Ergebnisse für *

Zeige Ergebnisse 1 bis 10 von 10.

  1. Market Integration Through Data Protection
    An Analysis of the Insurance and Financial Industries in the EU
    Erschienen: 2013
    Verlag:  Springer, Dordrecht

    In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial... mehr

    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    keine Fernleihe
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    keine Fernleihe
    Max-Planck-Institut für ausländisches und internationales Privatrecht, Bibliothek
    keine Fernleihe
    Bibliotheksservice-Zentrum Baden-Württemberg (BSZ)
    keine Fernleihe
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    keine Fernleihe
    Universitätsbibliothek Mannheim
    keine Fernleihe
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Nürtingen
    eBook Springer
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial and insurance services.  Further, it identifies the differences in the data protection systems of EU member states and provides some recommendations for the upcoming review of the EU Data Protection Framework. Divided into four parts, the book starts out with a discussion of the evolution of the right to privacy, focusing on the last few decades, and taking into account the development of new technologies.  The second part discusses the interaction between data protection and specific industries that serve as case studies: insurance, banking and credit reporting. The focus of this part is on generalization and discrimination, adverse selection and the processing of sensitive and genetic data. The third part of the book presents an analysis of the legislation of three EU Member States (France, Italy and UK). Specific elements of analysis that are compared are the concepts of personal and anonymous data, data protection principles, the role of the data protection authorities, the role of the data protection officer, data subjects’ rights, the processing of sensitive data, the processing of genetic data and the experience of the case studies in processing data. The book concludes by proposing recommendations aiming at increasing the level of harmonisation at the EU level and at fostering the creation of a single market for the industries which use personal information as an important raw material for their activities, taking into account the different levels of data protection that exist in EU member states

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (lizenzpflichtig)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9789400760851
    Weitere Identifier:
    RVK Klassifikation: PZ 4800 ; QQ 600 ; QK 010 ; PS 3854
    Schriftenreihe: Law, Governance and Technology Series ; 9
    Array
    Schlagworte: Datenschutz; Grundrecht; EU-Recht; Finanzsektor; Frankreich; Italien; Großbritannien; Computers; Mass media; Europe; Law; Law; Computers; Mass media; Europe
    Weitere Schlagworte: European Union; MERCOSUR (Organization); Array; Array; Array; Array; Array; Array
    Umfang: Online-Ressource (XVI, 225 p, digital)
    Bemerkung(en):

    Includes bibliographical references

    Market Integration Through Data Protection; Book Abstract; Acknowledgements; Contents; Introduction; Chapter 1: The Protection of Personal Data: Evolution and Standards in Europe; 1.1 The Right to Privacy: From the "Right to Be Let Alone" to Data Protection; 1.2 Council of Europe Convention 108/1981; 1.3 The European Union Data Protection Framework; 1.3.1 Directive 95/46/EC; 1.3.1.1 Legal Grounds for the Processing of Personal Data; 1.3.1.2 Data Subjects' Rights and Storage of Personal Data; 1.3.1.3 Data Transfer to Third Countries (Adequacy); 1.3.1.4 Institutional and Regulatory Bodies

    1.3.2 Regulation 45/20011.3.3 Council Framework Decision 2008/977/JHA; 1.4 Chapter Conclusion; Chapter 2: Data Protection and the Insurance, Banking and Credit Reporting Industries; 2.1 The Processing of Personal Data by Insurance Companies, Banks and Credit Information Suppliers; 2.1.1 Risk Analysis and Adverse Selection; 2.1.2 Generalisation and Discrimination; 2.1.3 The Processing of Sensitive Data; 2.2 Genetic Predictive Tests and the Insurance Industry; 2.2.1 The Concept of Genetic Data and its Distinction from Other Health Data

    2.2.2 Claims for the Use of Genetic Data: Are They Enough to Legitimise It?2.2.3 The Future of Genetic Data Processing Within the Insurance Industry; 2.3 Chapter Conclusion; Chapter 3: Data Protection Systems in the European Union: The French Experience; 3.1 The Data Protection Authority: Enforcement Powers, Labels and General Authorisations; 3.2 The Concept of Personal Data; 3.3 The Processing of Sensitive Data; 3.4 Data Subjects' Rights; 3.5 The Processing of Personal Data by the Case Studies; 3.5.1 The Banking Sector; 3.5.2 The Credit Information Suppliers; 3.5.3 The Insurance Industry

    3.6 Other Relevant Issues3.6.1 The Data Protection Officer; 3.7 Chapter Conclusion; Chapter 4: Data Protection Systems in the European Union: The UK Experience; 4.1 The Data Protection Authority: The Role of the UK Information Commissioner; 4.2 The Concept of Personal Data; 4.3 The Processing of Sensitive Data; 4.4 Data Subjects' Rights: The Rights of Preventing a Processing Likely to Cause Damage or Distress and the Obtaining of Records Under the Data Subject's Right to Access; 4.5 The Processing of Personal Data by the Case Studies; 4.5.1 The Banking Sector; 4.5.1.1 Fight Against Fraud

    4.5.2 The Credit Information Suppliers4.5.2.1 Access to Information Related to Third Parties; 4.5.3 The Insurance Industry; 4.5.3.1 Sensitive Data in the Insurance Sector; 4.5.3.2 Fight Against Fraud; 4.5.3.3 The Processing of Genetic Data; 4.6 Other Relevant Issues; 4.6.1 Data Protection Principles: The Necessity Test and Data Minimisation; 4.6.2 The Scope of Consent; 4.6.3 The Data Protection Officer; 4.7 Chapter Conclusion; Chapter 5: Data Protection Systems in the European Union: The Italian Experience; 5.1 The Data Protection Authority; 5.2 The Concept of Personal Data

    5.3 Data Subjects' Rights

  2. Legal Argumentation Theory: Cross-Disciplinary Perpectives
    Erschienen: 2013
    Verlag:  Springer, Dordrecht

    This book offers its readers an overview of recent developments in the theory of legal argumentation written by representatives from various disciplines, including argumentation theory, philosophy of law, logic and artificial intelligence. It... mehr

    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    keine Fernleihe
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    keine Fernleihe
    Max-Planck-Institut für ausländisches und internationales Privatrecht, Bibliothek
    keine Fernleihe
    Bibliotheksservice-Zentrum Baden-Württemberg (BSZ)
    keine Fernleihe
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    keine Fernleihe
    Universitätsbibliothek Mannheim
    keine Fernleihe
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Nürtingen
    eBook Springer
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    This book offers its readers an overview of recent developments in the theory of legal argumentation written by representatives from various disciplines, including argumentation theory, philosophy of law, logic and artificial intelligence. It presents an overview of contributions representative of different academic and legal cultures, and different continents and countries. The book contains contributions on strategic maneuvering, argumentum ad absurdum, argumentum ad hominem, consequentialist argumentation, weighing and balancing, the relation between legal argumentation and truth, the distinction between the context of discovery and context of justification, and the role of constitutive and regulative rules in legal argumentation. It is based on a selection of papers that were presented in the special workshop on Legal Argumentation organized at the 25th IVR World Congress for Philosophy of Law and Social Philosophy held 15-20 August 2011 in Frankfurt, Germany. 

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (lizenzpflichtig)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9789400746701
    Weitere Identifier:
    RVK Klassifikation: PI 4130
    Schriftenreihe: Law and Philosophy Library ; 102
    Array
    Schlagworte: Philosophy of law; Computers; Semantics; Humanities; Law; Law; Philosophy of law; Computers; Semantics; Humanities
    Weitere Schlagworte: Forensic orations; Array
    Umfang: Online-Ressource (XII, 233 p. 7 illus, digital)
    Bemerkung(en):

    Description based upon print version of record

    Legal Argumentation Theory: Cross-Disciplinary Perspectives; Introduction; Contents; Chapter 1: Reasoning by Consequences: Applying Different Argumentation Structures to the Analysis of Consequentialist Reasoning in Judicial Decisions; 1.1 Introduction; 1.2 Theories on Consequentialist Reasoning; 1.2.1 MacCormick's Theory; 1.2.2 Wróblewski's Theory; 1.2.3 Feteris' Pragma-Dialectical Proposal; 1.3 Judges on Consequences; 1.4 Conclusions; References; Chapter 2: On the Argumentum ad Absurdum in Statutory Interpretation: Its Uses and Normative Significance; 2.1 Introduction

    2.2 The Strictly Logical Sense of the Argumentum ad Absurdum2.3 The Argumentum ad Absurdum as a Special Case of Pragmatic Argument; 2.3.1 The Problem of the Indeterminacy of Pragmatic Arguments and the Distinctive Feature of the ad Absurdum Argument; 2.3.2 The Difference Between the Argumentum ad Absurdum and the Generic Consequentialist Arguments; 2.3.3 The Context of the ad Absurdum Argument; 2.3.4 The Foundation of the Argumentum ad Absurdum; 2.3.4.1 The Nature of the Assumption of the Rational Legislator

    2.3.4.2 A Second Thought on the Nature of the ad Absurdum Argument: Absurdity as Unreasonableness2.3.4.3 On the Foundations of the ad Absurdum Argument and the Assumption of the Rational Legislator; 2.3.5 The Practical Requirements of the Pragmatic Version of the ad Absurdum Argument; 2.4 Final Considerations; References; Chapter 3: Why Precedent in Law (and Elsewhere) Is Not Totally (or Even Substantially) About Analogy; 3.1 Analogy as a Friend; 3.2 Precedent as a Foe; 3.3 On the Differences Between Analogy and Precedent; 3.4 Does Precedential Constraint Make Sense?

    3.5 Towards a Research Program on PrecedentReferences; Chapter 4: Fallacies in Ad Hominem Arguments; 4.1 Introduction; 4.2 Definition of Argument Ad Hominem; 4.3 Ad Hominem Fallacies; 4.4 Talking About Errors as Fallacies; 4.5 Conclusions; References; Chapter 5: The Rule of Law and the Ideal of a Critical Discussion; 5.1 Introduction; 5.2 The Pragma-Dialectical Approach to Legal Argumentation; 5.2.1 Methodological Starting-Points; 5.2.2 Reasonableness and the Ideal Model of a Critical Discussion; 5.3 The Ideal of the Rule of Law; 5.4 Reconstructing Judicial Standpoints in Legal Decisions

    5.4.1 Houtlosser Defines the Speech Act `Advancing a Standpoint' with the following conditions5.5 Conclusion; References; Chapter 6: Strategic Maneuvering with the Argumentative Role of Legal Principles in the Case of the "Unworthy Spouse"; 6.1 Introduction; 6.2 The Case of the `Unworthy Spouse'; 6.3 Dialectical Analysis of the Argumentation of the Supreme Court; 6.4 Dialectical Analysis of the Contributions to the Discussion of the Court of Appeal and the Supreme Court; 6.4.1 Dialectical Analysis of the Contributions of the Court of Appeal

    6.4.2 Dialectical Analysis of the Contributions of the Supreme Court

  3. Resistance, Liberation Technology and Human Rights in the Digital Age
    Erschienen: 2013
    Verlag:  Springer, Dordrecht

    This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and... mehr

    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    keine Fernleihe
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    keine Fernleihe
    Max-Planck-Institut für ausländisches und internationales Privatrecht, Bibliothek
    keine Fernleihe
    Bibliotheksservice-Zentrum Baden-Württemberg (BSZ)
    keine Fernleihe
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    keine Fernleihe
    Universitätsbibliothek Mannheim
    keine Fernleihe
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Nürtingen
    eBook Springer
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and "Twitter Revolutions”), and the hacking of political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes.

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (lizenzpflichtig)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9789400752764; 1283698196; 9781283698191
    Weitere Identifier:
    RVK Klassifikation: PR 2213 ; MD 4700
    Schriftenreihe: Law, Governance and Technology Series ; 7
    Array
    Schlagworte: Philosophy (General); Philosophy of law; Computer science; Computers; Criminal Law; Mass media; Constitutional law; Philosophy; Philosophy (General); Philosophy of law; Computer science; Computers; Criminal Law; Mass media; Constitutional law
    Umfang: Online-Ressource (VIII, 328 p, digital)
    Bemerkung(en):

    Description based upon print version of record

    Resistance, Liberation Technology and Human Rights in the Digital Age; Contents; Chapter 1: Opening Remarks: Hacking and Digital Dissidence; 1.1 Using Computers for the Pursuit of Political and Social Changes and for the Benefit of All Mankind; 1.2 From Early Hackers to Digital Resistance Activities; 1.3 The So-Called Twitter Revolutions; 1.4 The Worldwide Scenario, and Some Preliminary Interpretative Questions; References; Chapter 2: Digital Resistance, Digital Liberties and Digital Transparency; 2.1 A Preliminary Definition of Digital Resistance and Digital Liberties

    2.1.1 Some Focal Aspects of Digital Dissidence2.1.2 Preliminary Legal and Political Remarks; 2.1.3 The Power of Technology in Critical Contexts and the New Public Sphere; 2.2 The Fundamental Role of a Secure (and Peer-Reviewed) Liberation Technology: The Haystack Case-History; 2.3 Two Key Aspects of Digital Resistance Activities, and Several Case Studies; 2.3.1 The Key Aspects of Dissident Activities; 2.3.2 Digital Resistance Case-Studies; 2.3.2.1 Cyber-Resistance in Saudi Arabia in the 1990s; 2.3.2.2 E-Resistance Among Palestinian Women

    2.3.2.3 Digital Resistance as an Art Form : Critical Art Ensemble Theories2.3.2.4 Digital Technology and Human Rights: Soldier Photography of Detainee Abuse in Iraq; 2.4 Open Government, Collaborative Transparency and Civic Hacking as a Form of Digital Resistance; 2.4.1 The Idea of Government as a Platform for Transparency; 2.4.2 The Metaphor of Government 2.0 and the Idea of Collaborative Transparency; 2.4.3 Citizen Engagement for the Oversight of Political Activity; 2.4.3.1 Monitoring Public Spending and Expenditure Mapping

    2.4.3.2 Monitoring Political and Legislative Activities: The New Active Cyber-electorate2.4.4 Collaborative Mapping and Digital Resistance; 2.4.4.1 Digital Activism in Public Sector; 2.4.4.2 Elections Oversight as a Form of Digital Resistance; 2.4.4.3 Monitoring the Violation of Human Rights; 2.4.4.4 Digital Transparency as a Weapon to Combat Public Sector Corruption; References; Chapter 3: Hacking and Digital Dissidence Activities; 3.1 The Role of Hackers in the Landscape of Digital Resistance; 3.2 A First Analysis of Common Threats to Digital Freedom and to Hacker Activities

    3.3 Being a Hacker in This Framework3.3.1 Thinking Like a Hacker; 3.3.2 State Antagonism, Fear and Violence; 3.4 A Brand New Playground; 3.4.1 Liberation Technologies; 3.4.2 Anonymity and Bloggers' Rights; 3.4.3 Innovation; 3.4.4 Intellectual Property and Privacy; 3.4.5 EPIC Activities in the Field of Privacy; 3.4.6 Transparency; 3.5 A New Perspective on Hacking; 3.5.1 The Essence of Hacking; 3.5.2 The Hacker Spirit and Some Lessons from the Ushahidi Project; 3.5.3 A New Breed of Hackers; 3.6 The Do-It-Yourself Approach; 3.7 The Hacker Ethic; 3.8 Hacking and Crime; 3.9 Threats to Hackers

    3.9.1 The EFF Report Unintended Consequences

  4. God in the machine
    video games and religion
    Autor*in: Leibovitz, Liel
    Erschienen: 2013; © 2013
    Verlag:  Templeton Press, West Conshohocken, Pennsylvania

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781599474373; 9781599474502
    Schlagworte: Christentum; Künstliche Intelligenz; Religion; Artificial intelligence; Computers; Religion and science; Robotics; Theological anthropology; Computerspiel; Theologie
    Umfang: 1 online resource (157 pages)
    Bemerkung(en):

    Includes index

    Description based on online resource; title from PDF title page (ebrary, viewed March 19, 2014)

  5. Legal Argumentation Theory: Cross-Disciplinary Perpectives
    Erschienen: 2013
    Verlag:  Springer, Dordrecht

    This book offers its readers an overview of recent developments in the theory of legal argumentation written by representatives from various disciplines, including argumentation theory, philosophy of law, logic and artificial intelligence. It... mehr

    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    keine Fernleihe
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    keine Fernleihe
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    This book offers its readers an overview of recent developments in the theory of legal argumentation written by representatives from various disciplines, including argumentation theory, philosophy of law, logic and artificial intelligence. It presents an overview of contributions representative of different academic and legal cultures, and different continents and countries. The book contains contributions on strategic maneuvering, argumentum ad absurdum, argumentum ad hominem, consequentialist argumentation, weighing and balancing, the relation between legal argumentation and truth, the distinction between the context of discovery and context of justification, and the role of constitutive and regulative rules in legal argumentation. It is based on a selection of papers that were presented in the special workshop on Legal Argumentation organized at the 25th IVR World Congress for Philosophy of Law and Social Philosophy held 15-20 August 2011 in Frankfurt, Germany. 

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (lizenzpflichtig)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9789400746701
    Weitere Identifier:
    RVK Klassifikation: PI 4130
    Schriftenreihe: Law and Philosophy Library ; 102
    Schlagworte: Law; Philosophy of law; Computers; Semantics; Humanities
    Umfang: Online-Ressource, digital
    Bemerkung(en):

    Description based upon print version of record

    Electronic reproduction; Available via World Wide Web

    Legal Argumentation Theory: Cross-Disciplinary Perspectives; Introduction; Contents; Chapter 1: Reasoning by Consequences: Applying Different Argumentation Structures to the Analysis of Consequentialist Reasoning in Judicial Decisions; 1.1 Introduction; 1.2 Theories on Consequentialist Reasoning; 1.2.1 MacCormick's Theory; 1.2.2 Wróblewski's Theory; 1.2.3 Feteris' Pragma-Dialectical Proposal; 1.3 Judges on Consequences; 1.4 Conclusions; References; Chapter 2: On the Argumentum ad Absurdum in Statutory Interpretation: Its Uses and Normative Significance; 2.1 Introduction

    2.2 The Strictly Logical Sense of the Argumentum ad Absurdum2.3 The Argumentum ad Absurdum as a Special Case of Pragmatic Argument; 2.3.1 The Problem of the Indeterminacy of Pragmatic Arguments and the Distinctive Feature of the ad Absurdum Argument; 2.3.2 The Difference Between the Argumentum ad Absurdum and the Generic Consequentialist Arguments; 2.3.3 The Context of the ad Absurdum Argument; 2.3.4 The Foundation of the Argumentum ad Absurdum; 2.3.4.1 The Nature of the Assumption of the Rational Legislator

    2.3.4.2 A Second Thought on the Nature of the ad Absurdum Argument: Absurdity as Unreasonableness2.3.4.3 On the Foundations of the ad Absurdum Argument and the Assumption of the Rational Legislator; 2.3.5 The Practical Requirements of the Pragmatic Version of the ad Absurdum Argument; 2.4 Final Considerations; References; Chapter 3: Why Precedent in Law (and Elsewhere) Is Not Totally (or Even Substantially) About Analogy; 3.1 Analogy as a Friend; 3.2 Precedent as a Foe; 3.3 On the Differences Between Analogy and Precedent; 3.4 Does Precedential Constraint Make Sense?

    3.5 Towards a Research Program on PrecedentReferences; Chapter 4: Fallacies in Ad Hominem Arguments; 4.1 Introduction; 4.2 Definition of Argument Ad Hominem; 4.3 Ad Hominem Fallacies; 4.4 Talking About Errors as Fallacies; 4.5 Conclusions; References; Chapter 5: The Rule of Law and the Ideal of a Critical Discussion; 5.1 Introduction; 5.2 The Pragma-Dialectical Approach to Legal Argumentation; 5.2.1 Methodological Starting-Points; 5.2.2 Reasonableness and the Ideal Model of a Critical Discussion; 5.3 The Ideal of the Rule of Law; 5.4 Reconstructing Judicial Standpoints in Legal Decisions

    5.4.1 Houtlosser Defines the Speech Act `Advancing a Standpoint' with the following conditions5.5 Conclusion; References; Chapter 6: Strategic Maneuvering with the Argumentative Role of Legal Principles in the Case of the "Unworthy Spouse"; 6.1 Introduction; 6.2 The Case of the `Unworthy Spouse'; 6.3 Dialectical Analysis of the Argumentation of the Supreme Court; 6.4 Dialectical Analysis of the Contributions to the Discussion of the Court of Appeal and the Supreme Court; 6.4.1 Dialectical Analysis of the Contributions of the Court of Appeal

    6.4.2 Dialectical Analysis of the Contributions of the Supreme Court

  6. Resistance, Liberation Technology and Human Rights in the Digital Age
    Erschienen: 2013
    Verlag:  Springer, Dordrecht

    This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and... mehr

    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    keine Fernleihe
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    keine Fernleihe
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and "Twitter Revolutions”), and the hacking of political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes.

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (lizenzpflichtig)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1283698196; 9789400752764; 9781283698191
    Weitere Identifier:
    RVK Klassifikation: MD 4700
    Schriftenreihe: Law, Governance and Technology Series ; 7
    Schlagworte: Philosophy (General); Philosophy of law; Computer science; Computers; Criminal Law; Mass media; Constitutional law
    Umfang: Online-Ressource, digital
    Bemerkung(en):

    Description based upon print version of record

    Resistance, Liberation Technology and Human Rights in the Digital Age; Contents; Chapter 1: Opening Remarks: Hacking and Digital Dissidence; 1.1 Using Computers for the Pursuit of Political and Social Changes and for the Benefit of All Mankind; 1.2 From Early Hackers to Digital Resistance Activities; 1.3 The So-Called Twitter Revolutions; 1.4 The Worldwide Scenario, and Some Preliminary Interpretative Questions; References; Chapter 2: Digital Resistance, Digital Liberties and Digital Transparency; 2.1 A Preliminary Definition of Digital Resistance and Digital Liberties

    2.1.1 Some Focal Aspects of Digital Dissidence2.1.2 Preliminary Legal and Political Remarks; 2.1.3 The Power of Technology in Critical Contexts and the New Public Sphere; 2.2 The Fundamental Role of a Secure (and Peer-Reviewed) Liberation Technology: The Haystack Case-History; 2.3 Two Key Aspects of Digital Resistance Activities, and Several Case Studies; 2.3.1 The Key Aspects of Dissident Activities; 2.3.2 Digital Resistance Case-Studies; 2.3.2.1 Cyber-Resistance in Saudi Arabia in the 1990s; 2.3.2.2 E-Resistance Among Palestinian Women

    2.3.2.3 Digital Resistance as an Art Form : Critical Art Ensemble Theories2.3.2.4 Digital Technology and Human Rights: Soldier Photography of Detainee Abuse in Iraq; 2.4 Open Government, Collaborative Transparency and Civic Hacking as a Form of Digital Resistance; 2.4.1 The Idea of Government as a Platform for Transparency; 2.4.2 The Metaphor of Government 2.0 and the Idea of Collaborative Transparency; 2.4.3 Citizen Engagement for the Oversight of Political Activity; 2.4.3.1 Monitoring Public Spending and Expenditure Mapping

    2.4.3.2 Monitoring Political and Legislative Activities: The New Active Cyber-electorate2.4.4 Collaborative Mapping and Digital Resistance; 2.4.4.1 Digital Activism in Public Sector; 2.4.4.2 Elections Oversight as a Form of Digital Resistance; 2.4.4.3 Monitoring the Violation of Human Rights; 2.4.4.4 Digital Transparency as a Weapon to Combat Public Sector Corruption; References; Chapter 3: Hacking and Digital Dissidence Activities; 3.1 The Role of Hackers in the Landscape of Digital Resistance; 3.2 A First Analysis of Common Threats to Digital Freedom and to Hacker Activities

    3.3 Being a Hacker in This Framework3.3.1 Thinking Like a Hacker; 3.3.2 State Antagonism, Fear and Violence; 3.4 A Brand New Playground; 3.4.1 Liberation Technologies; 3.4.2 Anonymity and Bloggers' Rights; 3.4.3 Innovation; 3.4.4 Intellectual Property and Privacy; 3.4.5 EPIC Activities in the Field of Privacy; 3.4.6 Transparency; 3.5 A New Perspective on Hacking; 3.5.1 The Essence of Hacking; 3.5.2 The Hacker Spirit and Some Lessons from the Ushahidi Project; 3.5.3 A New Breed of Hackers; 3.6 The Do-It-Yourself Approach; 3.7 The Hacker Ethic; 3.8 Hacking and Crime; 3.9 Threats to Hackers

    3.9.1 The EFF Report Unintended Consequences

  7. Market Integration Through Data Protection
    An Analysis of the Insurance and Financial Industries in the EU
    Erschienen: 2013
    Verlag:  Springer, Dordrecht

    In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial... mehr

    Max-Planck-Institut für ethnologische Forschung, Bibliothek
    keine Fernleihe
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    keine Fernleihe
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    keine Fernleihe
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial and insurance services.  Further, it identifies the differences in the data protection systems of EU member states and provides some recommendations for the upcoming review of the EU Data Protection Framework. Divided into four parts, the book starts out with a discussion of the evolution of the right to privacy, focusing on the last few decades, and taking into account the development of new technologies.  The second part discusses the interaction between data protection and specific industries that serve as case studies: insurance, banking and credit reporting. The focus of this part is on generalization and discrimination, adverse selection and the processing of sensitive and genetic data. The third part of the book presents an analysis of the legislation of three EU Member States (France, Italy and UK). Specific elements of analysis that are compared are the concepts of personal and anonymous data, data protection principles, the role of the data protection authorities, the role of the data protection officer, data subjects’ rights, the processing of sensitive data, the processing of genetic data and the experience of the case studies in processing data. The book concludes by proposing recommendations aiming at increasing the level of harmonisation at the EU level and at fostering the creation of a single market for the industries which use personal information as an important raw material for their activities, taking into account the different levels of data protection that exist in EU member states

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (lizenzpflichtig)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9789400760851
    Weitere Identifier:
    RVK Klassifikation: PS 3854
    Schriftenreihe: Law, Governance and Technology Series ; 9
    Schlagworte: Law; Computers; Mass media; Europe
    Umfang: Online-Ressource (XVI, 225 p), digital
    Bemerkung(en):

    Includes bibliographical references

    Electronic reproduction; Available via World Wide Web

    Market Integration Through Data Protection; Book Abstract; Acknowledgements; Contents; Introduction; Chapter 1: The Protection of Personal Data: Evolution and Standards in Europe; 1.1 The Right to Privacy: From the "Right to Be Let Alone" to Data Protection; 1.2 Council of Europe Convention 108/1981; 1.3 The European Union Data Protection Framework; 1.3.1 Directive 95/46/EC; 1.3.1.1 Legal Grounds for the Processing of Personal Data; 1.3.1.2 Data Subjects' Rights and Storage of Personal Data; 1.3.1.3 Data Transfer to Third Countries (Adequacy); 1.3.1.4 Institutional and Regulatory Bodies

    1.3.2 Regulation 45/20011.3.3 Council Framework Decision 2008/977/JHA; 1.4 Chapter Conclusion; Chapter 2: Data Protection and the Insurance, Banking and Credit Reporting Industries; 2.1 The Processing of Personal Data by Insurance Companies, Banks and Credit Information Suppliers; 2.1.1 Risk Analysis and Adverse Selection; 2.1.2 Generalisation and Discrimination; 2.1.3 The Processing of Sensitive Data; 2.2 Genetic Predictive Tests and the Insurance Industry; 2.2.1 The Concept of Genetic Data and its Distinction from Other Health Data

    2.2.2 Claims for the Use of Genetic Data: Are They Enough to Legitimise It?2.2.3 The Future of Genetic Data Processing Within the Insurance Industry; 2.3 Chapter Conclusion; Chapter 3: Data Protection Systems in the European Union: The French Experience; 3.1 The Data Protection Authority: Enforcement Powers, Labels and General Authorisations; 3.2 The Concept of Personal Data; 3.3 The Processing of Sensitive Data; 3.4 Data Subjects' Rights; 3.5 The Processing of Personal Data by the Case Studies; 3.5.1 The Banking Sector; 3.5.2 The Credit Information Suppliers; 3.5.3 The Insurance Industry

    3.6 Other Relevant Issues3.6.1 The Data Protection Officer; 3.7 Chapter Conclusion; Chapter 4: Data Protection Systems in the European Union: The UK Experience; 4.1 The Data Protection Authority: The Role of the UK Information Commissioner; 4.2 The Concept of Personal Data; 4.3 The Processing of Sensitive Data; 4.4 Data Subjects' Rights: The Rights of Preventing a Processing Likely to Cause Damage or Distress and the Obtaining of Records Under the Data Subject's Right to Access; 4.5 The Processing of Personal Data by the Case Studies; 4.5.1 The Banking Sector; 4.5.1.1 Fight Against Fraud

    4.5.2 The Credit Information Suppliers4.5.2.1 Access to Information Related to Third Parties; 4.5.3 The Insurance Industry; 4.5.3.1 Sensitive Data in the Insurance Sector; 4.5.3.2 Fight Against Fraud; 4.5.3.3 The Processing of Genetic Data; 4.6 Other Relevant Issues; 4.6.1 Data Protection Principles: The Necessity Test and Data Minimisation; 4.6.2 The Scope of Consent; 4.6.3 The Data Protection Officer; 4.7 Chapter Conclusion; Chapter 5: Data Protection Systems in the European Union: The Italian Experience; 5.1 The Data Protection Authority; 5.2 The Concept of Personal Data

    5.3 Data Subjects' Rights

  8. Computerspiel- und Internetsucht
    ein kognitiv-behaviorales Behandlungsmanual
    Erschienen: 2013
    Verlag:  Verlag W. Kohlhammer, Stuttgart

    Alice Salomon Hochschule Berlin, Bibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Humboldt-Universität zu Berlin, Universitätsbibliothek, Jacob-und-Wilhelm-Grimm-Zentrum
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Katholische Hochschule für Sozialwesen Berlin, Bibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Verbund der Öffentlichen Bibliotheken Berlins - VÖBB
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Fachhochschule Potsdam, Hochschulbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universität Potsdam, Universitätsbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Sprache: Deutsch
    Medientyp: Buch (Monographie)
    ISBN: 9783170216976; 317021697X
    Weitere Identifier:
    9783170216976
    RVK Klassifikation: CU 3500 ; CW 6940 ; DS 7500 ; YH 2800
    Auflage/Ausgabe: 1. Auflage
    Schriftenreihe: Störungsspezifische Psychotherapie
    Schlagworte: Internet; Computers; Behavior, Addictive; Impulse Control Disorders; Cognitive Therapy - methods; Case Reports; Stoffungebundene Sucht; Computerspiel; Online-Sucht; Kognitive Verhaltenstherapie
    Umfang: 153 Seiten, Illustrationen
    Bemerkung(en):

    Content-Plus-Zusatzmaterialien unter www.kohlhammer.de. - Literaturverzeichnis: Seite 145-150

  9. Information Technologies for Performing Arts, Media Access, and Entertainment
    Second International Conference, ECLAP 2013, Porto, Portugal, April 8-10, 2013, Revised Selected Papers
    Beteiligt: Nesi, Paolo (Herausgeber); Santucci, Raffaella (Herausgeber)
    Erschienen: 2013
    Verlag:  Springer Berlin Heidelberg, Berlin, Heidelberg ; Springer International Publishing AG, Cham

    Bibliothek der Hochschule Darmstadt, Zentralbibliothek
    keine Fernleihe
    TU Darmstadt, Universitäts- und Landesbibliothek - Stadtmitte
    keine Fernleihe
    Universitätsbibliothek J. C. Senckenberg, Zentralbibliothek (ZB)
    keine Fernleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Beteiligt: Nesi, Paolo (Herausgeber); Santucci, Raffaella (Herausgeber)
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9783642400506; 3642400507
    Weitere Identifier:
    RVK Klassifikation: AK 54350
    DDC Klassifikation: Datenverarbeitung; Informatik (004); Bibliotheks- und Informationswissenschaften (020); Freizeitgestaltung, darstellende Künste, Sport (790)
    Auflage/Ausgabe: 1st ed. 2013
    Schriftenreihe: Information Systems and Applications, incl. Internet/Web, and HCI ; 7990
    Schlagworte: Darstellende Kunst; Informationstechnik; Kulturerbe; Digital humanities; User interfaces (Computer systems); Human-computer interaction; Computers; Digital Humanities; User Interfaces and Human Computer Interaction; Computing Milieux
    Umfang: 1 Online-Ressource (XX, 289 Seiten), 76 illus.
  10. Computerspiel- und Internetsucht
    ein kognitiv-behaviorales Behandlungsmanual
    Erschienen: 2013
    Verlag:  Verlag W. Kohlhammer, Stuttgart

    Universitätsbibliothek Bamberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Katholische Stiftungshochschule München, Bibliothek Benediktbeuern
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Landesbibliothek Coburg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universitätsbibliothek Eichstätt-Ingolstadt
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universitätsbibliothek Erlangen-Nürnberg, Hauptbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Hochschule Kempten, Hochschulbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Hochschule München, Bibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Katholische Stiftungshochschule München, Bibliothek München
    keine Fernleihe
    Evangelische Hochschule Nürnberg, Bibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universitätsbibliothek Passau
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    OTH- Ostbayerische Technische Hochschule Regensburg, Hochschulbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universitätsbibliothek Regensburg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Technische Hochschule Würzburg-Schweinfurt Bibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Universitätsbibliothek Würzburg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Deutsch
    Medientyp: Buch (Monographie)
    ISBN: 9783170216976; 317021697X
    Weitere Identifier:
    9783170216976
    RVK Klassifikation: CU 3500 ; CW 6940 ; DS 7500 ; YH 2800
    Auflage/Ausgabe: 1. Auflage
    Schriftenreihe: Störungsspezifische Psychotherapie
    Schlagworte: Internet; Computers; Behavior, Addictive; Impulse Control Disorders; Cognitive Therapy - methods; Case Reports; Kognitive Verhaltenstherapie; Online-Sucht; Computerspiel; Stoffungebundene Sucht
    Umfang: 153 Seiten, Illustrationen
    Bemerkung(en):

    Content-Plus-Zusatzmaterialien unter www.kohlhammer.de. - Literaturverzeichnis: Seite 145-150