000695904 000__ 04780cam\a2200433Ki\4500 000695904 001__ 695904 000695904 005__ 20230306135503.0 000695904 006__ m\\\\\o\\d\\\\\\\\ 000695904 007__ cr\cnu|||unuuu 000695904 008__ 131126s2014\\\\ne\a\\\\o\\\\\000\0\eng\d 000695904 020__ $$a9789400775404 $$qelectronic book 000695904 020__ $$a9400775407 $$qelectronic book 000695904 020__ $$z9789400775398 000695904 0247_ $$a10.1007/978-94-007-7540-4$$2doi 000695904 035__ $$aSP(OCoLC)ocn864184790 000695904 035__ $$aSP(OCoLC)864184790 000695904 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dN$T$$dYDXCP$$dCOO$$dVT2 000695904 049__ $$aISEA 000695904 050_4 $$aK3264.C65 000695904 08204 $$a343.09/99$$223 000695904 24500 $$aReloading data protection$$h[electronic resource] :$$bmultidisciplinary insights and contemporary challenges /$$cSerge Gutwirth, Ronald Leenes, Paul De Hert, editors. 000695904 264_1 $$aDordrecht :$$bSpringer,$$c2014. 000695904 300__ $$a1 online resource (xv, 369 pages) :$$billustrations (some color) 000695904 336__ $$atext$$btxt$$2rdacontent 000695904 337__ $$acomputer$$bc$$2rdamedia 000695904 338__ $$aonline resource$$bcr$$2rdacarrier 000695904 5050_ $$aForeword -- About the Authors -- Part 1: Data protection in the world : Brazil and Poland.-1. Data Protection in Brazil: New Developments and Current Challenges; Danilo Donedaand Laura Schertel Mendes -- 2. The effectiveness of redress mechanisms. Case study : Poland; Dorota Głowackaand Beata Konieczna -- Part 2: Forgetting and the right to be forgotten -- 3.Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice; Colin Bennett, Christopher Parsons and Adam Molnar -- 4. The EU, the US and the Right to be Forgotten; Paul Bernal -- 5. Stage ahoy! Deconstruction of the 'drunken pirate' case in the light of impression management; Paulan Korenhof.-Part 3: Surveillance and law enforcement.-6. New surveillance, new penology and new resistance: towards the criminalisation of resistance?; Antonella Galetta -- 7. Surveillance and Criminal Investigation: Blurring of Thresholds and Boundaries in the Criminal Justice System?; John Vervaele -- 8. Privatization of Information and the Data Protection Reform; Els De Busser -- 9. Quo vadis smart surveillance? Smart technologies combine and challenge democratic oversight; Marc Langheinrich, Rachel Finn, Vlad Coroamaand David Wright -- 10.Surveillance of Communications Data and Article 8 of the European Convention on Human Rights; Nora Ni Loideain -- Part 4: Understanding data protection and privacy -- 11. Realizing the Complexity of Data Protection; Marion Albers -- 12. Forgetting about consent. Why the focus should be on 'suitable safeguards' in data protection; Gabriela Zanfir.-13.'All my mates have got it, so it must be okay': Constructing a Richer Understanding of Privacy Concerns; Anthony Morton -- 14. Data mining and Its Paradoxical Relationship to the Purpose Limitation Principle; Liane Colonna.-15.The cost of using Facebook: Assigning value to privacy protection on social network sites against data mining, identity theft, and social conflict; Wouter Steijn -- 16. Strong Accountability: Beyond Vague Promises; Denis Butin, Marcos Chicote and Daniel Le Métayer. 000695904 506__ $$aAccess limited to authorized users. 000695904 520__ $$aThis volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important and much disputed, theme of the Computers, Privacy and Data Protection (CPDP) conferences : the surveillance, control and steering of individuals and groups of people and the increasing number of performing tools (data mining, profiling, convergence) to achieve those objectives. This part is illustrated by examples from the domain of law enforcement and smart surveillance. The book concludes with five chapters that advance our understanding of the changing nature of privacy (concerns) and data protection. 000695904 588__ $$aDescription based on online resource; title from PDF title page (SpringerLink, viewed November 4, 2013). 000695904 650_0 $$aData protection$$xLaw and legislation. 000695904 650_0 $$aPrivacy, Right of. 000695904 7001_ $$aGutwirth, Serge,$$eeditor of compilation. 000695904 7001_ $$aLeenes, Ronald,$$eeditor of compilation. 000695904 7001_ $$aHert, Paul de,$$eeditor of compilation. 000695904 85280 $$bebk$$hSpringerLink 000695904 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-94-007-7540-4$$zOnline Access 000695904 909CO $$ooai:library.usi.edu:695904$$pGLOBAL_SET 000695904 980__ $$aEBOOK 000695904 980__ $$aBIB 000695904 982__ $$aEbook 000695904 983__ $$aOnline 000695904 994__ $$a92$$bISE