Digital Privacy

Digital Privacy: Theory, Technologies, and Practices

Published:
Content:
Editor(s):
Free Standard Shipping

Purchasing Options

Hardback
$91.95 $73.56
ISBN 9781420052176
Cat# AU5217
Add to cart
SAVE 20%
eBook (VitalSource)
$91.95 $64.37
ISBN 9781420052183
Cat# AUE5217
Add to cart
SAVE 30%
eBook Rentals
Other eBook Options:
 
 

Features

  • Discusses the principles of usability, deployability, effectiveness, and robustness when selecting and employing privacy enhancing technologies (PETs)
  • Examines attacks that compromise the path of a message as it travels through the anonymous system
  • Illustrates basic issues in the study of enterprise privacy policies and the underlying languages
  • Identifies research issues pertaining to privacy perceptions in online communities
  • Examines basic threats in ubiquitous environments and proposes an approach for bringing PETs to home-based ubicomp
  • Introduces a risk model IT firms can use to determine the risks that they are exposed to as a result of privacy violation and/or disclosure of personal data of its clients
  • Summary

    While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental issues of concern for most Internet users, ranked higher than ease-of-use, spam, cost, and security.

    Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. Editors Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, established researchers whose work enjoys worldwide recognition, draw on contributions from experts in academia, industry, and government to delineate theoretical, technical, and practical aspects of digital privacy. They provide an up-to-date, integrated approach to privacy issues that spells out what digital privacy is and covers the threats, rights, and provisions of the legal framework in terms of technical counter measures for the protection of an individual’s privacy. The work includes coverage of protocols, mechanisms, applications, architectures, systems, and experimental studies.

    Even though the utilization of personal information can improve customer services, increase revenues, and lower business costs, it can be easily misused and lead to violations of privacy. Important legal, regulatory, and ethical issues have emerged, prompting the need for an urgent and consistent response by electronic societies. Currently there is no book available that combines such a wide range of privacy topics with such a stellar cast of contributors. Filling that void, Digital Privacy: Theory, Techniques, and Practices gives you the foundation for building effective and legal privacy protocols into your business processes.

    Table of Contents

    THE PRIVACY SPACE


    Privacy Enhancing Technologies for the Internet III: Ten Years Later, I. Goldberg
    Communication Privacy, A. Pfitzmann, A. Juschka, A.-K. Stange, S. Steinbrecher, and S. Köpsell, and
    Privacy-Preserving Cryptographic Protocols, M.J. Atallah and K.B. Frikken

    PRIVACY ATTACKS


    Byzantine Attacks on Anonymity Systems, N. Borisov, G. Danezis, and P. Tabriz
    Introducing Traffic Analysis, G. Danezis and R. Clayton
    Privacy, Profiling, Targeted Marketing, and Data Mining, J. Vaidya and V. Atluri

    PRIVACY ENHANCING TECHNOLOGIES


    Enterprise Privacy Policies and Languages, M. Backes and M. Dürmuth
    Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation, A. Narayanan and V. Shmatikov
    Privacy Protection with Uncertainty and Indistinguishability, X.S. Wang and S. Jajodia
    Privacy-Preserving Techniques in Data Mining, C. Su, J. Zhou, F. Bao, G. Wang, and K. Sakurai

    USER PRIVACY


    HCI Designs for Privacy-Enhancing Identity Management, S. Fischer-Hübner, J. Sören Pettersson, M. Bergmann, M. Hansen, S. Pearson, and M. Casassa Mont
    Privacy Perceptions among Members of Online Communities, M. Karyda and S. Kokolakis
    Perceived Control: Scales for Privacy in Ubiquitous Computing, S. Spiekermann

    PRIVACY UBIQUITOUS COMPUTING


    RFID: Technological Issues and Privacy Concerns, P. Nájera and J. Lopez
    Privacy of Location Information, C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati
    Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp), J. Camp and K. Connelly

    THE ECONOMICS OF PRIVACY


    A Risk Model for Privacy Insurance, A.N. Yannacopoulos, S. Katsikas, S. Gritzalis, C. Lambrinoudakis, and S.Z. Xanthopoulos
    What Can Behavioral Economics Teach Us About Privacy? A. Acquisti and J. Grossklags

    PRIVACY AND POLICY


    Privacy of Outsourced Data, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, and P. Samarati
    Communications Data Retention: A Pandora’s Box for Rights and Liberties? L. Mitrou
    Surveillance of Emergent Associations: Freedom of Association in a Network Society, K.J. Strandburg

     
    Textbooks
    Other CRC Press Sites
    Featured Authors
    STAY CONNECTED
    Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
    Sign Up for Email Alerts
    © 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us