Listing 1 - 10 of 19 | << page >> |
Sort by
|
Choose an application
Copyright --- Human rights --- Freedom of speech --- Freedom of expression --- Intellectual property --- Privacy, Right of --- Free speech --- Liberty of speech --- Speech, Freedom of --- Expression, Freedom of --- Free expression --- Liberty of expression --- Law and legislation --- Civil rights --- Assembly, Right of --- Freedom of information --- Intellectual freedom --- Copyright - Congresses --- Human rights - Congresses --- Freedom of speech - Congresses --- Freedom of expression - Congresses --- Intellectual property - Congresses --- Privacy, Right of - Congresses
Choose an application
Privacy, Right of --- Secrecy --- Confidential communications --- Law and legislation --- Concealment --- Communications, Confidential --- Confidential relationships --- Confidentiality --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Privacy --- Hiding places --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Personality (Law) --- Professional ethics --- Privacy, Right of - Congresses --- Secrecy - Law and legislation - Congresses --- Confidential communications - Congresses --- SECRET --- DROIT --- PHILOSOPHIE --- HISTOIRE
Choose an application
Cet ouvrage prend la mesure du phénomène actuel de médiatisation de la vie privée et en évalue les principaux enjeux. En effet, l'intime et le privé s'exposent de plus en plus, dans les différents médias (presse, télévision, Internet), ce qui n'est pas sans affecter le contenu même de ces notions. Ce qui n'est pas non plus sans conséquences sur la configuration de l'espace public ou les libertés individuelles. La porosité des frontières entre le privé et le public remet en cause les catégories toutes faites. Au moment où triomphe la téléréalité, il est certainement utile de penser le passage du secret et de la pudeur à un monde où tout peut se dire et se montrer. Depuis longtemps, comme l'a montré Richard Sennet, les hommes politiques sont soumis à une véritable tyrannie de l'intimité. L'analyse de leurs stratégies et de leurs jeux révèle une autre façon de faire de la politique et l'importance clé des activités de médiatisation personnelles. Même si la liberté d'information constitue un acquis démocratique fondamental, cette liberté doit s'arrêter au mur de la vie privée. Entre l'exigence de transparence et le respect de l'intimité, il n'y a pas à établir une hiérarchie mais à rechercher un juste équilibre et à recourir aux formes institutionnelles les plus adaptées pour y parvenir. L'approche est délibérément interdisciplinaire. Pour aborder l'ensemble de ces questions, il a été fait appel à la contribution de l'historien, du sociologue, du politologue, du juriste et du théoricien des médias.
Privacy --- Mass media --- Politicians --- Vie privée --- Médias --- Hommes politiques dans la presse --- Congresses --- Political aspects --- Moral and ethical aspects --- Press coverage --- Congrès --- Aspect politique --- Aspect moral --- Medias --- Droit a la vie privee --- Vie privée --- Médias --- Congrès --- Congresses. --- Privacy, Right of --- Social aspects --- Mass media - Moral and ethical aspects - Congresses --- Privacy, Right of - Congresses --- Mass media - Social aspects --- Library, Information & Communication sciences --- politique --- droit --- espace public --- liberté individuelle --- média
Choose an application
Web 2.0, DMP, RFID, " googleisation "... autant de néologismes et d'acronymes qui sont en train de devenir incontournables dans la société de l'information. Qu'il s'agisse d'offrir de nouveaux services aux usagers de la Toile ou bien de suivre leurs déplacements dans des réseaux moins virtuels, c'est d'un monde nouveau qu'il est question. Quelle est la place de l'individu dans cet univers ? Comment gérer les droits et libertés de ceux, de plus en plus nombreux, qui possèdent une ou plusieurs identités dans le monde internationalisé et dématérialisé des réseaux ? Plus fondamentalement encore, comment assurer leur sécurité dans des circuits informationnels qui ne se limiteront plus, demain, à des univers virtuels accessibles par le biais d'un écran mais envahiront les centres commerciaux, les rues, les domiciles mêmes des individus, tels que l'ubiquitous computing (informatique ubiquitaire) et la multiplication des caméras de surveillance l'annoncent. Quelle sécurité, demain, pour l'individu dans la société de l'information ? Des archivistes, informaticiens et juristes ont tenté d'apporter sur ces questions des éclairages propices à la réflexion, réunis dans cet ouvrage.
Privacy, Right of --- Data protection --- Medical records --- Virtual computer systems --- Biometric identification --- Droit à la vie privée --- Protection de l'information (Informatique) --- Dossiers médicaux --- Systèmes virtuels (Informatique) --- Identification biométrique --- Law and legislation --- Access control --- Droit --- Accès --- Contrôle --- Computers and civilization --- Congresses --- Droit à la vie privée --- Dossiers médicaux --- Systèmes virtuels (Informatique) --- Identification biométrique --- Accès --- Contrôle --- Privacy, Right of - Congresses --- Data protection - Congresses --- Computers and civilization - Congresses
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.
Computer security --- Congresses --- Data protection --- Privacy [Right of ] --- Privacy, Right of - Congresses. --- Computer security. --- Data encryption (Computer science). --- Computer Communication Networks. --- Computer science. --- Information Systems. --- Combinatorics. --- Systems and Data Security. --- Cryptology. --- Computers and Society. --- Management of Computing and Information Systems. --- Combinatorics --- Algebra --- Mathematical analysis --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Industrial and intellectual property --- Human rights --- Copyright --- Freedom of speech --- Freedom of expression --- Intellectual property --- Privacy, Right of --- Droit d'auteur --- Droits de l'homme (Droit international) --- Liberté d'expression --- Propriété intellectuelle --- Droit à la vie privée --- Liberté d'expression --- Propriété intellectuelle --- Droit à la vie privée --- Free speech --- Liberty of speech --- Speech, Freedom of --- Civil rights --- Assembly, Right of --- Freedom of information --- Intellectual freedom --- Expression, Freedom of --- Free expression --- Liberty of expression --- Law and legislation --- Copyright - Congresses --- Human rights - Congresses --- Freedom of speech - Congresses --- Freedom of expression - Congresses --- Intellectual property - Congresses --- Privacy, Right of - Congresses --- Droits de l'homme --- Droit comparé --- Droit à l'éducation --- Liberté d'information --- Etudes comparatives --- Droit comparé --- Droit à l'éducation --- Liberté d'information
Choose an application
Computer security --- Data protection --- Privacy, Right of --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Algorism --- Algebra --- Arithmetic --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Communication systems --- Distributed processing --- Computer security - Congresses --- Data protection - Congresses --- Privacy, Right of - Congresses --- Data encryption (Computer science) --- Computer networks. --- Operating systems (Computers)
Choose an application
Computer security -- Congresses. --- Data protection -- Congresses. --- Privacy, Right of -- Congresses. --- Computer security --- Data protection --- Privacy, Right of --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computer software. --- Cryptology. --- Algorism --- Algebra --- Arithmetic --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Foundations --- Operating systems --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.
Data protection -- Law and legislation -- Congresses. --- Data protection -- Law and legislation. --- Data security. --- Privacy, Right of -- Congresses. --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Computer crimes --- Data protection --- Law and legislation --- Computer science. --- Computers and civilization. --- International law. --- Intellectual property --- Computer Science. --- Computers and Society. --- International IT and Media Law, Intellectual Property Law. --- Criminology and Criminal Justice, general. --- Law and legislation. --- Computer security --- Privacy --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Social psychology --- Secrecy --- Solitude --- Protection --- Security measures --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Mass media --- Criminology. --- IT Law, Media Law, Intellectual Property. --- Social sciences --- Criminals --- Informatics --- Science --- Study and teaching --- Mass media. --- Law. --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Mass communication --- Media, Mass --- Media, The --- Communication --- Civilization and computers --- Civilization
Choose an application
One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe’s most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.
Data protection -- Law and legislation -- Congresses. --- Data protection -- Law and legislation. --- Privacy, Right of -- Congresses. --- Data protection --- Privacy, Right of --- Law, Politics & Government --- Human Rights --- Law and legislation --- Data protection. --- Privacy, Right of. --- Invasion of privacy --- Right of privacy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Law. --- Political science. --- Science. --- Public international law. --- Criminology. --- Public International Law. --- Philosophy of Law. --- Science, general. --- Political Science. --- Criminology & Criminal Justice. --- Crime --- Social sciences --- Criminals --- Law of nations --- Nations, Law of --- Public international law --- Law --- Natural science --- Science of science --- Sciences --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- State, The --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Study and teaching --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Electronic data processing --- Philosophy of law. --- Public International Law . --- Science, Humanities and Social Sciences, multidisciplinary. --- Criminology and Criminal Justice, general.
Listing 1 - 10 of 19 | << page >> |
Sort by
|