000 | 03315nam a22004935i 4500 | ||
---|---|---|---|
001 | 978-3-031-02349-1 | ||
003 | DE-He213 | ||
005 | 20240730163911.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2016 sz | s |||| 0|eng d | ||
020 |
_a9783031023491 _9978-3-031-02349-1 |
||
024 | 7 |
_a10.1007/978-3-031-02349-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aJoyee De, Sourya. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981108 |
|
245 | 1 | 0 |
_aPrivacy Risk Analysis _h[electronic resource] / _cby Sourya Joyee De, Daniel Le Métayer. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXV, 117 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aPreface -- Acknowledgments -- Introduction -- Terminology -- Processing System -- Personal Data -- Stakeholders -- Risk Sources -- Feared Events -- Privacy Harms -- Privacy Risk Analysis -- Conclusion -- Bibliography -- Authors' Biographies . | |
520 | _aPrivacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For privacy impact assessments to keep up their promises and really play a decisive role in enhancing privacy protection, they should be more precise with regard to these technical aspects. This book is an excellent resource for anyone developing and/or currently running a risk analysis as it defines the notions of personal data, stakeholders, risk sources, feared events, and privacy harms all while showing how these notions are used in the risk analysis process. It includes a running smart grids example to illustrate all the notions discussed in the book. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aMétayer, Daniel Le. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981109 |
|
710 | 2 |
_aSpringerLink (Online service) _981110 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012211 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034770 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _981111 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02349-1 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85107 _d85107 |