2011

Computers, Privacy and Data Protection: an Element of Choice

Editors:

ISBN: 978-94-007-0640-8 (Print) 978-94-007-0641-5 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xxiv

  2. Building And Rebuilding Legal Concepts For Privacy And Data Protection

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-23

      The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn’t It?)

    3. No Access

      Book Chapter

      Pages 25-38

      The Noise in the Archive: Oblivion in the Age of Total Recall

    4. No Access

      Book Chapter

      Pages 39-64

      Property in Personal Data: Second Life of an Old Idea in the Age of Cloud Computing, Chain Informatisation, and Ambient Intelligence

    5. No Access

      Book Chapter

      Pages 65-97

      Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization

  3. The Dark Side: Suspicions, Distrust And Surveillance

    1. Front Matter

      Pages 99-99

    2. No Access

      Book Chapter

      Pages 101-109

      Frames from the Life and Death of Jean Charles de Menezes

    3. No Access

      Book Chapter

      Pages 111-137

      Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden

    4. No Access

      Book Chapter

      Pages 139-169

      Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions

    5. No Access

      Book Chapter

      Pages 171-199

      EU PNR: European Flight Passengers Under General Suspicion – The Envisaged European Model of Analyzing Flight Passenger Data

    6. No Access

      Book Chapter

      Pages 201-207

      Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project “Open Trusted Computing”

  4. Privacy Practices As Vectors Of Reflection

    1. Front Matter

      Pages 209-209

    2. No Access

      Book Chapter

      Pages 211-231

      Keeping Up Appearances: Audience Segregation in Social Network Sites

    3. No Access

      Book Chapter

      Pages 233-250

      Avatars Out of Control: Gazira Babeli, Pose Balls and “Rape” in Second Life

    4. No Access

      Book Chapter

      Pages 251-268

      Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking

    5. No Access

      Book Chapter

      Pages 269-283

      Rise and Phall: Lessons from the Phorm Saga

    6. No Access

      Book Chapter

      Pages 285-307

      Disclosing or Protecting? Teenagers’ Online Self-Disclosure

    7. No Access

      Book Chapter

      Pages 309-341

      Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much Time

  5. Privacy And Data Protection In The Cloud

    1. Front Matter

      Pages 343-343

    2. No Access

      Book Chapter

      Pages 345-360

      Can a Cloud Be Really Secure? A Socratic Dialogue

    3. No Access

      Book Chapter

      Pages 361-376

      Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice

    4. No Access

      Book Chapter

      Pages 377-409

      Data Protection in the Clouds

    5. No Access

      Book Chapter

      Pages 411-426

      Privacy-Preserving Data Mining from Outsourced Databases

    6. No Access

      Book Chapter

      Pages 427-444

      Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study

previous Page of 2