule-bound countries -- like France and Spain -- trended instead toward compliance processes, not embedded privacy practices. At a crucial time, when Big Data and the Internet of Things are snowballing, Privacy on the Ground helpfully searches out the best practices by corporations, provides guidance to policymakers, and offers important lessons for everyone concerned with privacy, now and in the future.
Ausgangsthese des Buches ist, dass die verbreitete Metapher einer Abwägung zwischen Sicherheit und Privatheit konzeptuell inadäquat ist und zentrale Aspekte von Überwachungs- und Kontrollmaßnahmen verdeckt. Die Autoren betonen hingegen die symbiotische Beziehung zwischen Freiheit und Sicherheit und zeigen die Leere beider Konzepte auf, sobald sie voneinander isoliert und außerhalb konkreter Machtverhältnisse verstanden werden. Über eine stärkere Kontextualisierung von Risikokonzeptionen, Überwachungs- und Kontrollpraktiken zeigen sie dabei den Wert von Privatheit und Datenschutz auf. Als Kaleidoskop von Perspektiven, die von den Critical Studies über Internationale Beziehungen, Rechtswissenschaften und Philosophie bis hin zur Soziologie reichen, macht das Buch deutlich, dass Überwachungs- und Kontrolltechniken keineswegs immer mehr Sicherheit und weniger Privatheit implizieren – und umgekehrt, dass der Schutz von Privatheit nicht nur zuungunsten von Sicherheit zu haben ist.
Author: Peter Friess
Publisher: River Publishers
Release Date: 2013-06
Genre: Technology & Engineering
The book aims to provide a broad overview of various topics of the Internet of Things (IoT) from the research and development priorities to enabling technologies, architecture, security, privacy, interoperability and industrial applications. It is intended to be a stand-alone book in a series that covers the Internet of Things activities of the IERC - Internet of Things European Research Cluster - from technology to international cooperation and the global "state of play." The book builds on the ideas put forward by the European Research Cluster on the Internet of Things Strategic Research and Innovation Agenda and presents views and state of the art results on the challenges facing the research, development and deployment of IoT at the global level. Today we see the integration of Industrial, Business and Consumer Internet which is bringing together the Internet of People, Internet of Things, Internet of Energy, Internet of Vehicles, Internet of Media, Services and Enterprises in forming the backbone of the digital economy, the digital society and the foundation for the future knowledge and innovation based economy. These developments are supporting solutions for the emerging challenges of public health, aging population, environmental protection and climate change, the conservation of energy and scarce materials, enhancements to safety and security and the continuation and growth of economic prosperity. Penetration of smartphones and advances in nanoelectronics, cyber-physical systems, wireless communication, software, and Cloud computing technology will be the main drivers for IoT development. The IoT contribution is seen in the increased value of information created by the number of interconnections among things and the transformation of the processed information into knowledge shared into the Internet of Everything. The connected devices are part of ecosystems connecting people, processes, data, and things which are communicating in the Cloud using the increased storage and computing power while attempting to standardize communication and metadata. In this context, the next generation of Cloud computing technologies will need to be flexible enough to scale autonomously, adaptive enough to handle constantly changing connections and resilient enough to stand up to the huge flows of data that will occur. In 2025, analysts forecast that there will be six devices per human on the planet, which means around 50 billion more connected devices over the next 12 years. The Internet of Things market is connected to this anticipated device growth from industrial Machine to Machine (M2M) systems, smart meters and wireless sensors. Internet of Things technology will generate new services and new interfaces by creating smart environments and smart spaces with applications ranging from Smart Cities, Smart Transport, Buildings, Energy, Grid, to Smart Health and Life.
Author: Marton Varju
Publisher: Edward Elgar Publishing
Release Date: 2014-03-28
The European Union�s jurisprudence is responsible for a complex body of human rights law which pursues a busy, multi-tiered agenda and is essential for the lawful and the effective operation and development of the EU polity and its legal order. This in
Author: Olga Kuchinskaya
Publisher: MIT Press
Release Date: 2014-08-08
Genre: Political Science
Before Fukushima, the most notorious large-scale nuclear accident the world had seen was Chernobyl in 1986. The fallout from Chernobyl covered vast areas in the Northern Hemisphere, especially in Europe. Belarus, at the time a Soviet republic, suffered heavily: nearly a quarter of its territory was covered with long-lasting radionuclides. Yet the damage from the massive fallout was largely imperceptible; contaminated communities looked exactly like noncontaminated ones. It could be known only through constructed representations of it. In The Politics of Invisibility, Olga Kuchinskaya explores how we know what we know about Chernobyl, describing how the consequences of a nuclear accident were made invisible. Her analysis sheds valuable light on how we deal with other modern hazards -- toxins or global warming -- that are largely imperceptible to the human senses.Kuchinskaya describes the production of invisibility of Chernobyl's consequences in Belarus -- practices that limit public attention to radiation and make its health effects impossible to observe. Just as mitigating radiological contamination requires infrastructural solutions, she argues, the production and propagation of invisibility also involves infrastructural efforts, from redefining the scope and nature of the accident's consequences to reshaping research and protection practices. Kuchinskaya finds vast fluctuations in recognition, tracing varyingly successful efforts to conceal or reveal Chernobyl's consequences at different levels -- among affected populations, scientists, government, media, and international organizations. The production of invisibility, she argues, is a function of power relations.