cortex 发表于 2025-3-26 21:59:52

Levelling up: Data Privacy and the European Court of Human Rightseristics are protected by Article 8 of the European Convention on Human Rights. On the level of European policy, and particularly in the UK, the pendulum has swung strongly towards permitting intrusive techniques for data acquisition and retention at the expense of data privacy rights. However, the

laxative 发表于 2025-3-27 03:56:25

Responding to the Inevitable Outcomes of Profiling: Recent Lessons from Consumer Financial Markets, y cases make their way to the media and from there to relevant regulators. These latter entities, in turn, struggle in search of a proper regulatory response to the complicated issues set before them. Profiling presents a policy challenge which is indeed frequently invoked and discussed. However, bo

热情的我 发表于 2025-3-27 07:22:56

http://reply.papertrans.cn/27/2631/263023/263023_33.png

nutrients 发表于 2025-3-27 13:13:05

From Unsolicited Communications to Unsolicited Adjustmentss for privacy protection, constantly backed up by the European Union (EU) legislator for already more than a decade, is the regulation of so-called unsolicited communications. This contribution explores this EU approach and argues that, in the light of current and upcoming developments, a profound r

额外的事 发表于 2025-3-27 17:00:29

Facebook and Risks of “De-contextualization” of Informationk and Myspace but also Frienster, WAYN, Bebo, Google’s Orkut and many others have millions of registered active users and are continuously growing. The most common model of such sites is based on the presentation of the participants’ profiles and the visualisation of their network of relations to ot

责任 发表于 2025-3-27 18:16:39

Surveillance in Germany: Strategies and Counterstrategiese dimensions culminated in Germany, when three new technical surveillance measures became subject of respective rulings of the German Federal Constitutional Court, who seized the opportunity to significantly develop the German fundamental rights system in regard to new technological developments. Wh

违法事实 发表于 2025-3-28 01:53:16

Verifiability of Electronic Voting: Between Confidence and Trustthat it should not be necessary to trust e-voting systems, which would be the case if they are provably secure. Second, for an e-voting system to be successful, the public must trust it. When we unravel the confusing concept of trust, we find that there are two quite different meanings: relying on s

geometrician 发表于 2025-3-28 03:15:44

The Case of the 2008 German–US Agreement on Data Exchange: An Opportunity to Reshape Power Relationse an international scope, and they are rooted in international agreements. These agreements usually seek to extend abroad a range of specific, internal security measures. This chapter aims at studying the position of relevant actors and their capacity to increase their power or to quell resistance d

充足 发表于 2025-3-28 08:03:42

http://reply.papertrans.cn/27/2631/263023/263023_39.png

Exterior 发表于 2025-3-28 12:41:48

http://reply.papertrans.cn/27/2631/263023/263023_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Data Protection in a Profiled World; Serge Gutwirth,Yves Poullet,Paul De Hert Book 2010 Springer Science+Business Media B.V. 2010 Consume.