Narrow your search

Library

Odisee (40)

Thomas More Kempen (40)

Thomas More Mechelen (40)

UCLL (40)

VIVES (40)

KU Leuven (37)

ULB (30)

ULiège (29)

LUCA School of Arts (13)

KBC (11)

More...

Resource type

book (40)

digital (1)


Language

English (40)


Year
From To Submit

2023 (10)

2021 (2)

2020 (5)

2019 (1)

2018 (3)

More...
Listing 1 - 10 of 40 << page
of 4
>>
Sort by
Protecting privacy in surveillance societies : the Federal Republic of Germany, Sweden, France, Canada, and the United States
Author:
ISBN: 0807818712 9780807818718 0807843520 1469620820 9798890864628 9781469620824 Year: 1989 Publisher: Chapel Hill, North Carolina : University of North Carolina Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States


Book
The fundamental right to data protection : normative value in the context of counter-terrorism surveillance
Author:
ISBN: 9781509901678 9781509901685 9781509901692 1509901671 150990168X 9781509901708 1509901701 1509901698 Year: 2017 Volume: 71 Publisher: Oxford [UK] ; Portland, Oregon : Hart Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the entry into force of the Lisbon Treaty, data protection has been elevated to the status of a fundamental right in the European Union and is now enshrined in the EU Charter of Fundamental Rights alongside the right to privacy. This timely book investigates the normative significance of data protection as a fundamental right in the EU. The first part of the book examines the scope, the content and the capabilities of data protection as a fundamental right to resolve problems and to provide for an effective protection. It discusses the current approaches to this right in the legal scholarship and the case-law and identifies the limitations that prevent it from having an added value of its own. It suggests a theory of data protection that reconstructs the understanding of this right and could guide courts and legislators on data protection issues. The second part of the book goes on to empirically test the reconstructed right to data protection in four case-studies of counter-terrorism surveillance: communications metadata, travel data, financial data and Internet data surveillance. The book will be of interest to academics, students, policy-makers and practitioners in EU law, privacy, data protection, counter-terrorism and human rights law


Book
EU General Data Protection Regulation (GDPR) : An implementation and compliance guide
Author:
ISBN: 1787782492 1523136472 1787782484 1787782506 9781787782488 9781787782488 9781787782518 1787782514 9781787782501 9781523136476 9781787782495 Year: 2020 Publisher: Ely, Cambridgeshire : IT Governance Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Data Protection in a Post-Pandemic Society : Laws, Regulations, Best Practices and Recent Solutions
Authors: --- ---
ISBN: 303134006X 3031340051 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g., Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference. .

Negotiating privacy : the European Union, the United States, and personal data protection
Author:
ISBN: 1588263800 1626370079 9781626370074 9781588263803 Year: 2005 Publisher: Boulder, Colorado ; London, [England] : Lynne Rienner Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

How did the European Union come to be the global leader in setting data privacy standards? And what is the significance of this development? Dorothee Heisenberg traces the origins of the stringent EU privacy laws, the responses of the United States and other governments, and the reactions and concerns of a range of interest groups. Analyzing the negotiation of the original 1995 EU Data Protection Directive, the 2000 Safe Harbor Agreement, and the 2004 Passenger Name Record Agreement, Heisenberg shows that the degree to which business vs. consumer interests were factored into governments' positions was the source not only of U.S.-EU conflicts, but also of their resolution. She finds, too, that public opinion in Europe and the U.S. has been remarkably similar--and thus cannot account for official U.S. reaction to the issues raised by the EU privacy directive. More broadly, Negotiating Privacy sheds important light on both the relationship between the U.S. and the EU and the relationship between domestic issues and the development of international rules.


Book
Protectors of Privacy : Regulating Personal Data in the Global Economy
Author:
ISBN: 9780801445491 0801445493 1501729217 Year: 2018 Publisher: Ithaca, NY : Cornell University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.


Multi
Essential law for information professionals
Author:
ISBN: 9781783304356 9781783304370 9781783304363 1783304359 1783304367 1783304375 Year: 2019 Publisher: London : Facet,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Essential Law for Information Professionals, fourth edition, provides up-to-date and easy-to-follow practical guidance on the law as it affects information management and the principles underlying practice. Using individual cases to illustrate these core principles and contextualise regulations, it cuts through the legalese to provide exactly what's needed in an easily digestible format showing examples of how the law has worked in practice in specific legal cases. The book gives readers the tools to quickly assess legal hazards and identify solutions.

Information law is a particularly fast moving area of law. In the eight years that have passed since the best-selling third edition was published, there have been many changes to the legislation and numerous legal cases which have further developed our understanding of the law. The fourth edition fully reflects those changes, which include:

  • a new chapter on library law which covers the legal framework for libraries (concentrating on legislation and soft law relevant to libraries)
  • implementation of the GDPR through the Data Protection Act 2018
  • a major overhaul of the copyright exceptions, and the 2018 implementation of the Marrakesh Treaty
  • the Re-Use of Public Sector Information Regulations 2015 and the implications of the 2018 proposals for a new re-use directive
  • extension of the public lending right scheme to e-books
  • CILIP's ethical framework.

Readership: Essential Law for Information Professionals is an essential guide for anyone working in the information professions. It is also the ideal legal textbook for students of information studies and librarianship.


Book
Protectors of Privacy
Author:
ISBN: 1501729217 9781501729218 0801445493 9780801445491 Year: 2018 Publisher: Ithaca, NY

Loading...
Export citation

Choose an application

Bookmark

Abstract

From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.


Book
Cognitive Security : A System-Scientific Approach
Authors: ---
ISBN: 3031307097 3031307089 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker’s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields.


Book
Autonomous Intelligent Cyber Defense Agent (AICA) : A Comprehensive Guide
Authors: ---
ISBN: 3031292693 3031292685 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. Today’s cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they don’t plan and execute recovery activities. Response and recovery – core elements of cyber resilience – are left to human cyber analysts, incident responders and system administrators. This is about to change. The authors advocate this vision, provide detailed guide to how such a vision can be realized in practice, and its current state of the art. This book also covers key topics relevant to the field, including functional requirements and alternative architectures of AICA, how it perceives and understands threats and the overall situation, how it plans and executes response and recovery, how it survives threats, and how human operators deploy and control AICA. Additionally, this book covers issues of testing, risk, and policy pertinent to AICA, and provides a roadmap towards future R&D in this field. This book targets researchers and advanced students in the field of cyber defense and resilience. Professionals working in this field as well as developers of practical products for cyber autonomy will also want to purchase this book.

Listing 1 - 10 of 40 << page
of 4
>>
Sort by