|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Marit Hansen , Jaap-Henk Hoepman , Ronald Leenes , Diane WhitehousePublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: Softcover reprint of the original 1st ed. 2014 Volume: 421 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 4.044kg ISBN: 9783662525722ISBN 10: 3662525720 Pages: 249 Publication Date: 03 September 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsTwo of the Grand Changes through Computer and Network Technology.- The Draft Data Protection Regulation and the Development of Data Processing Applications.- Privacy Management and Accountability in Global Organisations.- Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical.- Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond.- How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?.- Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off.- Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference Models.- Forgetting Bits and Pieces: An Exploration of the ”Right to Be Forgotten” as Implementation of ”Forgetting” in Online Memory Processes.- An Advanced, Privacy-Friendly Loyalty System.- Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions.- Problem-Based Consideration of Privacy-Relevant Domain Knowledge.- Extending Signatures of Reputation.- Preserving Privacy in Production.- User Search with Knowledge Thresholds in Decentralized Online Social Networks.- An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information.- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case.- Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools.- Mobile Devices to the Identity Rescue.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |