000739259 000__ 04411cam\a2200577Mi\4500 000739259 001__ 739259 000739259 005__ 20230306141256.0 000739259 006__ m\\\\\o\\d\\\\\\\\ 000739259 007__ cr\nn\nnnunnun 000739259 008__ 151013s2015\\\\sz\a\\\\o\\\\\001\0\eng\d 000739259 020__ $$a9783319084701$$qelectronic book 000739259 020__ $$a3319084704$$qelectronic book 000739259 020__ $$z9783319084695 000739259 020__ $$z3319084690 000739259 0247_ $$a10.1007/978-3-319-08470-1$$2doi 000739259 035__ $$aSP(OCoLC)ocn932167063 000739259 035__ $$aSP(OCoLC)932167063 000739259 040__ $$aNUI$$beng$$cNUI$$dOCLCO$$dAZU$$dGW5XE$$dORU$$dOCLCO$$dCOO 000739259 049__ $$aISEA 000739259 050_4 $$aQA76.9.A25 000739259 050_4 $$aTK5105.5-5105.9 000739259 08204 $$a005.8$$223 000739259 08204 $$a004.6$$223 000739259 24500 $$aPrivacy in a digital, networked world$$h[electronic resource] :$$btechnologies, implications and solutions /$$cedited by Sherali Zeadally, Mohamad Badra. 000739259 264_1 $$aCham :$$bSpringer,$$c2015. 000739259 300__ $$a1 online resource (x, 418 pages) :$$billustrations. 000739259 336__ $$atext$$btxt$$2rdacontent 000739259 337__ $$acomputer$$bc$$2rdamedia 000739259 338__ $$aonline resource$$bcr$$2rdacarrier 000739259 347__ $$atext file$$bPDF$$2rda 000739259 4901_ $$aComputer Communications and Networks,$$x1617-7975 000739259 500__ $$aIncludes index. 000739259 5050_ $$aDatabase Privacy -- Privacy and Big Data -- Privacy in Crowdsourced Platforms -- Privacy in Healthcare -- Privacy in Peer-to-Peer Networks -- Privacy in the Cloud -- Privacy in Vehicular Ad-Hoc Networks -- Privacy Law and Regulation -- Technologies, Implications and Solutions -- Privacy in Mobile Devices -- Privacy in Biometric Systems -- Privacy in Social Networks -- The Right to Privacy in the Age of Digital Technology -- How to Explore Consumers' Privacy Choices with Behavioural Economics -- Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid -- Location-Based Privacy, Protection, Safety, and Security. 000739259 506__ $$aAccess limited to authorized users. 000739259 520__ $$aThis comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing such diverse topics as cloud computing, crowdsourcing platforms, vehicular ad-hoc networks, big data, mobile devices, location-based systems, smart grid technology, databases, social networks, healthcare, behavioral economics, and peer-to-peer networks. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Topics and features: Examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks Describes the challenges of addressing privacy concerns in various areas Reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms Investigates approaches for protecting privacy in cloud applications Discusses the regulation of personal information disclosure and the privacy of individuals Presents the tools and the evidence to better understand consumers' privacy behaviors Offering invaluable support to undergraduate and graduate students, as well as instructors involved in courses on privacy, security and networking, this important work will also be of great interest to researchers and engineers working in the area of privacy. Dr. Sherali Zeadally is an Associate Professor in the College of Communication and Information at the University of Kentucky, Lexington, KY, USA. Dr. Mohamad Badra is an Assistant Professor in the College of Technological Innovation at Zayed University, Dubai, UAE. 000739259 650_0 $$aComputer security. 000739259 650_0 $$aInformation technology$$xSecurity measures. 000739259 650_0 $$aDigital media$$xSecurity measures. 000739259 650_0 $$aData protection. 000739259 650_0 $$aComputer science. 000739259 650_0 $$aComputer networks. 000739259 650_0 $$aData structures (Computer science) 000739259 650_0 $$aManagement information systems. 000739259 7001_ $$aZeadally, Sherali,$$eeditor. 000739259 7001_ $$aBadra, Mohamad,$$eeditor. 000739259 77608 $$iPrint version:$$z9783319084695 000739259 830_0 $$aComputer communications and networks. 000739259 85280 $$bebk$$hSpringerLink 000739259 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-08470-1$$zOnline Access$$91397441.1 000739259 909CO $$ooai:library.usi.edu:739259$$pGLOBAL_SET 000739259 980__ $$aEBOOK 000739259 980__ $$aBIB 000739259 982__ $$aEbook 000739259 983__ $$aOnline 000739259 994__ $$a92$$bISE