Data Protection and Privacy: (In)visibilities and Infrastructures

ISBN: 978-3-319-56177-6 (Print) 978-3-319-50796-5 (Online)

Table of contents (11 chapters)

  1. Front Matter

    Pages i-xxiv

  2. Fundamental and Legal Questions

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-30

      Legal Fundamentalism: Is Data Protection Really a Fundamental Right?

    3. No Access

      Chapter

      Pages 31-57

      Is There a Right to Offline Alternatives in a Digital World?

    4. No Access

      Chapter

      Pages 59-78

      What Is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges on Sharing and Control in IoT

  3. Concepts and Tools

    1. Front Matter

      Pages 79-79

    2. No Access

      Chapter

      Pages 81-106

      Towards a Code of Conduct on Privacy for mHealth to Foster Trust Amongst Users of Mobile Health Applications

    3. No Access

      Chapter

      Pages 107-137

      Minimum Harm by Design: Reworking Privacy by Design to Mitigate the Risks of Surveillance

    4. No Access

      Chapter

      Pages 139-161

      A Purpose-Based Taxonomy for Better Governance of Personal Data in the Internet of Things Era: The Example of Wellness Data

    5. No Access

      Chapter

      Pages 163-202

      A Privacy Engineering Framework for the Internet of Things

  4. Case Studies

    1. Front Matter

      Pages 203-203

    2. No Access

      Chapter

      Pages 205-239

      Dangers from Within? Looking Inwards at the Role of Maladministration as the Leading Cause of Health Data Breaches in the UK

    3. No Access

      Chapter

      Pages 241-269

      On the Road to Privacy- and Data Protection-Friendly Security Technologies in the Workplace – A Case-Study of the MUSES Risk and Trust Analysis Engine

    4. No Access

      Chapter

      Pages 271-289

      A Study on Corporate Compliance with Transparency Requirements of Data Protection Law

  5. Closing

    1. Front Matter

      Pages 291-291

    2. No Access

      Chapter

      Pages 293-295

      Closing remarks: 9th International Computers, Privacy and Data Protection Conference