Listing 1 - 10 of 21 | << page >> |
Sort by
|
Choose an application
Group identity --- Citizenship --- Democracy --- Identité collective --- Citoyenneté --- Démocratie --- European Union --- Membership --- Europe, Eastern --- Europe de l'Est --- Politics and government --- Politique et gouvernement --- Identité collective --- Citoyenneté --- Démocratie --- EPUB-ALPHA-I EPUB-LIV-FT LIVDROIT STRADA-B --- Europe [Eastern ] --- 1989 --- -Congresses --- Union européenne --- Congresses --- European Union countries --- Membership. --- E-books --- Union européenne --- -Adhésion --- Pays de l'Union européenne --- Adhésion
Choose an application
Legal theory and methods. Philosophy of law --- Social law. Labour law --- European Union --- E-books --- Identité collective --- Droit constitutionnel --- État --- Union européenne --- Membership --- Social aspects --- Congresses --- Group identity --- European Union countries --- Nationalism --- Comparative law --- Identité collective --- Nationalisme --- Droit comparé --- EPUB-ALPHA-I EPUB-LIV-FT LIVDROIT STRADA-B
Choose an application
1. Règlement européen sur la protection des données - 2. Autres textes - Directive PNR (Données des dossiers passagers) - Annexes
Choose an application
Human rights --- Status of persons --- Online identities --- Identification --- Data protection --- Privacy, right of --- Identité numérique --- Protection de l'information (Informatique) --- Droit à la vie privée --- Law and legislation --- Law and legislation. --- Droit --- Protection de l'information (informatique)
Choose an application
Healthcare is changing. It is moving to a paperless environment, a team-based, interdisciplinary and patient-centred profession. Value-driven strategies, evidence-based medicine, data-driven technology, decision support and automated decision-making are adopted in modern healthcare models. Health-related data are subject to eagerness characterising our data-driven economy.00Amidst these changes, is the patient and his or her right to data protection, privacy and autonomy.00The question arises how to match phenomena that characterise the predominant ethos in modern healthcare systems, such as e-health and personalised medicine, with patient autonomy and data protection laws. That matching exercise is essential. The successful adoption of ICT in healthcare depends, at least partly, on how the public?s concerns about data protection and confidentiality are addressed.00Three backbone principles of European data protection law, in particular, are considered bottlenecks for the implementation of modern healthcare systems: informed consent, anonymisation and purpose limitation. The book assesses the adequacy of these principles and considers them in the context of technological and societal evolutions. A must-read for every professional active in the field of data protection law, health law, policy development or IT-driven innovation.
Professional ethics. Deontology --- Human rights --- Medical law --- Human medicine --- Information systems --- Medical laws and legislation --- Medical informatics --- Medical care --- Data protection --- Médecine --- Soins médicaux --- Protection de l'information (Informatique) --- Law and legislation --- Data processing --- Law and legislation. --- Droit --- Informatique --- E-books --- Secret médical --- Identité numérique --- Protection de l'information (informatique) --- Gestion des données (systèmes d'information) --- Droit des technologies de l'information et de la communication --- Technology --- Artificial intelligence --- Droit européen --- Health aspects. --- Secret médical --- Identité numérique --- Gestion des données (systèmes d'information) --- Droit européen
Choose an application
Status of persons --- Belgium --- E-books --- Personnes (droit) --- Statut juridique --- Sexualité --- Filiation --- Droit --- Philosophie. --- Persons (Law) --- Congresses --- Status (Law) --- Sex and law --- Paternity --- Human beings --- Dignity. --- Identity (Philosophical concept) --- Personality (Law) --- Personnes (Droit) --- Homme --- Dignité --- Identité --- Droit de la personnalité --- Philosophy --- Philosophie --- EPUB-ALPHA-I EPUB-LIV-FT LIVDROIT STRADA-B --- Statut juridique. --- Droit. --- Sexualité
Choose an application
Depuis son entrée en vigueur en 2018, le RGPD a donné du fil à retordre aux praticiens comme à l’Autorité de protection des données. La crise sanitaire a renforcé l’attention envers la protection des données personnelles, dans le cadre du suivi des contaminations et de la vaccination notamment. Ceci illustre à quel point la mise en œuvre du RGPD dans la pratique nécessite la recherche constante d’un équilibre entre des intérêts divergents : le pouvoir de contrôle des individus sur «leurs» données face aux contraintes opérationnelles des entreprises, les exigences de sécurité face à des menaces grandissantes et à un devoir de transparence et de limitation des traitements, etc.
European law --- Human rights --- European Union --- Belgium --- Data protection --- Privacy, Right of --- Protection de l'information (Informatique) --- Droit à la vie privée --- Law and legislation --- Droit --- E-books --- Protection de l'information (informatique) --- Identité numérique --- Gestion des données (systèmes d'information) --- Droit européen
Choose an application
"Black Girl Autopoetics maps the everyday digital practices Black girls, showing us what their digital content reveals about their everyday experiences and how their digital production contributes to a broader archive of Black life. Ashleigh Greene Wade coins the term "Black girl autopoetics" as a way of describing how Black girls' self-making creatively reinvents cultural products, spaces, and discourse in digital space. By contrast to the pre-internet era, Black girls can seize the means of representation for themselves with a speed and flexibility enabled by smart phones. Throughout the book, Wade analyzes the double bind Black girls face when creating content on-line: on one hand, their online activity makes them hyper-visible, putting them at risk for cyberbullying, harassment, and other forms of violence, and on the other hand, Black girls are rarely given credit for their digital inventiveness, rendering them invisible. Using ethnographic research into the digital cultural production of adolescent Black girls in Richmond, Virginia to illustrate Black girl autopoetics, Wade draws a complex picture of how Black girls navigate contemporary reality, and she urges us to listen to Black girls' experience and learn from their techniques of survival"--
Noires americaines dans la culture populaire --- Technologie et personnes noires --- Femmes et technologie --- Femmes --- Noires americaines --- Internet et femmes --- African American women in popular culture --- Technology and Black people --- Technology and women --- Digital media --- Women --- African American women --- Internet and women --- Histoire --- Identite. --- Aspect social. --- History --- Social aspects --- Identity. --- Social aspects. --- United States.
Choose an application
Fonds Suzan Daniel (FSD)
vreemdelingenrecht --- gender --- familierecht --- Human rights --- mensenrechten --- Belgium --- Gender identity --- Equality --- Sex discrimination --- Identité sexuelle --- Inégalités sociales --- Discrimination sexuelle --- Law and legislation --- Droit --- Ebooks --- 342.7 <493> --- 186.6 Jeugd(sanctie)recht --- 331-055.2 --- 331.152 --- 396.1 --- 34 --- 657 Vrouwenemancipatie --- 100 Recht --- Grondwettelijke rechten en vrijheden. Fundamentele rechten--België --- arbeid van vrouwen - vrouwelijke arbeiders - werkende vrouwen - buitenhuiswerkende vrouwen - gelijke behandeling van man en vrouw --- sociaal overleg - democratisering, economisch - democratisering van/in de onderneming --- vrouwenemancipatie - gelijkstelling van de vrouw - feminisme --- recht - wetgeving --- 342.7 <493> Grondwettelijke rechten en vrijheden. Fundamentele rechten--België --- Identité sexuelle --- Inégalités sociales --- Law and gender --- E-books --- Belgique --- Famille --- Divorce --- Étrangers (droit) --- Egalité des sexes --- Femmes --- Voiles islamiques --- Droits
Choose an application
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
Fiction --- American literature --- English literature --- anno 1900-1999 --- American fiction --- English fiction --- Feminism and literature --- Identity (Psychology) in literature --- Postmodernism --- Sex role in literature --- Women and literature --- Roman américain --- Roman anglais --- Féminisme et littérature --- Identité (Psychologie) dans la littérature --- Postmodernisme --- Rôle selon le sexe dans la littérature --- Femmes et littérature --- Women authors --- History and criticism --- Femmes écrivains --- Histoire et critique --- 82.015.9 --- 82:396 --- -American fiction --- -English fiction --- -Feminism and literature --- Psychological fiction --- -Fiction --- Literature --- Post-modernism --- Postmodernism (Philosophy) --- Arts, Modern --- Avant-garde (Aesthetics) --- Modernism (Art) --- Philosophy, Modern --- Post-postmodernism --- Literaire stromingen: postmodernisme --- Literatuur en feminisme --- -History and criticism --- Woolf, Virginia --- -Criticism and interpretation --- 82:396 Literatuur en feminisme --- 82.015.9 Literaire stromingen: postmodernisme --- -Literaire stromingen: postmodernisme --- -Literature --- -Post-modernism --- Roman américain --- Féminisme et littérature --- Identité (Psychologie) dans la littérature --- Rôle selon le sexe dans la littérature --- Femmes et littérature --- Femmes écrivains --- Postmodernism (Literature) --- Women authors&delete& --- Woolf, Virginia, --- Woolf, Virginia Stephen, --- Stephen, Virginia, --- Ulf, Virzhinii︠a︡, --- Ṿolf, Ṿirg'inyah, --- Vulf, Virdzhinii︠a︡, --- Вулф, Вирджиния, --- וולף, וירג׳יניה --- וולף, וירג׳יניה, --- Stephen, Adeline Virginia, --- Criticism and interpretation. --- Information technology --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Littérature anglaise --- Littérature américaine --- Woolf, Virginia (1882-1941) --- 20e siècle --- Critique et interprétation
Listing 1 - 10 of 21 | << page >> |
Sort by
|