找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data Protection and Privacy: (In)visibilities and Infrastructures; Ronald Leenes,Rosamunde Brakel,Paul Hert Book 2017 Springer Internation

[复制链接]
楼主: ALOOF
发表于 2025-3-23 10:38:52 | 显示全部楼层
发表于 2025-3-23 13:57:54 | 显示全部楼层
On the Road to Privacy- and Data Protection-Friendly Security Technologies in the Workplace – A Casedata protection regulation. In this paper, we use one MUSES component, namely the Real-Time Risk and Trust Analysis Engine (MUSES RT2AE), as a use case to study in which way privacy and data protection legislation limits the monitoring of employees through company security technologies.
发表于 2025-3-23 19:03:01 | 显示全部楼层
A Study on Corporate Compliance with Transparency Requirements of Data Protection Lawformation provided by companies. We found out that most companies do not transfer personal data without consent. Requirements on commercial e-mails are fulfilled as well. However, the situation of the right of access is much worse. Most information provided by companies is insufficient.
发表于 2025-3-24 01:13:43 | 显示全部楼层
Book 2017thors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud com
发表于 2025-3-24 04:03:36 | 显示全部楼层
Legal Fundamentalism: Is Data Protection Really a Fundamental Right?as been coined a fundamental right itself. The Charter of Fundamental Rights of the European Union grants citizens the right to privacy in Article 7 and the right to data protection in Article 8. The question is what this means and whether protecting personal data should in fact be qualified as ‘fundamental’.
发表于 2025-3-24 08:37:11 | 显示全部楼层
发表于 2025-3-24 11:04:27 | 显示全部楼层
Rod Hague,Martin Harrop,Shaun Breslinas been coined a fundamental right itself. The Charter of Fundamental Rights of the European Union grants citizens the right to privacy in Article 7 and the right to data protection in Article 8. The question is what this means and whether protecting personal data should in fact be qualified as ‘fundamental’.
发表于 2025-3-24 15:56:09 | 显示全部楼层
Human Hemostatic/Coagulation Mechanisms associated features. The resulting framework makes the key difference between privacy engineering for IoT systems targeting data controllers, data processors and associated integrators, and privacy engineering for IoT subsystems, targeting suppliers.
发表于 2025-3-24 21:00:28 | 显示全部楼层
发表于 2025-3-25 01:26:12 | 显示全部楼层
Meng-Hsuan Chou,Mari Elken,Jens Jungblutumber one cause for data breach incidents. The chapter uses a case study approach to extend the work and provide novel analysis of maladministration and its role as a leading cause of data breaches. Through these analyses we examine the extent of avoidability of such incidents and the crucial role o
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-23 09:46
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表