Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
1286 Ergebnisse
Sortierung:
The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best practices and reflect on the conflicting relationship between privacy and utility. From a practice standpoint, it provides practitioners and researchers with a definitive guide to approach anonymization of various data formats, including multidimensional, longitudinal, time-series, transaction, and graph data. In addition to helping CIOs protect confidential data, it also offers a guideline as to how this can be implemented for a wide range of data at the enterprise level.
Protecting Data Privacy in Health Services Research -- Copyright -- Preface -- Acknowledgments -- REVIEWERS -- Contents -- Executive Summary -- HEALTH SERVICES RESEARCH AND QUALITY ASSURANCE OR IMPROVEMENT -- PROTECTION OF HUMAN SUBJECTS -- GOOD PRACTICES -- PROJECT AND SCOPE -- RECOMMENDATIONS -- Best Practices for IRB Review of HSR Subject to Federal Regulations (Chapter 3) -- Best Practices for Review of HSR Not Necessarily Subject to Federal Regulation (Chapter 4) -- Recommendations for Next Steps (Chapter 5) -- 1 Introduction -- PRIVACY AND RESEARCH -- Privacy and Confidentiality -- Benefits and Risks of Harm in Research -- Federal Regulations -- HEALTH SERVICES RESEARCH -- BENEFITS OF HSR -- RISKS OF HARM FROM HSR -- BACKGROUND AND POLICY CONTEXT -- PROJECT AND SCOPE -- OUTLINE OF REPORT -- 2 Human Subjects Protection and Health Services Research in Federal Regulations -- IRBS AND HUMAN SUBJECTS PROTECTION -- Background of Federal Regulations -- IRB Review -- What Research Is Subject to Federal Regulations? -- What Establishes a Project as Research? -- What Establishes a Research Study as Involving Human Subjects? -- What HSR May Be Exempt from IRB Review? -- What HSR May Qualify for Expedited Review? -- May Informed Consent Be Waived? -- What Is Minimal Risk? -- PREVIOUS STUDIES OF IRBS -- HUMAN SUBJECTS PROTECTION IN HSR -- PRINCIPLES AND PRACTICES -- 3 Best Practices for IRB Review of Health Services Research Subject to Federal Regulations -- RECOMMENDATIONS -- 4 Best Practices for IRB or Other Review Board Oversight of Health Services Research Not Necessarily Subject to Federal... -- RECOMMENDATIONS -- 5 Recommendations for Next Steps -- RECOMMENDATIONS -- References -- Acronyms and Abbreviations -- APPENDIX A Study Activities -- WORKSHOP ON INSTITUTIONAL REVIEW BOARDS.
In: Advances in digital crime, forensics, and cyber terrorirsm
"In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field.Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students."--
In: Elgar advanced introductions
"Elgar Advanced Introductions are stimulating and thoughtful introductions to major fields in the social sciences, business and law, expertly written by the world's leading scholars. Designed to be accessible yet rigorous, they offer concise and lucid surveys of the substantive and policy issues associated with discrete subject areas. This timely Advanced Introduction traces the evolution of consumer data privacy laws in the US through a historical lens, and then sets out the current state of play. Waldman describes how privacy laws benefit corporate interests, and highlights the deficiencies of the present approach to the surveillance economy. In looking to the future, the author advocates a radical new way of thinking about the goals and tools of privacy law and provides a roadmap for avoiding privacy nihilism by rejuvenating public governance and protecting privacy in the digital age. Key Features: - Concise and accessible approach to a fast-changing area - Novel conceptualisation of first, second, and third waves of privacy law - In-depth critique of current and historic privacy law, challenging traditional literature - Focuses on practical ways to address deficiencies of current laws. The Advanced Introduction to U.S. Data Privacy Law will be an invaluable resource for students and scholars of privacy, as well as those in information, media and technology law. It will also be an essential guide for policy-makers and privacy lawyers seeking to understand the past, present, and future of data privacy"--
In: Undergraduate Topics in Computer Science
1. Introduction -- 2. Basics of Cryptography and Machine Learning -- 3. Privacy Models and Privacy Mechanisms -- 4. User's Privacy -- 5. Avoiding Disclosure from Computations -- 6. Avoiding Disclosure from Data Masking Methods -- 7. Other -- 8. Conclusions.