Digital privacy: theory, technologies, and practices
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY [u.a.]
Auerbach
2008
|
Schriftenreihe: | Information technology
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | XXII, 470 S. Ill., graph. Darst. |
ISBN: | 9781420052176 1420052179 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023086741 | ||
003 | DE-604 | ||
005 | 20151210 | ||
007 | t | ||
008 | 080118s2008 ad|| |||| 00||| eng d | ||
020 | |a 9781420052176 |9 978-1-4200-5217-6 | ||
020 | |a 1420052179 |9 1-4200-5217-9 | ||
035 | |a (OCoLC)144218240 | ||
035 | |a (DE-599)BVBBV023086741 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-473 |a DE-703 |a DE-19 |a DE-12 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Digital privacy |b theory, technologies, and practices |c ed. by Alessandro Acquisti |
264 | 1 | |a New York, NY [u.a.] |b Auerbach |c 2008 | |
300 | |a XXII, 470 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information technology | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Digital communications |x Security measures | |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationstechnik |0 (DE-588)4031888-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 1 | 1 | |a Kommunikationstechnik |0 (DE-588)4031888-6 |D s |
689 | 1 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Acquisti, Alessandro |0 (DE-588)17171234X |4 edt | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016289675&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016289675&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-016289675 | ||
942 | 1 | 1 | |c 004 |e 22/bsb |
942 | 1 | 1 | |c 302.2 |e 22/bsb |
Datensatz im Suchindex
_version_ | 1804137337283674112 |
---|---|
adam_text | Contents
Preface
............................................................ix
Acknowledgments
..............................................xiii
About the Editors
................................................xv
Contributors
....................................................xix
PART I: THE PRIVACY SPACE
1
Privacy-Enhancing Technologies for the Internet
Ш:
Ten Years Later
.................................................3
Ian Goldberg
2
Communication Privacy
......................................19
Andreas Pfitzmann, Andreas Juschka,
Anne-Katrin Stange,
Sandra
Steinbrecher,
and Stefan
Köpseli
3
Privacy-Preserving Cryptographic Protocols
.................47
Mikhail]. Atallah and Keith B. Frikken
PART II: PRIVACY ATTACKS
4
Byzantine Attacks on Anonymity Systems
....................73
Nikita
Borisov,
George Danezis, and
Parisa
Tabriz
5
Introducing Traffic Analysis
..................................95
George Danezis and Richard Clayton
vi
■ Contents
6
Privacy,
Profiling, Targeted Marketing, and Data Mining
... 117
Jaideep Vaidya and Vijay Atluri
PART 111: PRIVACY-ENHANCING TECHNOLOGIES
7
Enterprise Privacy Policies and Languages
..................135
Michael
Backes
and
Markus Dürmuth
8
Uncircumventable Enforcement of Privacy Policies
via Cryptographic Obfuscation
..............................155
Awind Narayanan and Vitaly Shmatikov
9
Privacy Protection with Uncertainty
and Indistinguishability
......................................173
X. Sean Wang and Sushiljajodia
10
Privacy-Preservation Techniques in Data Mining
...........187
Chunhua
Su,
Jianying Zhou, Feng
Bao,
Guïlin Wang,
and
Konic
hi
Saku rai
PART IV: USER PRIVACY
11
HCI Designs for Privacy-Enhancing Identity
Management
.................................................229
Simone
Fischer-Htìbner,
John
Sören Pettersson,
Mike Bergmann,
Marit
Hansen,
Siani
Pearson,
and Marco Casassa Mont
12
Privacy Perceptions among Members
of Online Communities
......................................253
Maria Karyda and Spyros Kokolakis
13
Perceived Control: Scales for Privacy
in Ubiquitous Computing
....................................
2б7
Sarah Spiekermann
PART V: PRIVACY IN UBIQUITOUS COMPUTING
14
RFID: Technological Issues and Privacy Concerns
..........285
Pablo Najera and Javier Lopez
15
Privacy-Enhanced Location Services Information
...........307
Claudio
A. Ardagna, Marco Cremonini,
Ernesto Damiani,
Sabrina
Lie
Capitani di Vimercati,
and
Pierangela Samarati
Contents
Ш
vii
16
Beyond Consent: Privacy in Ubiquitous
Computing (Ubicomp)
.......................................327
Jean Camp and Kay Connelly
PART VI: THE ECONOMICS OF PRIVACY
17
A Risk Model for Privacy Insurance
.........................347
Athanassios
N.
Yannacoponlos, Sokratis Katsikas,
Costas
Lambrinoudakis,
Stefanos Gritzalis,
and Stelios Z. Xanthoponlos
18
What Can Behavioral Economics Teach
Us about Privacy?
............................................363
Alessandro Acquisti
and
Jens
Grossklags
PART
VII:
PRIVACY AND POLICY
19
Privacy of Outsourced Data
..................................381
Sabńna
De Capitani di Vimercati, Sara Foresti,
Stefano
Parahoschi, and Pierangela Samarati
20
Communications Data
Retention: A Pandora s Box
for Rights and liberties?
.....................................409
Lilian
Mitron
21
Surveillance of Emergent Associations: Freedom
of Association in a Network Society
.........................435
KatherineJ.
Strandburg
Index
..............................................................459
While traveling the data highway through the global village, most people, if they
think about it at all, consider privacy a non-forfeitable right. They expect to have
control over the ways in which their personal information is obtained, distributed,
shared, and used by any other entity. According to recent surveys, privacy, and
anonymity are the fundamental issues of concern for most Internet users, ranked
higher than ease-of-use, spam, cost, and security.
Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art
technologies, best practices, and research results, as well as legal, regulatory, and
ethical issues. The editors, established researchers whose work enjoys worldwide
recognition, draw on contributions from experts in
academia,
industry, and
government to delineate theoretical, technical, and practical aspects of digital
privacy. They provide an up-to-date, integrated approach to privacy issues that
spells out what digital privacy is and covers the threats, rights, and provisions of
the legal framework in terms of technical counter measures for the protection of
an individual s privacy. The work includes coverage of protocols, mechanisms,
applications, architectures, systems, and experimental studies.
Even though the utilization of personal information can improve customer services,
increase revenues, and lower business costs, it can be easily misused and lead to
violations of privacy. Important legal, regulatory, and ethical issues have emerged,
prompting the need for an urgent and consistent response by electronic societies.
Currently there is no book available that combines such a wide range of privacy
topics with such a stellar cast of contributors. Filling that void, Digital Privacy:
Theory, Techniques, and Practices gives you the foundation for building effective
and legal privacy protocols into your business processes.
|
adam_txt |
Contents
Preface
.ix
Acknowledgments
.xiii
About the Editors
.xv
Contributors
.xix
PART I: THE PRIVACY SPACE
1
Privacy-Enhancing Technologies for the Internet
Ш:
Ten Years Later
.3
Ian Goldberg
2
Communication Privacy
.19
Andreas Pfitzmann, Andreas Juschka,
Anne-Katrin Stange,
Sandra
Steinbrecher,
and Stefan
Köpseli
3
Privacy-Preserving Cryptographic Protocols
.47
Mikhail]. Atallah and Keith B. Frikken
PART II: PRIVACY ATTACKS
4
Byzantine Attacks on Anonymity Systems
.73
Nikita
Borisov,
George Danezis, and
Parisa
Tabriz
5
Introducing Traffic Analysis
.95
George Danezis and Richard Clayton
vi
■ Contents
6
Privacy,
Profiling, Targeted Marketing, and Data Mining
. 117
Jaideep Vaidya and Vijay Atluri
PART 111: PRIVACY-ENHANCING TECHNOLOGIES
7
Enterprise Privacy Policies and Languages
.135
Michael
Backes
and
Markus Dürmuth
8
Uncircumventable Enforcement of Privacy Policies
via Cryptographic Obfuscation
.155
Awind Narayanan and Vitaly Shmatikov
9
Privacy Protection with Uncertainty
and Indistinguishability
.173
X. Sean Wang and Sushiljajodia
10
Privacy-Preservation Techniques in Data Mining
.187
Chunhua
Su,
Jianying Zhou, Feng
Bao,
Guïlin Wang,
and
Konic
hi
Saku rai
PART IV: USER PRIVACY
11
HCI Designs for Privacy-Enhancing Identity
Management
.229
Simone
Fischer-Htìbner,
John
Sören Pettersson,
Mike Bergmann,
Marit
Hansen,
Siani
Pearson,
and Marco Casassa Mont
12
Privacy Perceptions among Members
of Online Communities
.253
Maria Karyda and Spyros Kokolakis
13
Perceived Control: Scales for Privacy
in Ubiquitous Computing
.
2б7
Sarah Spiekermann
PART V: PRIVACY IN UBIQUITOUS COMPUTING
14
RFID: Technological Issues and Privacy Concerns
.285
Pablo Najera and Javier Lopez
15
Privacy-Enhanced Location Services Information
.307
Claudio
A. Ardagna, Marco Cremonini,
Ernesto Damiani,
Sabrina
Lie
Capitani di Vimercati,
and
Pierangela Samarati
Contents
Ш
vii
16
Beyond Consent: Privacy in Ubiquitous
Computing (Ubicomp)
.327
Jean Camp and Kay Connelly
PART VI: THE ECONOMICS OF PRIVACY
17
A Risk Model for Privacy Insurance
.347
Athanassios
N.
Yannacoponlos, Sokratis Katsikas,
Costas
Lambrinoudakis,
Stefanos Gritzalis,
and Stelios Z. Xanthoponlos
18
What Can Behavioral Economics Teach
Us about Privacy?
.363
Alessandro Acquisti
and
Jens
Grossklags
PART
VII:
PRIVACY AND POLICY
19
Privacy of Outsourced Data
.381
Sabńna
De Capitani di Vimercati, Sara Foresti,
Stefano
Parahoschi, and Pierangela Samarati
20
Communications Data
Retention: A Pandora's Box
for Rights and liberties?
.409
Lilian
Mitron
21
Surveillance of Emergent Associations: Freedom
of Association in a Network Society
.435
KatherineJ.
Strandburg
Index
.459
While traveling the data highway through the global village, most people, if they
think about it at all, consider privacy a non-forfeitable right. They expect to have
control over the ways in which their personal information is obtained, distributed,
shared, and used by any other entity. According to recent surveys, privacy, and
anonymity are the fundamental issues of concern for most Internet users, ranked
higher than ease-of-use, spam, cost, and security.
Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art
technologies, best practices, and research results, as well as legal, regulatory, and
ethical issues. The editors, established researchers whose work enjoys worldwide
recognition, draw on contributions from experts in
academia,
industry, and
government to delineate theoretical, technical, and practical aspects of digital
privacy. They provide an up-to-date, integrated approach to privacy issues that
spells out what digital privacy is and covers the threats, rights, and provisions of
the legal framework in terms of technical counter measures for the protection of
an individual's privacy. The work includes coverage of protocols, mechanisms,
applications, architectures, systems, and experimental studies.
Even though the utilization of personal information can improve customer services,
increase revenues, and lower business costs, it can be easily misused and lead to
violations of privacy. Important legal, regulatory, and ethical issues have emerged,
prompting the need for an urgent and consistent response by electronic societies.
Currently there is no book available that combines such a wide range of privacy
topics with such a stellar cast of contributors. Filling that void, Digital Privacy:
Theory, Techniques, and Practices gives you the foundation for building effective
and legal privacy protocols into your business processes. |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author2 | Acquisti, Alessandro |
author2_role | edt |
author2_variant | a a aa |
author_GND | (DE-588)17171234X |
author_facet | Acquisti, Alessandro |
building | Verbundindex |
bvnumber | BV023086741 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)144218240 (DE-599)BVBBV023086741 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02349nam a2200541 c 4500</leader><controlfield tag="001">BV023086741</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151210 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080118s2008 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781420052176</subfield><subfield code="9">978-1-4200-5217-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1420052179</subfield><subfield code="9">1-4200-5217-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)144218240</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023086741</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital privacy</subfield><subfield code="b">theory, technologies, and practices</subfield><subfield code="c">ed. by Alessandro Acquisti</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Auerbach</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 470 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital communications</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationstechnik</subfield><subfield code="0">(DE-588)4031888-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kommunikationstechnik</subfield><subfield code="0">(DE-588)4031888-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Acquisti, Alessandro</subfield><subfield code="0">(DE-588)17171234X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016289675&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016289675&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016289675</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">004</subfield><subfield code="e">22/bsb</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV023086741 |
illustrated | Illustrated |
index_date | 2024-07-02T19:39:27Z |
indexdate | 2024-07-09T21:10:41Z |
institution | BVB |
isbn | 9781420052176 1420052179 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016289675 |
oclc_num | 144218240 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-473 DE-BY-UBG DE-703 DE-19 DE-BY-UBM DE-12 |
owner_facet | DE-355 DE-BY-UBR DE-473 DE-BY-UBG DE-703 DE-19 DE-BY-UBM DE-12 |
physical | XXII, 470 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Auerbach |
record_format | marc |
series2 | Information technology |
spelling | Digital privacy theory, technologies, and practices ed. by Alessandro Acquisti New York, NY [u.a.] Auerbach 2008 XXII, 470 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Information technology Computer networks Security measures Computer security Digital communications Security measures Privatsphäre (DE-588)4123980-5 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kommunikationstechnik (DE-588)4031888-6 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s Privatsphäre (DE-588)4123980-5 s DE-604 Informationstechnik (DE-588)4026926-7 s Kommunikationstechnik (DE-588)4031888-6 s Acquisti, Alessandro (DE-588)17171234X edt Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016289675&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016289675&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Digital privacy theory, technologies, and practices Computer networks Security measures Computer security Digital communications Security measures Privatsphäre (DE-588)4123980-5 gnd Informationstechnik (DE-588)4026926-7 gnd Computersicherheit (DE-588)4274324-2 gnd Kommunikationstechnik (DE-588)4031888-6 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)4026926-7 (DE-588)4274324-2 (DE-588)4031888-6 (DE-588)4143413-4 |
title | Digital privacy theory, technologies, and practices |
title_auth | Digital privacy theory, technologies, and practices |
title_exact_search | Digital privacy theory, technologies, and practices |
title_exact_search_txtP | Digital privacy theory, technologies, and practices |
title_full | Digital privacy theory, technologies, and practices ed. by Alessandro Acquisti |
title_fullStr | Digital privacy theory, technologies, and practices ed. by Alessandro Acquisti |
title_full_unstemmed | Digital privacy theory, technologies, and practices ed. by Alessandro Acquisti |
title_short | Digital privacy |
title_sort | digital privacy theory technologies and practices |
title_sub | theory, technologies, and practices |
topic | Computer networks Security measures Computer security Digital communications Security measures Privatsphäre (DE-588)4123980-5 gnd Informationstechnik (DE-588)4026926-7 gnd Computersicherheit (DE-588)4274324-2 gnd Kommunikationstechnik (DE-588)4031888-6 gnd |
topic_facet | Computer networks Security measures Computer security Digital communications Security measures Privatsphäre Informationstechnik Computersicherheit Kommunikationstechnik Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016289675&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016289675&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT acquistialessandro digitalprivacytheorytechnologiesandpractices |