Listing 1 - 10 of 108 << page
of 11
>>
Sort by

Book
Publizistische Freiheit und Persönlichkeitsschutz - zu den Grenzen der Verwertbarkeit realer Biografien
Author:
ISBN: 3940344486 Year: 2008 Publisher: Universitätsverlag Göttingen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Publishing of diaries and biographies is a lucrative business, fictional texts are always looking close to real people and events that a market for the "sale" of life stories has become established. The development of law against this practice is fallen behind. The present study focuses on two questions circles. The first focus is on the systematization of the decision parameters and the derivation of concrete responses from the basics of intellectual property law. Die Veröffentlichung von Tagebüchern und Biografien ist ein einträgliches Geschäft, fiktionale Texte suchen immer wieder die Nähe zu realen Personen und Geschehnissen, ein Markt für den Verkauf von Lebensgeschichten hat sich etabliert. Die Rechtsentwicklung droht gegenüber dieser Praxis zurückzubleiben. Die Grenzen der erlaubnisfreien Darstellung fremder Lebensläufe werden von Bundesgerichtshof und Bundesverfassungsgericht unterschiedlich gezogen, der Rechtscharakter und die Wirkungen einer Erlaubniserteilung zur publizistischen Verwertung sind nicht abschließend geklärt. Die vorliegende Untersuchung widmet sich beiden Fragekreisen. Im Vordergrund stehen dabei die Systematisierung der Entscheidungsparameter und die Ableitung konkreter Antworten aus den Grundlagen des Immaterialgüterrechts.


Book
Schneier on security
Author:
ISBN: 0470505621 1282122193 9786612122194 0470505605 Year: 2008 Publisher: Indianapolis, IN : Wiley Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level -- business, technical, or personal.


Book
Information security law : the emerging standard for corporate compliance
Author:
ISBN: 1282529013 9786612529016 1905356676 Year: 2008 Publisher: Ely, U.K. : IT Governance Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information Security Law: The Emerging Standard for Corporate Compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide.

The Private Sphere : An Emotional Territory and Its Agent
Author:
ISBN: 1281137367 9786611137366 140206652X 1402066511 9048176905 Year: 2008 Publisher: Dordrecht : Springer Netherlands : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The non-interference perspective is common when theorizing about the protection of the private life of individuals and their families. However, this accepted way of looking at things, leads our thoughts astray. It fails to do justice to the interests both in being left in peace but at the same time participating in a community together with other people. New methods of communications interception, video and even satellite surveillance allow insight and an entry into personal matters, but they can also be used to satisfy people's need for protection, safety and security in public places. A theory about the respect for the individual's right to a private sphere and its protection ought therefore to incorporate both these interests. In The Private Sphere it is suggested that an emotional territory, which forms the individual's own sphere of action and experience, has developed in the course of evolution in pace with the individual's conditions of life, brought about by challenges in the natural and social environment. The starting point is the insight that the behaviour of human beings with respect to their privacy reflects in a fundamental way patterns of behaviour among social animals. The emotional territory allows a readiness to act along different lines and to maintain a multiplicity of different social relations.

Digital freedom : how much can you handle?
Author:
ISBN: 9780742555747 9780742555730 0742555747 0742555739 0742577023 Year: 2008 Publisher: Lanham : Rowman & Littlefield,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In Digital Freedom, N. D. Batra explores the tension between the boundlessness of the Internet and the boundaries of the marketplace, as well as the resulting impact on human expression, privacy, and social controls. Batra's thought-provoking book looks at these issues_including surveillance, intellectual property, and copyright_from the perspective of an evolutionary, self-organizing social system. This system both creates and assimilates innovations and, in the process, undergoes reorganization and renewal. Above all, Digital Freedom is an exploration of and meditation on the question: How m


Book
Posthumous interests : legal and ethical perspectives
Author:
ISBN: 1107183235 1281383252 9786611383251 0511397445 0511396678 0511399022 0511395949 0511398182 Year: 2008 Publisher: Cambridge, UK ; New York : Cambridge University Press,


Book
The privacy advocates : resisting the spread of surveillance
Author:
ISBN: 9780262026383 9780262268127 0262268124 9781435677180 1435677188 0262026384 0262260425 Year: 2008 Publisher: Cambridge, Massachusetts : [Piscataqay, New Jersey] : MIT Press, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement.


Book
Protectors of privacy : regulating personal data in the global economy
Author:
ISBN: 1501729217 Year: 2008 Publisher: Ithaca, New York ; London : Cornell University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The business privacy law handbook
Authors: --- --- ---
ISBN: 1596931760 1596931779 9781596931770 Year: 2008 Publisher: Boston Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

This authoritative handbook serves as your one-stop guide to understanding and complying with the complex, evolving world of corporate privacy law. You find guidance on collecting and using customer information, learn how to comply with data protection laws and understand the industry-specific obligations of banks, healthcare providers, communications companies and other lines of business.


Book
Implementing email security and tokens : current standards, tools, and practices
Authors: ---
ISBN: 1281374385 9786611374389 0470381426 Year: 2008 Publisher: Indianapolis, IN : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It's your job to make email safe. Where do you start? In today's national and global enterprises where business is conducted across time zones and continents, the ""e"" in email could stand for ""essential."" Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.Review how em

Listing 1 - 10 of 108 << page
of 11
>>
Sort by