Digital Privacy: Theory, Technologies, and Practices

While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According t...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Acquisti, Alessandro, Gritzalis, Stefanos
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1620
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1620
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental issues of concern for most Internet users, ranked higher than ease-of-use, spam, cost, and security. Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. Editors Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, established researchers whose work enjoys worldwide recognition, draw on contributions from experts in academia, industry, and government to delineate theoretical, technical, and practical aspects of digital privacy. They provide an up-to-date, integrated approach to privacy issues that spells out what digital privacy is and covers the threats, rights, and provisions of the legal framework in terms of technical counter measures for the protection of an individual’s privacy. The work includes coverage of protocols, mechanisms, applications, architectures, systems, and experimental studies. Even though the utilization of personal information can improve customer services, increase revenues, and lower business costs, it can be easily misused and lead to violations of privacy. Important legal, regulatory, and ethical issues have emerged, prompting the need for an urgent and consistent response by electronic societies. Currently there is no book available that combines such a wide range of privacy topics with such a stellar cast of contributors. Filling that void, Digital Privacy: Theory, Techniques, and Practices gives you the foundation for building effective and legal privacy protocols into your business processes.
format Book
author Acquisti, Alessandro
Gritzalis, Stefanos
spellingShingle Acquisti, Alessandro
Gritzalis, Stefanos
Digital Privacy: Theory, Technologies, and Practices
author_facet Acquisti, Alessandro
Gritzalis, Stefanos
author_sort Acquisti, Alessandro
title Digital Privacy: Theory, Technologies, and Practices
title_short Digital Privacy: Theory, Technologies, and Practices
title_full Digital Privacy: Theory, Technologies, and Practices
title_fullStr Digital Privacy: Theory, Technologies, and Practices
title_full_unstemmed Digital Privacy: Theory, Technologies, and Practices
title_sort digital privacy: theory, technologies, and practices
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1620
_version_ 1757663655352074240
spelling oai:scholar.dlu.edu.vn:DLU123456789-16202009-12-04T02:28:29Z Digital Privacy: Theory, Technologies, and Practices Acquisti, Alessandro Gritzalis, Stefanos While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental issues of concern for most Internet users, ranked higher than ease-of-use, spam, cost, and security. Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. Editors Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, established researchers whose work enjoys worldwide recognition, draw on contributions from experts in academia, industry, and government to delineate theoretical, technical, and practical aspects of digital privacy. They provide an up-to-date, integrated approach to privacy issues that spells out what digital privacy is and covers the threats, rights, and provisions of the legal framework in terms of technical counter measures for the protection of an individual’s privacy. The work includes coverage of protocols, mechanisms, applications, architectures, systems, and experimental studies. Even though the utilization of personal information can improve customer services, increase revenues, and lower business costs, it can be easily misused and lead to violations of privacy. Important legal, regulatory, and ethical issues have emerged, prompting the need for an urgent and consistent response by electronic societies. Currently there is no book available that combines such a wide range of privacy topics with such a stellar cast of contributors. Filling that void, Digital Privacy: Theory, Techniques, and Practices gives you the foundation for building effective and legal privacy protocols into your business processes. THE PRIVACY SPACE Privacy Enhancing Technologies for the Internet III: Ten Years Later, I. Goldberg Communication Privacy, A. Pfitzmann, A. Juschka, A.-K. Stange, S. Steinbrecher, and S. Köpsell, and Privacy-Preserving Cryptographic Protocols, M.J. Atallah and K.B. Frikken PRIVACY ATTACKS Byzantine Attacks on Anonymity Systems, N. Borisov, G. Danezis, and P. Tabriz Introducing Traffic Analysis, G. Danezis and R. Clayton Privacy, Profiling, Targeted Marketing, and Data Mining, J. Vaidya and V. Atluri PRIVACY ENHANCING TECHNOLOGIES Enterprise Privacy Policies and Languages, M. Backes and M. Dürmuth Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation, A. Narayanan and V. Shmatikov Privacy Protection with Uncertainty and Indistinguishability, X.S. Wang and S. Jajodia Privacy-Preserving Techniques in Data Mining, C. Su, J. Zhou, F. Bao, G. Wang, and K. Sakurai USER PRIVACY HCI Designs for Privacy-Enhancing Identity Management, S. Fischer-Hübner, J. Sören Pettersson, M. Bergmann, M. Hansen, S. Pearson, and M. Casassa Mont Privacy Perceptions among Members of Online Communities, M. Karyda and S. Kokolakis Perceived Control: Scales for Privacy in Ubiquitous Computing, S. Spiekermann PRIVACY UBIQUITOUS COMPUTING RFID: Technological Issues and Privacy Concerns, P. Nájera and J. Lopez Privacy of Location Information, C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp), J. Camp and K. Connelly THE ECONOMICS OF PRIVACY A Risk Model for Privacy Insurance, A.N. Yannacopoulos, S. Katsikas, S. Gritzalis, C. Lambrinoudakis, and S.Z. Xanthopoulos What Can Behavioral Economics Teach Us About Privacy? A. Acquisti and J. Grossklags PRIVACY AND POLICY Privacy of Outsourced Data, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, and P. Samarati Communications Data Retention: A Pandora’s Box for Rights and Liberties? L. Mitrou Surveillance of Emergent Associations: Freedom of Association in a Network Society, K.J. Strandburg 2009-12-04T02:28:29Z 2009-12-04T02:28:29Z 2007 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1620 en application/rar CRC Press