Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 6949 dokumen yang sesuai dengan query
cover
London: Thomson Reuters, 2012
342.085 8 DAT
Buku Teks  Universitas Indonesia Library
cover
Freedman, Ronald
New York: The Population Council, 1974
304.630 72 FRE c
Buku Teks  Universitas Indonesia Library
cover
Morgan, Richard
London : Sweet & Maxwell, 2012
343.099 9 MOR d
Buku Teks  Universitas Indonesia Library
cover
Petrocelli, Tom
New Jersey: Prentice-Hall, 2006
005.8 PET d
Buku Teks  Universitas Indonesia Library
cover
Serge Gutwirth
"The book highlighting issues, describing and discussing practices, and offering conceptual analysis of core concepts within the domain of privacy and data protection. The book’s first part focuses on surveillance, profiling and prediction; the second on regulation, enforcement, and security; and the third on some of the fundamental concepts in the area of privacy and data protection. Reading the various chapters it appears that the ‘patient’ needs to be cured of quite some weak spots, illnesses and malformations. European data protection is at a turning point and the new challenges are not only accentuating the existing flaws and the anticipated difficulties, but also, more positively, the merits and the need for strong and accurate data protection practices and rules in Europe, and elsewhere."
Dordrecht, Netherlands: Springer, 2012
e20399992
eBooks  Universitas Indonesia Library
cover
"This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.
Shares results from several international research projects on IoT, cybersecurity, and privacy;
Combines complementary expertise from top experts in IoT, security, and data protection;
Provides a comprehensive view on how to protect IoT deployments and make them comply with the GDPR."
Switzerland: Springer Nature, 2019
e20509083
eBooks  Universitas Indonesia Library
cover
Jay, Rosemary
London : Sweet & Maxwell , 2012
342.410 85 JAY d
Buku Teks  Universitas Indonesia Library
cover
Van Alsenoy, Brendan
"EU data protection law imposes a series of requirements designed to protect individuals against the risks that result from the processing of their data. It also distinguishes among different types of actors involved in the processing, setting out different obligations for each actor. The most important distinction in this regard is the distinction between "controllers" and "processors". Together, these concepts provide the very basis upon which responsibility for compliance with EU data protection law is allocated. As a result, both concepts play a decisive role in determining the potential liability of an organisation under EU data protection law, including the General Data Protection Regulation (GDPR). Technological and societal developments have made it increasingly difficult to apply the controller-processor model in practice. The main factors are the growing complexity of processing operations, the diversification of processing, services and the sheer number of actors that can be involved. Against this background, this book seeks to determine whether EU data protection law should continue to maintain the controller-processor model as the main basis for allocating responsibility and liability. This book provides its readers with the analytical framework to help them navigate the intricate relationship of roles, responsibility and liability under EU data protection law. The book begins with an in-depth analysis of the nature and role of the controller and processor concepts. The key elements of each are examined in detail, as is the associated allocation of responsibility and liability. The next part contains a historical-comparative analysis, which traces the origin and development of the controller-processor model over time. To identify the main problems that occur when applying the controller-processor model in practice, a number of real-life use cases are examined (cloud computing, social media, identity management and search engines). In the final part, a critical evaluation is made of the choices made by the European legislature in the context of the GDPR. It is clear that the GDPR has introduced considerable improvements in comparison to EU Directive 95/46. In the long run, however, further changes may well be necessary. By way of conclusion, a number of avenues for possible improvements are presented. Dr Brendan Van Alsenoy is a Legal Advisor at the Belgian Data Protection Authority and a senior affiliated researcher at the KU Leuven Centre for IT & IP Law, and co-editor of Privacy & Persoonsgegevens. He has previously worked as a legal researcher at the KU Leuven Centre for IT & IP Law, with a focus on data protection and privacy, intermediary liability and trust services. In 2012, he worked at the Organisation for Economic Co-operation and Development (OECD) to assist in the revision of the 1980 OECD Privacy Guidelines."
United Kingdom: Intersentia, 2019
e20528764
eBooks  Universitas Indonesia Library
cover
cover
"Data merupakan hal pokok dari sebuah kebenaran informasi. Kesalahan memberikan data, berakibat pada ketidakakuratan informasi yang diterima oleh penerimanya, sebaliknya jika data adalah sesuai dengan fakta, maka informasi yang diterima adalah kebenaran. Dunia informasi tidak lepas dari data, sehingga perpustakaan sebagai pengelola informasi wajib melindungi datanya dari kerusakaan maupun dari pengrusakan. Tulisan ini memberikan informasi tentang pentingnya perlindungan data yang perlu dilakukan oleh perpustakaan, sebab-sebab kerusakan data, contoh kasus kerusakan data dari berbagai organisasi atau instansi, serta bagaimana cara melindungi data. Meski sepintas ulasan, diharapkan mampu memberikan manfaat yang lebih luas dalam hal pengembangan ilmu pengetahuan."
JIPI 1:1 (2011)
Artikel Jurnal  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>