Digital Privacy: Theory, Technologies, and Practices
While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According t...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1620 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1620 |
---|---|
record_format |
dspace |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental issues of concern for most Internet users, ranked higher than ease-of-use, spam, cost, and security.
Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. Editors Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, established researchers whose work enjoys worldwide recognition, draw on contributions from experts in academia, industry, and government to delineate theoretical, technical, and practical aspects of digital privacy. They provide an up-to-date, integrated approach to privacy issues that spells out what digital privacy is and covers the threats, rights, and provisions of the legal framework in terms of technical counter measures for the protection of an individual’s privacy. The work includes coverage of protocols, mechanisms, applications, architectures, systems, and experimental studies.
Even though the utilization of personal information can improve customer services, increase revenues, and lower business costs, it can be easily misused and lead to violations of privacy. Important legal, regulatory, and ethical issues have emerged, prompting the need for an urgent and consistent response by electronic societies. Currently there is no book available that combines such a wide range of privacy topics with such a stellar cast of contributors. Filling that void, Digital Privacy: Theory, Techniques, and Practices gives you the foundation for building effective and legal privacy protocols into your business processes. |
format |
Book |
author |
Acquisti, Alessandro Gritzalis, Stefanos |
spellingShingle |
Acquisti, Alessandro Gritzalis, Stefanos Digital Privacy: Theory, Technologies, and Practices |
author_facet |
Acquisti, Alessandro Gritzalis, Stefanos |
author_sort |
Acquisti, Alessandro |
title |
Digital Privacy: Theory, Technologies, and Practices |
title_short |
Digital Privacy: Theory, Technologies, and Practices |
title_full |
Digital Privacy: Theory, Technologies, and Practices |
title_fullStr |
Digital Privacy: Theory, Technologies, and Practices |
title_full_unstemmed |
Digital Privacy: Theory, Technologies, and Practices |
title_sort |
digital privacy: theory, technologies, and practices |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1620 |
_version_ |
1757663655352074240 |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-16202009-12-04T02:28:29Z Digital Privacy: Theory, Technologies, and Practices Acquisti, Alessandro Gritzalis, Stefanos While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental issues of concern for most Internet users, ranked higher than ease-of-use, spam, cost, and security. Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. Editors Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, established researchers whose work enjoys worldwide recognition, draw on contributions from experts in academia, industry, and government to delineate theoretical, technical, and practical aspects of digital privacy. They provide an up-to-date, integrated approach to privacy issues that spells out what digital privacy is and covers the threats, rights, and provisions of the legal framework in terms of technical counter measures for the protection of an individual’s privacy. The work includes coverage of protocols, mechanisms, applications, architectures, systems, and experimental studies. Even though the utilization of personal information can improve customer services, increase revenues, and lower business costs, it can be easily misused and lead to violations of privacy. Important legal, regulatory, and ethical issues have emerged, prompting the need for an urgent and consistent response by electronic societies. Currently there is no book available that combines such a wide range of privacy topics with such a stellar cast of contributors. Filling that void, Digital Privacy: Theory, Techniques, and Practices gives you the foundation for building effective and legal privacy protocols into your business processes. THE PRIVACY SPACE Privacy Enhancing Technologies for the Internet III: Ten Years Later, I. Goldberg Communication Privacy, A. Pfitzmann, A. Juschka, A.-K. Stange, S. Steinbrecher, and S. Köpsell, and Privacy-Preserving Cryptographic Protocols, M.J. Atallah and K.B. Frikken PRIVACY ATTACKS Byzantine Attacks on Anonymity Systems, N. Borisov, G. Danezis, and P. Tabriz Introducing Traffic Analysis, G. Danezis and R. Clayton Privacy, Profiling, Targeted Marketing, and Data Mining, J. Vaidya and V. Atluri PRIVACY ENHANCING TECHNOLOGIES Enterprise Privacy Policies and Languages, M. Backes and M. Dürmuth Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation, A. Narayanan and V. Shmatikov Privacy Protection with Uncertainty and Indistinguishability, X.S. Wang and S. Jajodia Privacy-Preserving Techniques in Data Mining, C. Su, J. Zhou, F. Bao, G. Wang, and K. Sakurai USER PRIVACY HCI Designs for Privacy-Enhancing Identity Management, S. Fischer-Hübner, J. Sören Pettersson, M. Bergmann, M. Hansen, S. Pearson, and M. Casassa Mont Privacy Perceptions among Members of Online Communities, M. Karyda and S. Kokolakis Perceived Control: Scales for Privacy in Ubiquitous Computing, S. Spiekermann PRIVACY UBIQUITOUS COMPUTING RFID: Technological Issues and Privacy Concerns, P. Nájera and J. Lopez Privacy of Location Information, C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp), J. Camp and K. Connelly THE ECONOMICS OF PRIVACY A Risk Model for Privacy Insurance, A.N. Yannacopoulos, S. Katsikas, S. Gritzalis, C. Lambrinoudakis, and S.Z. Xanthopoulos What Can Behavioral Economics Teach Us About Privacy? A. Acquisti and J. Grossklags PRIVACY AND POLICY Privacy of Outsourced Data, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, and P. Samarati Communications Data Retention: A Pandora’s Box for Rights and Liberties? L. Mitrou Surveillance of Emergent Associations: Freedom of Association in a Network Society, K.J. Strandburg 2009-12-04T02:28:29Z 2009-12-04T02:28:29Z 2007 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1620 en application/rar CRC Press |