Serge Gutwirth Michael Friedewald Elena Vildjiounaite
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h304310755/fulltext.pdf
This book is a warning. It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI).
In the near future, every manufactured product - our clothes, money, appliances, the paint on our walls, the...
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h3...
In the eyes of many, one of the most challenging problems of the information society is that we are faced with an ever expanding mass of information. Selection of the relevant bits of information seems to become more important than the retrieval of data as such: the information is all out there, but what it means and how we should act on it may be one of the big questions of the 21st century. If an information society is a society with an exponential proliferation of data, a knowledge society must be the one that has learned how to cope with this. Profiling technologies seem to be one of the...
In the eyes of many, one of the most challenging problems of the information society is that we are faced with an ever expanding mass of information. ...
data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen utilizing the full potential of what ICT-technology has to offer seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one...
data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, business...
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h304310755/fulltext.pdf
This book is a warning. It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI).
In the near future, every manufactured product - our clothes, money, appliances, the paint on our walls, the...
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h3...
This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR), and the judicial and political resistance against data retention.
This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view of the Data Protection Dire...
The articles collected in this volume point out that society as a whole is changing. Social change is due not only to changes in technology and economy, but also to the changing strategies and discourses of social scientists. To what exactly will this change lead in the 21st century? What kind of society lies ahead? In this book the reader will find many arguments and hints pertaining to these questions. She/he will be confronted by a plethora of enriching conceptions of the relationships between social sciences and social changes.
The articles collected in this volume point out that society as a whole is changing. Social change is due not only to changes in technology and econom...
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h304310755/fulltext.pdf
This book is a warning. It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI).
In the near future, every manufactured product - our clothes, money, appliances, the paint on our walls, the...
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h3...
Although Europe has a significant legal data protection framework, built up around EU Directive 95/46/EC and the Charter of Fundamental Rights, the question of whether data protection and its legal framework are 'in good health' is increasingly being posed. Advanced technologies raise fundamental issues regarding key concepts of data protection. Falling storage prices, increasing chips performance, the fact that technology is becoming increasingly embedded and ubiquitous, the convergence of technologies and other technological developments are broadening the scope and possibilities of...
Although Europe has a significant legal data protection framework, built up around EU Directive 95/46/EC and the Charter of Fundamental Rights, the...
On 25 January 2012, the European Commission presented its long awaited new "Data protection package." With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites...
On 25 January 2012, the European Commission presented its long awaited new "Data protection package." With this proposal for a drastic revision of ...
This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014.
The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms...
This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. I...