<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000cmm a22000005i 4500</leader>
  <controlfield tag="001">UP-99796217611020024</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20241022162203.0</controlfield>
  <controlfield tag="006">m||||fo||d| ||||||</controlfield>
  <controlfield tag="007">cr cn |||aaaaa</controlfield>
  <controlfield tag="008">241022s2011    ne ||||go||j| ||||||engdd</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9789400706415 (eBook)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(iLib)UPD-00208003875</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">CSt</subfield>
   <subfield code="d">DMLR</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="042" ind1=" " ind2=" ">
   <subfield code="a">DMLUC</subfield>
  </datafield>
  <datafield tag="084" ind1=" " ind2=" ">
   <subfield code="a">QA 76.9 A25</subfield>
   <subfield code="b">C66 2011eb</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Computers, privacy and data protection</subfield>
   <subfield code="b">an element of choice</subfield>
   <subfield code="c">edited by Serge Gutwirth, Yves Poullet, Paul De Hert, Ronald Leenes.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Dordrecht</subfield>
   <subfield code="a">New York</subfield>
   <subfield code="b">Springer</subfield>
   <subfield code="c">2011</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xxiv, 457 pages)</subfield>
   <subfield code="b">illustrations</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">computer</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">online resource</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Introduction.- Part 1 Building and Rebuilding Legal Concepts for Privacy and Data Protection.- Chapter 1 The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn?t It?); Katja de Vries, Rocco Bellanova, Paul De Hert and Serge Gutwirth.- Chapter 2 The Noise in the Archive: Oblivion in the Age of Total Recall; Jean-François Blanchette.- Chapter 3 Property in personal data. Second life of an old idea in the age of cloud computing, chain informatisation, and ambient intelligence; Nadezhda Purtova.- Chapter 4, Right to Personal Identity. The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization ; Norberto Nuno Gomes de Andrade.- Part 2 The Dark Side: Suspicions, Distrust and Surveillance.- Chapter 5 Frames from the life and death of Jean Charles de Menezes; Amos Bianchi &amp; Denis J. Roio (a.k.a. Jaromil).- Chapter 6 Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden; Christel Backman.- Chapter 7 Ubiquitous computing, privacy and data protection: options and limitations to reconcile the unprecedented contradictions; Johann Čas.- Chapter 8 Franziska Boehm, EU PNR: European Flight passengers under general suspicion. The envisaged European model of analyzing flight passenger data.- Chapter 9 Options for securing PCs against phishing and espionage. A report from the EU-project &quot;Open Trusted Computing&quot;; Arnd Weber and Dirk Weber.- Part 3 Privacy Practices as Vectors of Reflection.- Chapter 10 Keeping up appearances: Audience segregation in social network sites; Bibi Van den Berg and Ronald Leenes.- Chapter 11 Avatars out of Control. Gazira Babeli, Pose Balls and ?Rape? in Second Life; Katja De Vries.- Chapter 12 Privacy as a practice: exploring the relational and spatial dynamics of HIV-related information seeking; Fadhila Mazanderani and Ian Brown.- Chapter 13 Rise and Phall: Lessons from the Phorm Saga; Paul Bernal.- Chapter 14 Disclosing or protecting? Teenagers online self-disclosure;  Michel Walrave and Wannes Heirman.- Chapter 15 Why Adopting Privacy Enhancing Technologies (PETs) Takes So Much Time; John J. Borking.- Part 4 Privacy and Data Protection in the Cloud.- Chapter 16 Can a Cloud be Really Secure? A Socratic Dialogue; Gurpreet Dhillon and Ella Kolkowska.- Chapter 17 Privacy Regulations for Cloud Computing. Compliance and Implementation in Theory and Practice;  Joep Ruiter and Martijn Warnier.- Chapter 18 Data Protection in the Clouds ; Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gérard and Claire Gayrel.- Chapter 19 Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases; Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi and Hui (Wendy) Wang.- Chapter 20 Access Control in Cloud-on-GRID Systems: the PerfCloud Case Study; Valentina Casola, Raffaele Lettiero, Massimiliano Rak and Umberto Villano.- Chapter 21 Security and privacy in the clouds: a bird?s eye view; Wolter Pieters</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">IP based subscription, on campus and remote access.</subfield>
   <subfield code="c">Access via Electronic Resources of the UPD University Library Website</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Privacy and data protection have never been static. On the contrary, the history of the last 40 years shows the reverse. New issues and challenges continue to emerge, requiring an ongoing process of interpreting their effect in terms of reach, objectives and their deeper significance. Indeed, the consequences of technological applications due to unprecedented storage, processing and transmission capacities and to the possibilities of miniaturization, convergence, interoperability and ubiquity, represent powerful triggers and challenges to emerging developments, but they are certainly not the only determining factor. The current developments are also linked to many other sources of action and change, such as business models, security policies, population management, police work and law enforcement, leisure, culture, health policies, practices in the real and in the virtual world and so on. In the face of such dynamism, the &quot;element of choice unambiguously evokes both the need to collectively take responsibility and direct those developments in a desirable direction, providing the ambit to influence and steer the course of things in a way that matches our expectations not only toward privacy and data protection, but also more broadly, to the kind of world we are building. This challenge is not an easy one since all big policy choices we might be willing to make are conditioned by a myriad of small decisions and bifurcations that have already set many small switches in irreversible positions. In one way or another, all the contributions to this book express the complexity of making choices regarding issues of privacy and data protection. This is all the more relevant given that the 1995 EC Data Protection Directive, the centerpiece of European data protection, is being revised as these sentences are written</subfield>
  </datafield>
  <datafield tag="533" ind1=" " ind2=" ">
   <subfield code="a">Electronic reproduction.</subfield>
   <subfield code="b">New York</subfield>
   <subfield code="c">SpringerLink</subfield>
   <subfield code="d">2011.</subfield>
   <subfield code="n">Available via World Wide Web through SpringerLink</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Data protection.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computers</subfield>
   <subfield code="x">Access control.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Gutwirth, Serge</subfield>
   <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Poullet, Yves</subfield>
   <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">De Hert, Paul</subfield>
   <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Leenes, Ronald</subfield>
   <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="710" ind1="2" ind2=" ">
   <subfield code="a">SpringerLink (Online service).</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">http://link.springer.com/book/10.1007/978-94-007-0641-5</subfield>
   <subfield code="y">Available for University of the Philippines Diliman via SpringerLink. Click here to access</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DMLR</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Electronic Resource</subfield>
  </datafield>
 </record>
</collection>
