Digital Privacy: Theory, Technologies, and Practices

Copertina anteriore
Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati
CRC Press, 22 dic 2007 - 496 pagine
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in academia, industry, and government.

Dall'interno del libro

Sommario

Preface
ix
Acknowledgments
xiii
About the Editors
xv
Contributors
xix
THE PRIVACY SPACE
1
Ten Years Later
3
Chapter 2 Communicaton Privacy
19
Chapter 3 PrivacyPreserving Cryptographic Protocols
47
Chapter 11 HCI Designs for PrivacyEnhancing Identity Management
229
Chapter 12 Privacy Perceptions among Members of Online Communities
253
Scales for Privacy in Ubiquitous Computing
267
PRIVACY IN UBIQUITOUS COMPUTING
283
Technolgical Issues and Privacy Concerns
285
Chapter 15 PrivacEnhanced Location Services Information
307
Privacy in Ubiquitous Computing Ubicomp
327
THE ECONOMICS OF PRIVACY
345

PRIVACY ATTACKS
71
Chapter 4 Byzantine Attacks on Anonymity Systems
73
Chapter 5 Introducing Traffic Analysis
95
Chapter 6 Privacy Profiling Targeted Marketing and Data Mining
117
PRIVACYENHANCING TECHNOLOGIES
133
Chapter 7 Enterprise Privacy Policies and Languages
135
Chapter 8 Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation
155
Chapter 9 Privacy Protection with Uncertainty and Indistinguishability
173
Chapter 10 PrivcyPreservation Techniques in Data Mining
187
USER PRIVACY
227
Chapter 17 A Risk Model for Privacy Insurance
347
Chapter 18 What Can Behavioral Economics Teach Us about Privacy?
363
PRIVACY AND POLICY
379
Chapter 19 Privacy of Outsourced Data
381
A Pandoras Box for Rights and Liberties?
409
Freedom of Association in a Network Society
435
Index
459
Back cover
471
Copyright

Altre edizioni - Visualizza tutto

Parole e frasi comuni

Brani popolari

Pagina 255 - It is imagined because the members of even the smallest nation will never know most of their fellow-members, meet them or even hear of them, yet in the minds of each lives the image of their communion...
Pagina 447 - Of course, it is immaterial whether the beliefs sought to be advanced by association pertain to political, economic, religious or cultural matters, and state action which may have the effect of curtailing the freedom to associate is subject to the closest scrutiny.
Pagina 447 - Effective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association, as this Court has more than once recognized by remarking upon the close nexus between the freedoms of speech and assembly. It is beyond debate that freedom to engage in association for the advancement of beliefs and ideas is an inseparable aspect of the "liberty...
Pagina 68 - Ninghui Li, John C. Mitchell, and William H. Winsborough. Design of a role-based trust management framework.
Pagina 65 - N00014-02-10364 from the Office of Naval Research, by sponsors of the Center for Education and Research in Information Assurance and Security, and by Purdue Discovery Park's eenterprise Center.
Pagina 254 - virtual communities are social aggregations that emerge from the Net when enough people carry on ... public discussions long enough, with sufficient human feeling, to form webs of personal relationships in cyberspace.
Pagina 447 - Alabama we have required that the subordinating interests of the State must survive exacting scrutiny. We also have insisted that there be a 'relevant correlation' or 'substantial relation' between the governmental interest and the information required to be disclosed.
Pagina 447 - This type of scrutiny is necessary even if any deterrent effect on the exercise of First Amendment rights arises, not through direct government action, but indirectly as an unintended but inevitable result of the government's conduct in requiring disclosure....

Informazioni sull'autore (2007)

Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati

Informazioni bibliografiche