Privacy Risk Analysis (Record no. 85107)

000 -LEADER
fixed length control field 03315nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-3-031-02349-1
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730163911.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220601s2016 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031023491
-- 978-3-031-02349-1
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Joyee De, Sourya.
245 10 - TITLE STATEMENT
Title Privacy Risk Analysis
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2016.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 117 p.
490 1# - SERIES STATEMENT
Series statement Synthesis Lectures on Information Security, Privacy, and Trust,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Preface -- Acknowledgments -- Introduction -- Terminology -- Processing System -- Personal Data -- Stakeholders -- Risk Sources -- Feared Events -- Privacy Harms -- Privacy Risk Analysis -- Conclusion -- Bibliography -- Authors' Biographies .
520 ## - SUMMARY, ETC.
Summary, etc Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For privacy impact assessments to keep up their promises and really play a decisive role in enhancing privacy protection, they should be more precise with regard to these technical aspects. This book is an excellent resource for anyone developing and/or currently running a risk analysis as it defines the notions of personal data, stakeholders, risk sources, feared events, and privacy harms all while showing how these notions are used in the risk analysis process. It includes a running smart grids example to illustrate all the notions discussed in the book.
700 1# - AUTHOR 2
Author 2 Métayer, Daniel Le.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-02349-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1945-9750
912 ## -
-- ZDB-2-SXSC

No items available.