Narrow your search

Library

KU Leuven (4703)

ULiège (4280)

Odisee (3597)

VIVES (3578)

Thomas More Mechelen (3561)

Thomas More Kempen (3556)

ULB (3551)

UCLL (3503)

UGent (2593)

KBC (1415)

More...

Resource type

book (6222)

periodical (141)

digital (39)

undetermined (24)

dissertation (15)

More...

Language

English (5698)

French (345)

German (189)

Dutch (98)

Spanish (21)

More...

Year
From To Submit

2024 (80)

2023 (301)

2022 (321)

2021 (375)

2020 (415)

More...
Listing 1 - 10 of 6395 << page
of 640
>>
Sort by

Book
Problemas legislativos de la protección de datos : conferencia Internacional, Madrid, 11-13 Junio 1984
Authors: ---
ISBN: 9788474710700 8474710707 Year: 1986 Publisher: [Madrid]: Servicio central de publicaciones,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
EC data protection directive : interpretation, application, transposition : working conference
Author:
ISBN: 9783878200949 3878200943 Year: 1997 Publisher: Darmstadt: STMV,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Bundesdatenschutzgesetz : (BDSG) : mit Landesdatenschutzgesetzen und internationalen Vorschriften : Textausgabe
Authors: --- ---
ISBN: 9783789023538 3789023531 Year: 1991 Publisher: Baden-Baden: Nomos,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
2014 International Symposium on Biometrics and Security Technologies (ISBAST) : 26-27 Aug. 2014, Kuala Lumpur, Malaysia
Author:
ISBN: 1479964433 147996445X 1479964441 Year: 2014 Publisher: Piscataway, New Jersey : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Biometric and security technologies are the key components for providing reliable solution against cyber terrorism or damage in order to improve the nation safety Biometric provides methods to identify the uniqueness of each individual identity Therefore with biometric solution, scientists are able to determine ways to accurately identify people based upon their physical and behavioral characteristics However, improvements in biometric equipment, interoperability and database accuracy are crucial for nation safety This is also applied for other security technology solutions ISBAST2014 provides researchers with an excellent platform for dissemination of latest research findings and the state of practice in the areas of biometric and security technologies This conference covers areas such as biometric, forensic, cloud computing, network security and cybersecurity However, the scope is not limited to the aforementioned areas ISBAST2014 enables participants to learn the latest tre.

Keywords

Data protection


Book
2015 International Conference on Information Systems Security and Privacy (ICISSP)
Author:
ISBN: 1467384054 9897581359 Year: 2015 Publisher: Piscataway, New Jersey : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on.

Keywords

Data protection


Book
7002-2022 - IEEE Standard for Data Privacy Process
Author:
ISBN: 1504484525 Year: 2022 Publisher: New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The requirements for a systems/software engineering process for privacy-oriented considerations regarding products, services, and systems utilizing employee, customer, or other external user's personal data are defined by this standard. Organizations and projects that are developing and deploying products, systems, processes, and applications that involve personal information are candidate users of the IEEE Std 7002™ standard. Specific procedures, diagrams, and checklists are provided for users of the IEEE Std 7002 standard to perform conformity assessments on their specific privacy practices. Privacy impact assessments (PIAs) are described as a tool for both identifying where privacy controls and measures are needed and for confirming they are in place.

Keywords

Data protection.


Book
Security and Privacy: Proceedings, 1999: IEEE Symposium on Security and Privacy (1999: Oakland, CA)
Author:
Year: 1999 Publisher: [Place of publication not identified] IEEE Computer Society Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

This text covers the 1999 IEEE Symposium on Security and Privacy in Computing. The papers are aimed at researchers, professors, practitioners, students, and other computing professionals.

Keywords

Data protection


Book
Cybersecurity Threats with New Perspectives
Author:
Year: 2021 Publisher: London : IntechOpen,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity is an active and important area of study, practice, and research today. It spans various fields including cyber terrorism, cyber warfare, electronic civil disobedience, governance and security, hacking and hacktivism, information management and security, internet and controls, law enforcement, national security, privacy, protection of society and the rights of the individual, social engineering, terrorism, and more. This book compiles original and innovative findings on issues relating to cybersecurity and threats. This comprehensive reference explores the developments, methods, approaches, and surveys of cyber threats and security in a wide variety of fields and endeavors. It specifically focuses on cyber threats, cyberattacks, cyber techniques, artificial intelligence, cyber threat actors, and other related cyber issues. The book provides researchers, practitioners, academicians, military professionals, government officials, and other industry professionals with an in-depth discussion of the state-of-the-art advances in the field of cybersecurity.

Keywords

Data protection.


Book
GDPR made simple( r) for SMEs
Author:
Year: 2021 Publisher: Brussels : ASP editions - Academic and Scientific Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This user-friendly Handbook offers guidance and practical suggestions for small and medium-sized enterprises (SMEs) that could facilitate compliance with the General Data Protection Regulation (GDPR). Being primarily addressed to enterprises for which personal data processing is an auxiliary activity, the Handbook explains how to navigate the barrage of resources available on GDPR. In doing so it provides an overview of the main actors in the European data protection landscape. It also clarifies the scope of data protection law and the scope of its application to SMEs. The Handbook introduces concepts and principles that form the crux of personal data protection legal framework and then it unpacks the theory and practice of the risk-based approach to personal data protection. The Handbook seeks to go beyond a mere description of GDPR provisions and obligations stemming from them. It includes a set of proactive measures that were put forward by European DPAs and bodies. In addition, it provides references to other publicly available (open access) resources that also provide practical suggestions.

Keywords

Data protection.


Book
Private Daten
Author:
Year: 2021 Publisher: Bielefeld : Transcript Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demokratische Gesellschaft, die es zu verstehen gilt. Barbara Wiesner stellt Aspekte der Verarbeitung von privaten Daten vor, die Laien selten bekannt sind. Dabei orientiert sie sich an Zitaten von Persönlichkeiten aus Wirtschaft, Wissenschaft und Politik und regt dazu an, sich eine eigene Meinung zu bilden. So wird das Thema Privatheit vor dem Hintergrund vielfältiger digitaler Datenkanäle ausgeleuchtet.

Keywords

Data protection.

Listing 1 - 10 of 6395 << page
of 640
>>
Sort by