Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Cham :Palgrave Macmillan,
    UID:
    almahu_9949767383402882
    Umfang: 1 online resource (283 pages)
    Ausgabe: 1st ed.
    ISBN: 9783031510632
    Serie: Technology, Work and Globalization Series
    Anmerkung: Intro -- Acknowledgments -- Contents -- Notes on Contributors -- List of Figures -- List of Tables -- 1 Introduction to Human Privacy in Virtual and Physical Worlds -- Defining Privacy -- Viewing Privacy from Multiple Disciplines -- Foundations of Human Privacy -- Technical Views of Privacy -- Domain-Specific Views of Privacy -- Themes Across Chapters -- References -- Part I Foundations of Human Privacy -- 2 Exploring Privacy from a Philosophical Perspective: Conceptual and Normative Dimensions -- Introduction -- Concepts of Privacy -- Normative Dimensions of Privacy -- The Value of Privacy -- Privacy and Security -- Privacy and Transparency -- Privacy and Democratic Society -- Privacy Rights -- Privacy and the Self -- Privacy and Commodification -- Looking Ahead at Future Challenges -- References -- 3 What's So Special About Private Parts? How Anthropology Questions the Public-Private Dichotomy -- Introduction -- Public/Private Dichotomies of the Human Body -- Public/Private Dichotomies of Spaces -- Public/Private Dichotomies of Information -- Public/Private Dichotomies Provide Meaning to Symbolic Acts -- Private/Public Dichotomies: An Example from Egypt -- Privacy Cross-Culturally: The Notion of Solitude -- Weaving Dichotomies Together -- Traditional/Modern Dichotomies -- Invoking Privacy to Define Relationships -- Paths Forward -- References -- Part II Technical Views of Privacy -- 4 Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measures -- Introduction -- Brief Introduction to the Internet of Things (IoT) -- Overview of Common Attack Vectors -- The Dynamic Protections of Privacy in an Organization -- Anonymity in Cybersecurity -- The Privacy Control Catalog in NIST 800-53, Revision 5 -- Individual's Privacy Relating to Cybersecurity (Three Ways to Protect Your Privacy) -- Conclusions -- References. , 5 Data Governance, Privacy, and Ethics -- Introduction -- The Importance of Data Governance, Privacy, and Ethics in Today's World -- The Impact of Data Breaches on Individuals and Organizations -- The Role of Data Governance in Protecting Privacy and Ensuring Ethical Use of Data -- The Challenges of Implementing Effective Data Governance Policies -- The Ethical Considerations Surrounding the Collection, Storage, and Use of Personal Data -- The Legal and Regulatory Frameworks Governing Data Privacy and Ethics -- Looking to the Future -- References -- 6 Web2 Versus Web3 Information Privacy: An Information Systems Discipline Perspective -- Introduction to Web2 and Web3 -- Information Systems (IS) Scholars' Approach Privacy Research -- Privacy Paradox -- Privacy Calculus -- Privacy Fatigue -- Trust -- Lack of Choice -- Web2 and Web3 Explained -- User Access and PII Data Required -- Location and Governance of Software and Data -- Economic Model -- Web2 and Web3 Application Examples -- Web Browsing: Chrome vs. Brave -- Borrowing and Lending: Traditional Bank vs. Aave -- Metaverse: Meta vs. Decentraland -- File Storage: Dropbox vs. Filecoin -- Conclusion -- References -- 7 Multi-party Computation: Privacy in Coopetition -- Introduction -- Two-Party Computation -- Multi-party Computation-Mean -- Multi-party Computation-Standard Deviation -- Multi-party Computation-Moments of Distributions -- Multi-party Computation-Voting -- Multi-party Computation-Maximum -- Limitations and Other Applications -- References -- 8 Zero-Knowledge Proofs and Privacy: A Technical Look at Privacy -- Introduction -- Simple ZKP Examples -- Leaves in a Tree: Verifying a Secret Power -- Where's Waldo? -- Are You Old Enough To Drink? -- Proof of Color -- Never Write Checks -- Cryptographic Solutions -- Communicating Secrets -- Evolution of Cryptographic Proofs. , Technical Foundations of ZKPs -- Key Concepts and Terminology -- Foundational Characteristics -- Protocols, Algorithms, and Methods -- ZKP Use Cases -- Personal Privacy -- Challenges and Limitations -- Issues with Computational Costs and Efficiencies -- Issues With Trusted Setup -- Scalability Issues -- Conclusion -- References -- Part III Domain-Specific View of Privacy -- 9 An Architect's View of Privacy -- Introduction -- Theme 1: Privacy and Comfort in Design -- Theme 2: Private moments in public spaces: primary, secondary, and tertiary spaces -- Theme 3: Private Moments in Public Spaces: Light -- Theme 4: Private Moments in Public Spaces: Sound -- Theme 5: Ennobling the Prosaic -- 10 Healthcare Privacy in an Electronic Data Age -- Introduction -- Limitations and the Scope of Privacy -- A Note on HIPAA -- Technology and Data: The Promises and Perils to Privacy -- EHRs, PHRs, and Portals -- Biobanking and the Specter of Datamining -- Conclusion -- References -- 11 Privacy Considerations in Archival Practice and Research -- Introduction -- Privacy Considerations During Acquisition and Appraisal -- Record Creation, Creator Intent, and Donor Responsibility -- Third-Party Privacy -- Negotiating and Renegotiating Donor Restrictions -- Legal and Statutory Restrictions -- Ethical Considerations -- Choices and Constraints -- Archival Privacy: A Research Perspective -- Professional Standards -- Privacy During Research -- Personally Identifiable Information (PII) During Research -- Documenting Researcher Activity -- Legal Protections for Researcher Activity -- The University of Arkansas Special Collections as a Case Study -- Conclusion -- References -- 12 Employee and Customer Information Privacy Concerns in Supply Chain Management -- Introduction -- Overview of Supply Chain Management -- Order Fulfillment in Supply Chain Management. , Order Fulfillment in Retail Supply Chains -- Organizational Uses of Technology in Retail Fulfillment -- Customer Data Collected During Order Fulfillment -- Employee Data Collected During Order Fulfillment -- Privacy Concerns -- Employee Privacy in Retail Supply Chain Order Fulfillment -- Customer Privacy in Retail Supply Chain Order Fulfillment -- Summary -- References -- Index.
    Weitere Ausg.: Print version: Lacity, Mary C. Human Privacy in Virtual and Physical Worlds Cham : Palgrave Macmillan,c2024 ISBN 9783031510625
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz