|
|
|
|
LEADER |
03142nam a22004935i 4500 |
001 |
978-1-4471-5586-7 |
003 |
DE-He213 |
005 |
20151029221047.0 |
007 |
cr nn 008mamaa |
008 |
131015s2013 xxk| s |||| 0|eng d |
020 |
|
|
|a 9781447155867
|9 978-1-4471-5586-7
|
024 |
7 |
|
|a 10.1007/978-1-4471-5586-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.C66
|
072 |
|
7 |
|a UBJ
|2 bicssc
|
072 |
|
7 |
|a COM079000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
100 |
1 |
|
|a Wong, Rebecca.
|e author.
|
245 |
1 |
0 |
|a Data Security Breaches and Privacy in Europe
|h [electronic resource] /
|c by Rebecca Wong.
|
264 |
|
1 |
|a London :
|b Springer London :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a VII, 54 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Cybersecurity,
|x 2193-973X
|
505 |
0 |
|
|a Foreword -- Introduction -- Data Protection Directive 95/46/EC -- The Amended Directive on Privacy and Electronic Communications -- Art. 29 Working Party: Future of Privacy -- European Commission Communication Opinion 2010 -- Proposed Data Protection Regulation 2012: Data Security Breach Notifications -- Framework Decision 2005/222/JHA and the Directive against Information Systems -- European Data Protection Supervisor’s Opinion on Cybersecurity -- Cybersecurity Directive 2013 -- Criticism of the Cybersecurity Directive -- Concluding Remarks. .
|
520 |
|
|
|a Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a International law.
|
650 |
|
0 |
|a Intellectual property
|x Law and legislation.
|
650 |
|
0 |
|a Criminology.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a International IT and Media Law, Intellectual Property Law.
|
650 |
2 |
4 |
|a Criminology & Criminal Justice.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781447155850
|
830 |
|
0 |
|a SpringerBriefs in Cybersecurity,
|x 2193-973X
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4471-5586-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|