Academic literature on the topic 'Data protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data protection":

1

Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (April 15, 2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notification to the APD are the general requirements for the processing of personal data, without prejudice to the principles and other specific requirements applicable to sensitive data. Only health professionals registered in the respective professional associations are qualified to process health data, and must observe professional secrecy. Data holders are assured the exercise of their rights to information, access, rectification, updating and deletion of their data. Security measures must be implemented to ensure confidentiality, integrity and availability of information. In conclusion, in Angola there is no prohibition on the processing of personal data, what the legislator imposes is that it be done with transparency and legality, aiming at protecting its holders from situations of vulnerability, including stigmatization, discrimination, observing dignity of the human person as one of the fundamental principles of ethics, especially in scientific research.
2

Chamberlain, Johanna, and Andreas Kotsios. "Data protection beyond data protection regulation." Stiftelsen Juridisk Fakultetslitteratur, no. 2024 2 (January 17, 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Walker-Osborn, C., L. Fitzsimons, and J. Ruane. "Data Protection." ITNOW 55, no. 3 (August 28, 2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rowe, Heather, and Robin McGilligan. "DATA PROTECTION." Computer Law & Security Review 17, no. 5 (September 2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dinant, Jean-Marc, and Ewout Keuleers. "Data protection." Computer Law & Security Review 20, no. 1 (January 2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chalton, Simon. "Data protection." Computer Law & Security Review 13, no. 6 (November 1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sizer, Richard. "Data protection." Computer Law & Security Review 2, no. 5 (January 1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reynolds, Chris. "Data protection." Computer Law & Security Review 5, no. 6 (March 1990): 19–22. http://dx.doi.org/10.1016/0267-3649(90)90059-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Clark, Robert. "Data protection." Computer Law & Security Review 6, no. 6 (March 1991): 16–19. http://dx.doi.org/10.1016/0267-3649(91)90172-r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

George, R. E. "Data protection." Physics Bulletin 37, no. 9 (September 1986): 363. http://dx.doi.org/10.1088/0031-9112/37/9/001.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Data protection":

1

Budd, Chris. "Data Protection and Data Elimination." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV
Data security is becoming increasingly important in all areas of storage. The news services frequently have stories about lost or stolen storage devices and the panic it causes. Data security in an SSD usually involves two components: data protection and data elimination. Data protection includes passwords to protect against unauthorized access and encryption to protect against recovering data from the flash chips. Data elimination includes erasing the encryption key and erasing the flash. Telemetry applications frequently add requirements such as write protection, external erase triggers, and overwriting the flash after the erase. This presentation will review these data security features.
2

Sebé, Feixas Francesc. "Transparent Protection of Data." Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Aquesta tesi tracta la protecció de dades quan aquestes han de ser lliurades a usuaris en qui no es té absoluta confiança. En aquesta situació, les dades s'han de protegir de manera que segueixin essent utilitzables. Aquesta protecció ha de ser imperceptible, per tal de no destorbar la utilització correcta de les dades, i alhora efectiva, protegint contra la utilització no autoritzada d'aquestes.
L'estudi es divideix tenint en compte els dos tipus de dades la protecció transparent de les quals s'estudia: continguts multimèdia i microdades estadístiques.

Pel que fa a dades multimèdia, es tracta la seva protecció des de dues vessants: la protecció del copyright i la protecció de la integritat i l'autentificació.

En comerç electrònic de continguts multimèdia, els comerciants venen dades a usuaris en qui no confien plenament i que és possible que en facin còpies il·legals. Aquest fet fa que sigui necessari protegir la propietat intel·lectual d'aquests productes.
Centrant-se en imatges digitals, es presenten diverses contribucions a les dues principals tècniques de protecció del copyright electrònic: marca d'aigua i empremta digital.
Concretament, pel que fa a marca d'aigua, es presenten dos nous esquemes per imatges digitals. El primer és semi-cec i robust contra atacs de compresió, filtratge i escalat. El segon és cec i robust contra atacs de compresió, filtratge, escalat i distorsió geomètrica moderada. Seguidament, es proposa una nova tècnica basada en mesclar objectes marcats que permet combinar i augmentar la robustesa de diferents esquemes de marca d'aigua actuals.
En empremta digital, es presenta una construcció per obtenir codis binaris segurs contra atacs de confabulació de fins a tres usuaris deshonestos. La proposta actual obté, per un nombre moderat de possibles compradors, paraules codi més curtes que les obtingudes fins al moment.

Freqüentment, els continguts multimèdia es publiquen en llocs de poca confiança on poden ser alterats. En aquestes situacions, la marca d'aigua es pot utilitzar per protegir dades proporcionant-los integritat i autenticació. Es demostra l'aplicabilitat de l'algorisme de marca d'aigua basat en expansió d'espectre en el domini espacial per proporcionar, de forma transparent, autenticació i integritat sense pèrdua a imatges digitals.


L'altre tipus de dades tractades en aquesta tesi són les microdades estadístiques.

Quan fitxers amb dades estadístiques que contenen informació sobre entitats individuals són lliurats per al seu estudi, és necessari protegir la privacitat d'aquestes entitats. Aquest tipus de dades s'han de lliurar de manera que es combini la utilitat estadística amb la protecció de la privacitat de les entitats afectades. Els mètodes per pertorbar dades amb aquest objectiu s'anomenen mètodes de control del risc de revelació estadística. En aquest camp, es proposa una modificació d'una mètrica existent per mesurar la pèrdua d'informació i el risc de revelació per tal que permeti avaluar mètodes que generen fitxers emmascarats amb un nombre de registres diferent a l'original.
Es proposa també un algorisme per post-processar fitxers de dades emmascarades per tal de reduir la pèrdua d'informació mantenint un risc de revelació similar. D'aquesta manera s'aconsegueix millorar els dos millors mètodes d'emmascarament actuals: 'microagregació multivariant' i 'intercanvi de rangs'.

Finalment, es presenta una nova aplicació per proporcionar accés multinivell a dades de precisió crítica. D'aquesta manera, les dades protegides es fan disponibles a diferents usuaris, que segons el seu nivell d'autorització, podran eliminar part de la protecció obtenint dades de millor qualitat.
This dissertation is about protection of data that have to be made available to possibly dishonest users. Data must be protected while keeping its usability. Such protection must be imperceptible, so as not to disrupt correct use of data, and effective against unauthorized uses.
The study is divided according to the two kinds of data whose transparent protection is studied: multimedia content and statistical microdata.

Regarding multimedia content, protection is addressed in two ways: 1)copyright protection; 2) integrity protection and authentication.

In electronic commerce of multimedia content, merchants sell data to untrusted buyers that may redistribute it. In this respect, intellectual property rights of content providers must be ensured.
Focusing on digital images, several contributions are presented on the two main electronic copyright protection techniques: watermarking and fingerprinting.
Two new schemes for watermarking for digital images are presented. The first is semi-public and robust against compression, filtering and scaling attacks. The second one is oblivious and robust against compression, filtering, scaling and moderate geometric distortion attacks. Next, a new technique based on mixture of watermarked digital objects is proposed that allows robustness to be increased by combining robustness properties of different current watermarking schemes.
In the field of fingerprinting, a new construction to obtain binary collusion-secure fingerprinting codes robust against collusions of up to three buyers is presented. This construction provides, for a moderate number of possible buyers, shorter codewords than those offered by current proposals.

Rather often, multimedia contents are published in untrusted sites where they may suffer malicious alterations. In this situation, watermarking can be applied to protecting data in order to provide integrity and authentication. A spatial-domain spread-spectrum watermarking algorithm is described and proven suitable for lossless image authentication.

The other kind of data addressed in this dissertation are statistical microdata.

When statistical files containing information about individual entities are released for public use, privacy is a major concern. Such data files must be released in a way that combines statistical utility and protection of the privacy of entities concerned. Methods to perturb data in this way are called statistical disclosure control methods. In this field, a modification to a current score to measure information loss and disclosure risk is proposed that allows masked data sets with a number of records not equal to the number of records of the original data set to be considered.
Next, a post-masking optimization procedure which reduces information loss while keeping disclosure risk approximately unchanged is proposed. Through this procedure, the two best performing masking methods are enhanced: 'multivariate microaggregation' and 'rankswapping'.

Finally, a novel application to providing multilevel access to precision-critical data is presented. In this way, protected data are made available to different users, who, depending on their clearance, can remove part of the noise introduced by protection, thus obtaining better data quality.
3

Loukides, Grigorios. "Data utility and privacy protection in data publishing." Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/54743/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Data about individuals is being increasingly collected and disseminated for purposes such as business analysis and medical research. This has raised some privacy concerns. In response, a number of techniques have been proposed which attempt to transform data prior to its release so that sensitive information about the individuals contained within it is protected. A:-Anonymisation is one such technique that has attracted much recent attention from the database research community. A:-Anonymisation works by transforming data in such a way that each record is made identical to at least A: 1 other records with respect to those attributes that are likely to be used to identify individuals. This helps prevent sensitive information associated with individuals from being disclosed, as each individual is represented by at least A: records in the dataset. Ideally, a /c-anonymised dataset should maximise both data utility and privacy protection, i.e. it should allow intended data analytic tasks to be carried out without loss of accuracy while preventing sensitive information disclosure, but these two notions are conflicting and only a trade-off between them can be achieved in practice. The existing works, however, focus on how either utility or protection requirement may be satisfied, which often result in anonymised data with an unnecessarily and/or unacceptably low level of utility or protection. In this thesis, we study how to construct /-anonymous data that satisfies both data utility and privacy protection requirements. We propose new criteria to capture utility and protection requirements, and new algorithms that allow A:-anonymisations with required utility/protection trade-off or guarantees to be generated. Our extensive experiments using both benchmarking and synthetic datasets show that our methods are efficient, can produce A:-anonymised data with desired properties, and outperform the state of the art methods in retaining data utility and providing privacy protection.
4

Islam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La transmission de données multimédia sur les réseaux sécurisés a une croissance exponentielle grâce aux progrès scientifique dans les technologies de l'information et de la communication. La sécurité des données dans certaines applications comme le stockage sécurisé, l'authentification, la protection des droits d'auteurs, la communication militaire ou la visioconférence confidentielles, nécessitent de nouvelles stratégies en matière de transmission sécurisée. Deux techniques sont couramment utilisées pour la transmission sécurisée de données visuelles, à savoir : la cryptographie et la stéganographie. La cryptographie sécurise les données en utilisant des clés secrètes afin de rendre les données illisibles, la stéganographie, elle, vise à insérer des données cruciales dans des signaux porteurs anodins.De plus, pour la confiance mutuelle et les systèmes distribués, le partage sécurisé de ressources est souvent une garantie suffisante pour les applications de communication. L'objectif principal de cette thèse est de réaliser une protection des données visuelles, en particulier les images numériques, par le biais des techniques modernes de cryptographie. Dans ce contexte, deux objectifs de recherche ont été développés durant ces travaux de thèse.La première partie de notre travail se concentre sur la sécurité des images numériques dans un environnement partagé. Ensuite, la deuxième partie porte sur l'intégrité des données visuelles pendant une transmission sécurisée.Nous avons proposé un nouveau schéma de partage des images qui exploite les propriétés d'addition et de multiplication homomorphique de deux crypto systèmes à clé publique largement utilisés : les algorithmes RSA et Paillier. Dans les schémas traditionnels de partage sécurisé, le ``dealer'' partitionne le secret en parties et le distribue à chacun des autres acteurs. Ainsi, aucun des acteurs impliqués ne participe à la création du partage sécurisé, mais il est toujours possible que le ``dealer'' transmette des données malveillantes. Au contraire, l'approche proposée utilise le système de partage de secret d'une manière qui limite l'influence du ‘‘dealer'' sur le protocole en permettant à chaque acteur de participer.La deuxième partie de ces travaux de thèse met l'accent sur l'intégrité des données visuelles lors de la transmission. L'intégrité des données signifie que les données gardent leurs structures complètes au cours d'une opération numérique comme le stockage, le transfert ou la récupération. Le changement d'un seul bit de données cryptées peut avoir un impact catastrophique sur les données décryptées. Nous abordons le problème de correction d'erreurs dans les images cryptées en utilisant le chiffrement à clé symétrique AES (Advanced Encryptions Standard) suivant différents modes. Trois mesures sont proposées afin d'exploiter les statistiques locales des données visuelles et l'algorithme de chiffrement, dans l'objectif de corriger les erreurs efficacement
Due to the advancements in the information and communication technologies, the transmission of multimedia data over secure or insecure communication channels has increased exponentially. The security of data in applications like safe storage, authentications, copyright protection,remote military image communication or confidential video-conferencing require new strategies for secure transmission. Two techniques are commonly used for the secure transmission of visual data, i.e. cryptography and steganography. Cryptography achieves security by using secret keysto make the data illegible while steganography aims to hide the data in some innocent carrier signal. For shared trust and distributed environment, secret sharing schemes provide sufficient security in various communication applications. The principal objective of this thesis is to achieveprotection of visual data especially images through modern cryptographic techniques. In this context, the focus of the work in perspective, is twofolded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity ofimage data in the encrypted domain during transmission.We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well known public key cryptosystems, namely, the RSA and the Paillier. In traditional secret sharing schemes, the dealer partitions the secret into shares and distributethe shares to each of the player. Thus, none of the involved players participate in the creation of the shared secret and there is always a possibilitythat the dealer can cheat some player. On the contrary, the proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. The second part of our thesis emphasizes on the integrity of visual data during transmission. Data integrity means that the data have its complete structure during any operation like storage, transfer or retrieval. A single bit change in encrypted data can have catastrophic impact over the decrypted data. We address the problem of error correction in images encrypted using symmetric key cryptosystem of the Advanced Encryption Standard (AES) algorithm. Three methods are proposed to exploit the local statistics of the visual data and the encryption algorithm to successfully correct the errors
5

Kasneci, Dede. "Data protection law: recent developments." Doctoral thesis, Università degli studi di Trieste, 2010. http://hdl.handle.net/10077/3578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
2008/2009
Privacy and data protection concern everyone and are issue of profound importance around the World. Privacy has been hailed as “an integral part of our humanity” the “hart of our liberty” and “the beginning of all freedoms” (Solove, 2008). Given its importance, privacy is recognized as a fundamental human right according to many International Instruments such as: the United Nations Universal Declaration of Human Rights of 1948 (Article 12), International Covenant on the Civil and Political Rights (Article 17) The European Convention of Human Rights of 1950 (Article 8), the Charter of Fundamental Rights of the European Union of 2007 (Article 8) and the Treaty of Lisbon of 2008 (Article 16 of the TFEU). However, beyond this worldwide consensus about the importance of privacy and the need for its protection, there is difficulty to conceptualize the privacy. Privacy is a contested legal concept, with several understandings and more misunderstandings. Privacy is actually shorthand for a complex bundle of issues, ranging from dignity to discrimination, and rooted in our need to control what we tell others about ourselves. The main difficulty to reach a satisfying conceptualization of the privacy is that there are some eternal privacy tensions, namely, the interests protected by privacy and data protection laws are inherently in conflict with other legitimate interests such as the freedom of speech, public security and the free flow of information. While, it is impossible to belong to a community and withhold all data, the collection and the processing of our data carry with it many risks and dangers. One such risk is that the data will be abused by those who access it, either by authorization or not. Data which was consensually provided for one purpose might be used against us in a different context. Other privacy tensions are driven by technology which gave rise to the emergence of the data protection law: the falling cost of data storage and communication makes it easier for merchants and governments to collect more data on people and thus to become more efficient to violate the privacy. The development of the Computer technology in the 1960’s and 1970’s and the enormous potential of the digital revolution made the civil libertarians worry. The nightmare of all-seeing, all-knowing “Big Brother” of George Orwell’s “1984” did not belong anymore to the realm of the fiction, but was a reality. And as the enormous potential of the digital revolution became more apparent and together with it the dangers posed to privacy, so the calls for the specific measures to protect individuals became louder. The data protection rules originally developed, at national level in the 1970s, as a response to the threats posed to the privacy by the technological developments of the 1960s and 1970s. It emerged as a new legal field, separate from the privacy law but dependent upon it. The task of the personal data law is to provide a legal framework which is capable of reconciling the needs and interests of those who make use of personal data (data controllers or data processors) with those of persons to whom these data relate (data subjects). Europe has proven to be the leader in protecting privacy and personal data of the individuals in the digital age. At the EU level, the first legal instrument in this field was Data Protection Directive, which was passed in 1995 to harmonize national data protection laws within the European Community, with the aim of protecting the fundamental rights and freedoms of individuals including their privacy and personal data. After 15 years the question is whether the Data Protection Directive 95/46/EC fit the objectives for which it was adopted in 1995. The European Commission considers that the Directive 95/46/EC fulfils its original objectives and therefore does not need to be amended. This thesis questions this static approach of the European Commission to the data protection regime and argues that the increasing pressure on privacy due to the development of privacy destroying technologies and the growing use of and demand for personal information by public and private sectors, requires quick legal answer and constant change of the data protection legislation. The research carried out for this thesis shows that, over time the social and regulatory environment surrounding the creation, management and the use of personal data has evolved significantly since the adoption of the Directive 95/46/EC. The Directive is showing its age and is failing to meet the new challenges posed to privacy by factors such as the huge growth of personal information on line and the growing availability and ability of the new technologies to process, use and abuse personal information in many ways. These factors have challenged the means and the methods used by Directive to protect personal data and have altered the environment for the implementation of the Directive. Thus, it is clear that the context in which the data protection Directive was created has been changed fundamentally and certain basic assumptions of the Directive have already been challenged in approach, in law and in practice. All these factors show that the Directive is out of touch to meet the technological, social and legal challenges of 21st century and therefore need to be reviewed and amended.
XXI Ciclo
1975
6

Lloyd, Ian J. "Data processing and individual freedom : data protection and beyond." Thesis, University of Strathclyde, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.233213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can alleviate the extent of the damage caused by those factors.The purpose of this study is to examine the different frameworks of computer security. Emphasis is given to data/database security and the various kinds of attacks on the data. Controls over these attacks and preventative measures will be discussed, and high level language programs will demonstrate the protection issues. The Oracle, SOL query language will be used to demonstrate these controls and prevention measures. In addition the FORTRAN high level language will be used in conjunction with SOL (Only the FORTRAN and COBOL compilers are available for embedded SOL). The C language will be used to show attacks on password files and also as an encryption/decryption program.This study was based mainly on research. An investigation of literature spanning the past decade, was examined to produce the ideas and methods of prevention and control discussed in the study.
Department of Computer Science
8

Pizzolante, Raffaele. "Compression and protection of multidimensional data." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
2013 - 2014
The main objective of this thesis is to explore and discuss novel techniques related to the compression and protection of multidimensional data (i.e., 3-D medical images, hyperspectral images, 3-D microscopy images and 5-D functional Magnetic Resonance Images). First, we outline a lossless compression scheme based on the predictive model, denoted as Medical Images Lossless Compression algorithm (MILC). MILC is characterized to provide a good trade-off between the compression performances and reduced usage of the hardware resources. Since in the medical and medical-related fields, the execution speed of an algorithm, could be a “critical” parameter, we investigate the parallelization of the compression strategy of the MILC algorithm, which is denoted as Parallel MILC. Parallel MILC can be executed on heterogeneous devices (i.e., CPUs, GPUs, etc.) and provides significant results in terms of speedup with respect to the MILC. This is followed by the important aspects related to the protection of two sensitive typologies of multidimensional data: 3-D medical images and 3-D microscopy images. Regarding the protection of 3-D medical images, we outline a novel hybrid approach, which allows for the efficient compression of 3-D medical images as well as the embedding of a digital watermark, at the same time. In relation to the protection of 3-D microscopy images, the simultaneous embedding of two watermarks is explained. It should be noted that 3-D microscopy images are often used in delicate tasks (i.e., forensic analysis, etc.). Subsequently, we review a novel predictive structure that is appropriate for the lossless compression of different typologies of multidimensional data... [edited by Author]
XIII n.s.
9

Ng, Chi-kwan Miranda. "A study of the administrative provisions governing personal data protection in the Hong Kong Government." [Hong Kong] : University of Hong Kong, 1987. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12335368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pavlovic, Dusan <1981&gt. "Online Gambling in the UE: from Data Protection to Gambler Protection." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8721/1/PAVLOVIC_DUSAN_tesi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The thesis tends to answer how does the processing of online gamblers’ personal data, which is used for identification and commercial communication purposes, affect the protection of online gamblers in the EU? After the introduction into the context of online gambling in Europe and risks that jeopardize the protection of online gamblers and the concept of responsible gambling, the first part of the thesis sheds light on the relationship between the processing of online gamblers’ data and the provocation of problem gambling. The attention is given to the gambling-related commercial communication and its role in provoking problem gambling on one side. On other, data processing to identify gamblers is taken as a contributing factor to the recognition of problem gamblers and prevention of negative consequences deriving from gambling. In the second part of the thesis, the relations, tensions, and conflicts between the protection of online gamblers and the protection of personal data, as processed by online gambling service providers are analyzed. The work of Jaap-Henk Hoepman on privacy design strategies was used as an inspirational source for the designing of strategies for processing online gamblers’ personal data. The strategies for the processing of online gamblers’ personal data and accompanying tactics based on Hoepman’s proposals for data minimization and data separation strategies and their antipodes – data maximization and data linking strategies outline scenarios that may prevent/provoke problem gambling. The thesis analyzes the business practice regarding the types of online gambler data that is processed for gambling-related activities, including data processed for the protection of online gamblers. Finally, the legal analysis answers whether and to what extent the implementation of privacy-invasive strategies (data maximization and data linking strategies) could be lawful.

Books on the topic "Data protection":

1

Instruments, Great Britain Statutory. Data protection: The data protection regulations, 1985. London: H.M.S.O, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Morgan, Richard. Data protection strategy: Implementing data protection compliance. 2nd ed. London: Sweet & Maxwell/Thomson Reuters, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Morgan, Richard. Data protection strategy: Implementing data protection compliance. London: Sweet & Maxwell, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Channel, Executive Business, ed. Data protection. Stockport: Executive Business Channel, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Association, British Dental. Data protection. London: British Dental Association, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Judith, Firth, Nickson Susan, Hammond Suddards (Firm), and Chartered Institute of Personnel and Development., eds. Data protection. 2nd ed. London: Chartered Institute of Personnel and Development, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

(Firm), Hammond Suddards, ed. Data protection. London: Institute of Personnel and Development, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, Home. Protecting personal data: The Data Protection Act 1984. London: Home Office, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Great Britain. Office of the Data Protection Registrar., ed. Data Protection Act 1984, the data protection principles. Wilmslow: Data Protection Registrar, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Data protection":

1

Finch, John. "Data protection." In Speller’s Law Relating to Hospitals, 350–72. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-7122-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Toker, Kadir Atilla. "Data Protection." In Encyclopedia of Corporate Social Responsibility, 752–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-28036-8_419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hannah, Kathryn J., Marion J. Ball, and Margaret J. A. Edwards. "Data Protection." In Health Informatics, 194–209. New York, NY: Springer New York, 1999. http://dx.doi.org/10.1007/978-1-4757-3095-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Glasby, Jon, and Helen Dickinson. "Data Protection." In A–Z of Inter-Agency Working, 38–41. London: Macmillan Education UK, 2014. http://dx.doi.org/10.1007/978-1-137-00533-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies, 173–230. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Frost, Chris. "Data protection." In Privacy and the News Media, 104–10. London ; New York : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9780429029813-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kolb, Marina. "Data Protection." In The European Union and the Council of Europe, 63–86. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137023636_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Toker, Kadir Atilla. "Data Protection." In Encyclopedia of Sustainable Management, 1097–100. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25984-5_76.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data protection":

1

Bărbuceanu, Teodor, Razvan Craciunescu, and Eduard Popovici. "Data Protection Device." In 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2023. http://dx.doi.org/10.1109/ecai58194.2023.10194205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Skendzic, A., B. Kovacic, and E. Tijan. "General data protection regulation — Protection of personal data in an organisation." In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2018. http://dx.doi.org/10.23919/mipro.2018.8400247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fotiou, Nikos, George Xylomenos, and Yannis Thomas. "Data integrity protection for data spaces." In EuroSys '24: Nineteenth European Conference on Computer Systems. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3642974.3652284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Benjamin, Bruce, Joel Coffman, Hadi Esiely-Barrera, Kaitlin Farr, Dane Fichter, Daniel Genin, Laura Glendenning, et al. "Data Protection in OpenStack." In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 2017. http://dx.doi.org/10.1109/cloud.2017.77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gabillon, Alban, and Patrick Capolsini. "Protection of geographic data." In the First International Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2107581.2107588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

ANGUS, JOHN. "Software based data protection." In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kan, Senwen, Jennifer Dworak, and James George Dunham. "Echeloned IJTAG data protection." In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). IEEE, 2016. http://dx.doi.org/10.1109/asianhost.2016.7835558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Surtiwa, Salsabila Siliwangi, and Christian Jeremia Gultom. "ASEAN for Data Protection." In Asia-Pacific Research in Social Sciences and Humanities Universitas Indonesia Conference (APRISH 2019). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210531.090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sellami, Mohamed, Jean-Claude Royer, and Walid Benghabrit. "Accountability for data protection." In 2014 International Workshop on Computational Intelligence for Multimedia Understanding (IWCIM). IEEE, 2014. http://dx.doi.org/10.1109/iwcim.2014.7008804.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data protection":

1

Souppaya, Murugiah. Data Classification Concepts and Considerations for Improving Data Protection. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8496.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Riyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bandyopadhyay, Subhayu, and Suryadipta Roy. Corruption and Trade Protection: Evidence from Panel Data. Federal Reserve Bank of St. Louis, 2007. http://dx.doi.org/10.20955/wp.2007.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Perdana, Arif, and Saru Arifin. Finding a fix for Indonesia’s data protection problems. Edited by Ria Ernunsari. Monash University, December 2023. http://dx.doi.org/10.54377/130f-dbb9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chandramouli, Ramaswamy. A Data Protection Approach for Cloud-Native Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8505.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nasution, Sri. Improving Data Governance and Personal Data Protection through ASEAN Digital Masterplan 2025. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/353777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Notarianni, Kathy, and William Rinkinen. Protection of data processing equipment with fine water sprays. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.ir.5514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yin, Tianzhixi, Jianming Lian, John Buckheit, and Rui Fan. Bridging Power System Protection Gaps with Data-driven Approaches. Office of Scientific and Technical Information (OSTI), February 2021. http://dx.doi.org/10.2172/1771797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cunniffe, Emily, and Anne Sheridan. Data management in the international protection procedure in Ireland. ESRI, July 2021. http://dx.doi.org/10.26504/rs125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kuhn, D. Richard. A Data Structure for Integrity Protection with Erasure Capability. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.cswp.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography