default search action
Computers, Privacy and Data Protection 2011
- Serge Gutwirth, Yves Poullet, Paul de Hert, Ronald Leenes:
Computers, Privacy and Data Protection: an Element of Choice. Springer 2011, ISBN 978-94-007-0640-8
Building And Rebuilding Legal Concepts For Privacy And Data Protection
- Katja De Vries, Rocco Bellanova, Paul de Hert, Serge Gutwirth:
The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?). 3-23 - Jean-François Blanchette:
The Noise in the Archive: Oblivion in the Age of Total Recall. 25-38 - Nadezhda Purtova:
Property in Personal Data: Second Life of an Old Idea in the Age of Cloud Computing, Chain Informatisation, and Ambient Intelligence. 39-64 - Norberto Nuno Gomes de Andrade:
Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization. 65-97
The Dark Side: Suspicions, Distrust And Surveillance
- Amos Bianchi, Denis J. Roio:
Frames from the Life and Death of Jean Charles de Menezes. 101-109 - Christel Backman:
Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden. 111-137 - Johann Cas:
Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions. 139-169 - Franziska Boehm:
EU PNR: European Flight Passengers Under General Suspicion - The Envisaged European Model of Analyzing Flight Passenger Data. 171-199 - Arnd Weber, Dirk Weber:
Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing". 201-207
Privacy Practices As Vectors Of Reflection
- Bibi van den Berg, Ronald Leenes:
Keeping Up Appearances: Audience Segregation in Social Network Sites. 211-231 - Katja De Vries:
Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second Life. 233-250 - Fadhila Mazanderani, Ian Brown:
Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking. 251-268 - Paul Bernal:
Rise and Phall: Lessons from the Phorm Saga. 269-283 - Michel Walrave, Wannes Heirman:
Disclosing or Protecting? Teenagers' Online Self-Disclosure. 285-307 - John J. Borking:
Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much Time. 309-341
Privacy And Data Protection In The Cloud
- Gurpreet Dhillon, Ella Kolkowska:
Can a Cloud Be Really Secure? A Socratic Dialogue. 345-360 - Joep Ruiter, Martijn Warnier:
Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice. 361-376 - Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gérard, Claire Gayrel:
Data Protection in the Clouds. 377-409 - Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-Preserving Data Mining from Outsourced Databases. 411-426 - Valentina Casola, Raffaele Lettiero, Massimiliano Rak, Umberto Villano:
Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study. 427-444 - Wolter Pieters:
Security and Privacy in the Clouds: A Bird's Eye View. 445-457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.