Privacy Risk Analysis (Record no. 85107)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03315nam a22004935i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-02349-1 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730163911.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220601s2016 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031023491 |
-- | 978-3-031-02349-1 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Joyee De, Sourya. |
245 10 - TITLE STATEMENT | |
Title | Privacy Risk Analysis |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2016. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XV, 117 p. |
490 1# - SERIES STATEMENT | |
Series statement | Synthesis Lectures on Information Security, Privacy, and Trust, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Preface -- Acknowledgments -- Introduction -- Terminology -- Processing System -- Personal Data -- Stakeholders -- Risk Sources -- Feared Events -- Privacy Harms -- Privacy Risk Analysis -- Conclusion -- Bibliography -- Authors' Biographies . |
520 ## - SUMMARY, ETC. | |
Summary, etc | Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For privacy impact assessments to keep up their promises and really play a decisive role in enhancing privacy protection, they should be more precise with regard to these technical aspects. This book is an excellent resource for anyone developing and/or currently running a risk analysis as it defines the notions of personal data, stakeholders, risk sources, feared events, and privacy harms all while showing how these notions are used in the risk analysis process. It includes a running smart grids example to illustrate all the notions discussed in the book. |
700 1# - AUTHOR 2 | |
Author 2 | Métayer, Daniel Le. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-02349-1 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2016. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1945-9750 |
912 ## - | |
-- | ZDB-2-SXSC |
No items available.