Query Result Set
Skip Navigation Links
   ActiveUsers:766Hits:18916223Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
DATA PROTECTION (12) answer(s).
 
SrlItem
1
ID:   133236


And what good came of it at last: press-politician relations post-leveson / Barnett, Steven; Townend, Judith   Journal Article
Barnett, Steven Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract James Margach famously argued that Prime Ministers from Lloyd George to Callaghan had been intent on exploiting the media in their determination to centralise power. From Margaret Thatcher onwards, however, there is a strong argument that the power relationship has been reversed, and that the Leveson Inquiry-set up in the wake of the phone hacking scandal-exposed a political class which had become deeply fearful of the power and influence of the national press. Citing evidence to Leveson and subsequent recommendations by the inquiry, this article presents two case studies-on data protection and on media ownership-where the public interest clearly demanded political intervention, which would be inconvenient for the major publishers. And yet, despite recommendations by Lord Justice Leveson and despite clear support from leading politicians of all parties, there has been virtually no policy progress in either case. While the Leveson Inquiry was billed as a watershed in press-politician relations and an opportunity to counteract decades of unhealthy press power, political inertia in these two areas suggests that very little has changed.
        Export Export
2
ID:   130992


Data protection, with love / Bellanova, Rocco   Journal Article
Bellanova, Rocco Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract How to Engage with the Politics of Privacy in the Age of Preemptive Security? My suggestion is to start with data protection, which, following De Hert and Gutwirth (2006), is not exactly the same of privacy. Extrapolating from their analysis of the two as different "legal tools," I would say that privacy and data protection are two slightly different rationales of power relations: one of privacy based on the "opacity of the individual" and one of data protection on the "transparency and accountability of the powerful" (Gutwirth and De Hert 2008:275; emphasis in original).1 These rationales (attempt to) orientate two different loose dispositifs, each formed by a composite ensemble of elements. Some of these elements are peculiar to each dispositif, while others are shared or encompassed by both
        Export Export
3
ID:   130993


Digital security governance and risk anticipation: what about the role of security officials in privacy protection? ( / Eijkman, Quirine   Journal Article
Eijkman, Quirine Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The anticipatory turn in managing security and safety relies not only on innovative technological tools, but also on social practice. New information and communication technology, for instance, facilitates digital security governance1 which entails the collection, processing, storage, and sharing of digital personal data for risk profiling, but little is known about the role of security officials in preemptive security. Although people, or "data subjects," are categorized according to a (predefined) level of potential threat on the basis of digital data, it is often unclear which actor or agency was responsible for this categorization. This is especially unclear when information was shared across the globe between several security agencies and/or private companies. Nonetheless, as the assessment of risk or dangerousness affects someone's real-life opportunities, privacy rights or claims to something or someone are likely to be evoked.
        Export Export
4
ID:   124104


Enemy without boundaries / Porche III, Isaac R.; Sollinger, Jerry M.; McKay, Shawn   Journal Article
Porche III, Isaac R. Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract The article offers comments on the need for a strategy and policy to respond to cyber attack as it is allegedly impossible to block every cyber attack. It is suggested that the industries learn from the vulnerability of the networks attacked while understanding that there is no single defense against a sophisticated and constantly morphing offense. Comments on cyberspace having no boundaries and changing constantly and the need to formulate active defense are also included.
        Export Export
5
ID:   152952


Fundamentals of information systems security / Kim, David; Solomon, Michael G 2014  Book
Kim, David Book
0 Rating(s) & 0 Review(s)
Publication Burlington, Jones and Barlett Learning, 2014.
Description xxiv, 544p.pbk
Series Information Systems Security and Assurance Series
Standard Number 9781284031621
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059062005.8/KIM 059062MainOn ShelfGeneral 
6
ID:   163646


How the Snowden Revelations Saved the EU General Data Protection Regulation / Rossi, Agustín   Journal Article
Rossi, Agustín Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Snowden’s global surveillance revelations inverted the direction of the European Parliament’s debate on the General Data Protection Regulation (GDPR). Before Snowden’s revelations, corporations were shaping Europe’s privacy rules. But when Snowden’s revelations raised the salience of Internet privacy issues, the power of corporations went down, and privacy advocates incorporated their preferences into the GDPR. Thus, the fact that Snowden was able to increase the salience of privacy issues was instrumental in defeating organised corporate power and enabling privacy advocates to mobilise Europe’s culture of privacy protection.
Key Words Data Protection  Lobbying  Privacy  Snowden  GDPR  Political Salience 
        Export Export
7
ID:   096171


Information warfare / Ventre, Daniel 2009  Book
Ventre, Daniel Book
0 Rating(s) & 0 Review(s)
Publication New Jersey, ISTE and John Wiley and Sons, 2009.
Description xix, 303p.
Standard Number 9781848210943
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
054937355.343/VEN 054937MainOn ShelfGeneral 
8
ID:   180565


Politicising European counter-terrorism: the role of NGOs / Liedlbauer, Lina   Journal Article
Liedlbauer, Lina Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The article examines the role of NGOs in the politicisation of EU security. The focus of the empirical analysis lies on the field of EU counter-terrorism. The cases selected are two different types of legal acts, adopted in the aftermath of serious terrorist attacks in EU member states: The EU data retention directive and the EU passenger name record (PNR) directive. These policies present intrusiveness and relevance for Brussels-based and national civil rights NGOs since they both aim to touch upon individual liberties, like privacy rights or the right to protect personal data. The article goes further by opening up the black box of politicisation. It does so by assuming that politicisation is characterised by a certain level of salience, actor range and polarisation. The paper links politicisation literature to research on the influence of interest groups that are discussing, for example, voice, access or litigation as strategies. Therewith, the paper contributes to the scientific debate on politicisation in two ways: First, it sheds light on the so far disregarded role of NGOs in politicisation. Second, it builds a bridge to interest group literature by examining repertoires of NGOs in politicisation.485-503
Key Words NGOs  Counter-Terrorism  Data Protection  Politicisation  Privacy  EU Security 
        Export Export
9
ID:   189696


Push to Regulate Digital Markets and Services / Popiel, Pawel   Journal Article
Popiel, Pawel Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In the past few years, efforts to regulate digital platform services have grown in analytical sophistication, acquired political momentum, and started to produce legislative and regulatory interventions. The emerging policy frameworks—which tend to focus on content, data, and market power concerns—show degrees of variation, by region and by policy domain, and reflect various normative and policy goals. This essay examines their underlying policy goals, normative commitments, and the tensions and trade-offs they present.
        Export Export
10
ID:   053644


Security in Computing / Pfleeger, Charles P. 1997  Book
Pfleeger, Charles P. Book
0 Rating(s) & 0 Review(s)
Edition 2nd ed.
Publication Upper Saddle River, Prentice Hall, 1997.
Description xii, 574p.
Standard Number 0133374866
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
045685005.8/PFL 045685MainOn ShelfGeneral 
11
ID:   111386


Smart meter data: balancing consumer privacy concerns with legitimate applications / McKenna, Eoghan; Richardson, Ian; Thomson, Murray   Journal Article
McKenna, Eoghan Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract Smart meters are being rolled out in large numbers throughout the world, with proponents claiming they are a critical step in the transition to a low-carbon economy. Yet there are significant unresolved negative reactions to smart meters, principally based on the concern that smart meters might be used to infer the private activities that occur within a dwelling. Though smart meter data is classified as personal data, and as such protected under existing data protection frameworks in the EU, there are relevant exceptions, notably where the data is required for legitimate applications associated with the performance of 'regulated duties'. This paper contributes to this debate by examining the data requirements for some of the proposed applications of smart meter data within the electricity supply industry, and investigates whether the use of personal data can be minimized or even avoided. The discussion includes system balancing, demand reduction, demand response and distribution network operation and planning, and indicates that, for most of these applications, the requirements for personal data can indeed be minimized. 'Privacy friendly' alternatives are discussed.
Key Words Data Protection  Smart Meter  Consumer Privacy 
        Export Export
12
ID:   172219


Towards a ‘Responsible AI’: Can India Take the Lead? / Chakrabarti, Rajesh ; Sanyal, Kaushiki   Journal Article
Rajesh Chakrabarti Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The impact of artificial intelligence (AI) on every aspect of our lives is inevitable and already being felt in numerous ways. Countries are grappling with the opportunities and challenges that AI presents. Among the South Asian countries, India has taken a lead in promoting and regulating AI. However, it lags significantly behind countries such as China or the United States. This article explores India’s AI ecosystem, the threats and challenges it faces, and the ethical issues it needs to consider. Finally, it examines the common concerns among South Asian nations and the possibility of coming together to promote and regulate AI in the region.
        Export Export