眼界 发表于 2025-3-28 16:13:30

Anonymity: A Comparison Between the Legal and Computer Science Perspectiveswe compare the different notions of anonymity provided in the European data protection Law with the formal models proposed in Computer Science. This analysis allows us to identify the main similarities and differences between the two points of view, hence highlighting the need for a joint research effort.

非秘密 发表于 2025-3-28 19:01:32

Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Tree for their implications on privacy and future research in the field. The ultimate goal is to foster cross-disciplinary discussion on the requirements and limits of Position PETs in the light of emerging privacy demands and on-going research.

协迫 发表于 2025-3-29 00:59:19

http://reply.papertrans.cn/32/3168/316753/316753_43.png

airborne 发表于 2025-3-29 06:06:14

Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposeson between control and investigation. Practical examples are provided through three case studies, and a number of procedural improvements are suggested to reduce the potentially intimidating character of the practices.

榨取 发表于 2025-3-29 07:52:42

http://reply.papertrans.cn/32/3168/316753/316753_45.png

Morphine 发表于 2025-3-29 14:52:13

Privacy by Design Through a Social Requirements Analysis of Social Network Sites form a User Perspecuser perspective. For this, one of the application domains of privacy by design, the seven laws of identity proposed by Kim Cameron, is assessed and adjusted. This should help to mitigate the responsibilization of individuals who use or are affected by social networking services.

handle 发表于 2025-3-29 17:18:45

http://reply.papertrans.cn/32/3168/316753/316753_47.png

Rodent 发表于 2025-3-29 22:00:52

http://reply.papertrans.cn/32/3168/316753/316753_48.png

尖酸一点 发表于 2025-3-30 03:19:26

http://reply.papertrans.cn/32/3168/316753/316753_49.png

压碎 发表于 2025-3-30 04:54:12

https://doi.org/10.1007/978-3-322-98864-5hese modes of enacting autonomy is important in order to prevent ICT for older people from getting trapped either in excessive proceduralised mechanisms or in coercive care practices that may disregard the autonomy of older people.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: European Data Protection: Coming of Age; Serge Gutwirth,Ronald Leenes,Yves Poullet Book 2013 Springer Science+Business Media Dordrecht 201