Home > Law > Laws of specific jurisdictions > IT and Communications law / Postal laws and regulations > Data protection law > Dictionary of Privacy, Data Protection and Information Security
35%
Dictionary of Privacy, Data Protection and Information Security

Dictionary of Privacy, Data Protection and Information Security

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy. The revolutionary and pervasive influence of digital technology affects numerous disciplines and sectors of society, and concerns about its potential threats to privacy are growing. With over a thousand terms meticulously set out, described and cross-referenced, this Dictionary enables productive discussion by covering the full range of fields accessibly and comprehensively. In the ever-evolving debate surrounding privacy, this Dictionary takes a longer view, transcending the details of today's problems, technology, and the law to examine the wider principles that underlie privacy discourse. Interdisciplinary in scope, this Dictionary is invaluable to students, scholars and researchers in law, technology and computing, cybersecurity, sociology, public policy and administration, and regulation. It is also a vital reference for diverse practitioners including data scientists, lawyers, policymakers and regulators.

Table of Contents:
Contents Acknowledgements xxxviii Preface xxxix How to use this dictionary xlii A A29WP 1 Abortion 1 Abstract 2 Accessibility 2 Access Control 2 Access Control List (ACL) 2 Access Point 3 Accountability 3 Account Management 4 Account Take Over (ATO) 4 Accuracy 4 ACL 5 Additivity 5 Adequacy 5 Ad Exchange 6 ADF 6 Ad Hoc Network 7 Ad Network 7 Adtech 8 Advanced Electronic Signature 8 Advanced Encryption Standard (AES) 8 Adversary 9 Adware 9 AES 10 Affinity Analysis 10 Aggregation 10 Agreement 10 AI 11 Algorithm 11 American Data Privacy and Protection Act 11 Analogue Hole 11 Analysis Server 12 Analytical Completeness 12 Analytical Validity 12 Anomaly Detection 13 Anonymisation 13 Anonymisation Decision-Making Framework (ADF) 15 Anonymising Proxy 15 Anonymity 15 Anonymous Search Engine 16 Anti-Discrimination Law 16 Anti-Malware Software 16 Anti-Virus Software 17 APEC Privacy Principles 17 API 18 App 18 Application (App) 18 Application Layer Attack 19 Application Programming Interface (API) 19 Appropriate Safeguards 20 Appropriate Technical and Organisational Measures 20 Appropriation of Name or Likeness 21 AR 21 Article 29 Working Party (A29WP) 21 Artificial Intelligence (AI) 22 AS 23 Asset 23 Associational Privacy 24 Assured Data Deletion 24 Asymmetric Cryptography 24 Asymmetric Information 25 ATO 25 Attack 26 Attacker 26 Attack Model 26 Attack Surface 26 Attack Tree 27 Attack Vector 27 Attentional Privacy 27 Attention as a Resource 28 Attention Tracking 28 Attitude–Behaviour Gap 29 Attribute 29 Attribute Disclosure 30 Attribution 30 Audit Trail 31 Augmented Reality (AR) 31 Authentication 32 Authorisation 32 Automated Decision-Making 33 Autonomous System (AS) 34 Autonomy 34 Auxiliary Data 35 Auxiliary Information 35 Auxiliary Knowledge 35 Availability 36 Awareness 36 B Backdoor 38 Back-Up 38 Barnardisation 39 BCI 39 BCR 40 Behavioural Advertising 40 Benefits of Privacy 40 Bicycle Attack 41 Big Brother 42 Big Data 42 Binary Variable 43 Binding Corporate Rules (BCR) 44 Biobank 44 Biometric Data 45 Biometrics 46 Black Hat Attack 46 Blacklist 46 Blackmail 47 Blinding 48 Blockchain 48 Block Cipher 50 Blocking Variable 50 Blocklist 50 Bluejacking 50 Bluesnarfing 51 Blue Team 51 Bluetooth 51 Bodily Privacy 52 Bot 52 Botnet 53 Boundary 54 Bounded Rationality 54 Bounds 55 Brain–Computer Interface (BCI) 55 Brain Implant 56 Brainwashing 56 Breach 57 Breach Disclosure 58 Breach of Confidence 59 Bring Your Own Device Policy (BYOD) 59 Browser Fingerprinting 60 Browsing History 60 Brussels Effect 61 Brute Force Attack 61 Buffer Overflow Attack 62 Bug 63 Business Case 63 Business Impact Level 64 BYOD 64 C CA 65 Categorical Data 65 CCTV 65 Celebrity Privacy 66 Cell Suppression 66 Censorship 66 Census 67 Centralised Governance 67 Certification 68 Certification Authority (CA) 69 Chain of Trust 69 Challenge-Response 70 Charter of Fundamental Rights 70 Charter Rights 71 Checksum 71 Chief Privacy Officer 72 Children’s Privacy 72 Chilling Effect 73 Chinese Wall 74 Choice Architecture 74 CIA Triad 74 Cipher 75 Ciphertext 76 Classified Information 76 Cleartext 76 Clickstream Data 77 Client Confidentiality 77 Client-Side Scanning 78 Closed Circuit Television (CCTV) 78 Cloud Computing 79 Cloud Storage 80 Code Audit 81 Code of Conduct 82 Code of Ethics 82 Code Review 83 Commodification 83 Common Law 84 Communication 84 Communication Privacy 85 Communication Privacy Management (CPM) Theory 86 Community Privacy 87 Compliance 88 Concentration Rule 88 Conditions for Processing 88 Confidence 89 Confidentiality 89 Confidentiality Club 91 Confidentiality Pledge 91 Conflict of Rights 92 Connected Place 92 Connectomics 93 Consent 93 Consent Form 94 Consequential Data 95 Consistency Mechanism 95 Consumer Information Markets 96 Consumer Preference Information 97 Content Data 97 Contextual Advertising 98 Contextual Integrity 98 Continuous Data 99 Controlled Rounding 99 Controlled Tabular Adjustment (CTA) 99 Convention 108 100 Cookie 100 Cooperation Mechanism 101 Co-Privacy 102 Correct Attribution Probability 102 Count Data 103 CPM 103 Credentials 103 Creepiness 103 Creepy Line, The 104 Crime Prevention Exemptions 104 CRM 105 Cross-Border Data Processing 105 Cross-Device Tracking 105 Cross-Site Request Forgery (CSRF) 106 Cross-Site Scripting (XSS) 107 Cryptanalysis 107 Cryptocurrency 108 Cryptographic Hash Function 109 Cryptographic Key 109 Cryptographic Protocol 110 Cryptography 110 Crypto-Shredding 111 Crypto Wars 112 CTA 112 Cultural Variation of Privacy 113 Currency 113 Customer Relationship Management (CRM) 114 Customer Tracking 114 Cybercrime 115 Cyber Insurance 116 Cyber Resilience 117 Cybersecurity 117 Cyberstalking 117 Cyberterrorism 118 Cyberwarfare 119 Cypher 120 Cypherpunk 120 D Dark Pattern 121 Dark Web 121 Data 122 Data Abuse 123 Data Ageing 123 Data Aging 124 Data at Rest 124 Database 124 Database of Ruin 124 Data Breach 125 Data Breach Notification 126 Data Broker 126 Data Capture 127 Data Centre 127 Data Classification 128 Data Controller 128 Data Curation 129 Data Custodian 129 Data Degaussing 129 Data Destruction 130 Data Divergence 130 Data Dumping 130 Data Enclave 131 Data Environment 131 Data Environment Analysis 132 Data Ethics 132 Data Exhaust 133 Datafication 133 Data Flow 134 Data Flow Diagram 134 Data Governance 135 Data Harmonisation 136 Data Harvesting 136 Data in Motion 137 Data Intermediary 137 Data in Transit 137 Data Intruder 138 Data Intrusion Simulation 138 Data in Use 138 Data Lake 138 Data Lifecycle 139 Data Lifecycle Management 140 Data Linkage 140 Data Map 141 Data Minimisation 141 Data Minimisation Principle 142 Data Mining 142 Data Ownership 143 Data Portability 144 Data Privacy 145 Data Processing 145 Data Processor 145 Data Protection 145 Data Protection Authority 146 Data-Protection-by-Default 146 Data-Protection-by-Design 147 Data Protection Directive 147 Data Protection Impact Assessment (DPIA) 148 Data Protection Officer (DPO) 149 Data Protection Policy 150 Data Protection Principles 151 Data Provenance 151 Data Quality 152 Data Recipient 153 Data Release 153 Data Retention 154 Data Safe Haven 155 Data Sanitisation 156 Data Schema 156 Dataset 156 Data Sharing 157 Data Sharing Agreement (DSA) 158 Data Situation 158 Data Situation Audit 159 Data Sovereignty 159 Data Steward 160 Data Stewardship Organisation 161 Data Storage 161 Data Subject 162 Data Subject Access Request 163 Data Synthesis 163 Data Transfer 164 Data Trust 165 Data Unit 166 Data User 166 Data Utility 166 Dataveillance 167 Data Warehouse 168 DDOS 168 Deanonymisation 169 Decentralisation of the Web 169 Decisional Privacy 170 Declared Data 170 Decryption 171 Deepfake 171 Deep Learning 172 Deep Packet Inspection (DPI) 173 Deep Web 173 Defamation 173 Default Settings 174 De-Identification 175 Deletion 175 Delta 176 Demographic Advertising 176 Demonstration Attack 176 Denial of Service (DoS) 177 Deterministic Record Linkage 178 Device Fingerprinting 178 DICOM Standard (Digital Imaging and Communications in Medicine) 179 Differencing 179 Differential Identifiability 180 Differential Privacy 180 Digital Assistant 181 Digital Breadcrumbs 182 Digital Certificate 182 Digital Divide 183 Digital Economy 183 Digital Fingerprinting 183 Digital Footprint 184 Digital Footprint Eraser 185 Digital Hygiene 186 Digital Imaging and Communications in Medicine 186 Digital Identity 186 Digital Inequality 187 Digital Inheritance 188 Digital Literacy 188 Digital Persona 189 Digital Rights Management (DRM) 189 Digital Self-Determination 190 Digital Signature 190 Digital Twin 191 Digital Wallet 191 Dignity 192 Direct Access Attack 192 Direct Identifier 193 Direct Marketing 193 Directory Indexing 194 Disassociability 194 Disclosive Data 194 Disclosure 195 Disclosure and Barring (Check) 195 Disclosure Control Methods 195 Disclosure Risk 196 Discrete Data 196 Discretionary Access Control 197 Discretisation 197 Disguise 197 Distributed Denial of Service 197 Distributed Ledger 198 DNS Server 198 Domain Generalisation 198 Dominance Rule 199 Do Not Track (Protocol) 199 DOS 200 Doxxing 200 DPI 200 DPIA 200 DPO 200 D-Privacy 200 DRM 201 DSA 201 Duty of Confidence 201 Duty to Protect 201 Duty to Warn 201 Dyad 202 Dynamic Consent 202 Dynamic Data Situation 203 E E2EE 204 E3 204 Eavesdropping 204 Eavesdropping Attack 204 ECHR 205 E-Commerce 205 Economics of Privacy 206 Edge Computing 207 EDPB 207 EDPS 207 EHR 208 Electronic Health Record (EHR) 208 EM Algorithm 208 Emotion Recognition 209 Employee Information 210 Encrypt-Everything-Everywhere (E3) 210 Encryption 211 Encryption Algorithm 211 Encryption Key 211 Endpoint Security 212 End-to-End Encryption (E2EE) 212 End-User Licence Agreement (EULA) 213 Engineering Ethics 213 Enhanced Privacy ID (EPID) 214 EPID 214 Eprivacy Directive 214 Eprivacy Regulation 215 Epsilon 215 Equivalence Class 216 Equivalence Class Structure 216 Erasure 216 Escrow 217 Ethical Hacking 218 Ethics 218 Ethics Committee 218 EULA 219 European Convention on Human Rights (ECHR) 219 European Data Protection Board (EDPB) 220 European Data Protection Supervisor (EDPS) 221 Exfiltration 221 Expectation-Maximization Algorithm 221 Explainable AI (XAI) 221 Explanatory Variable 222 Explicit Consent 222 Exposure 223 Express Consent 223 Extranet 224 Extrinsic Privacy 224 F Face Recognition 225 Facial Recognition Technology 225 FAIR 226 Fair Information Practice Principles (FIPPS) 226 Fairness 227 Fair Processing Notice 228 Fake Profile 228 False Light 229 False Negative 230 False Positive 230 Family Resemblance Theory of Meaning 231 FARAS 231 Feature 231 Federal Trade Commission (FTC) 232 Federated Identity 232 Federated Learning 233 Feminist Critique of Privacy 233 FHE 234 Fiduciary Duty 234 Filing System 235 Financial Privacy 235 FIPPS 236 Firewall 236 Firmware 237 Fishing Attack 238 Five Safes 238 Flexible Output 238 Formal Anonymisation 239 Formal Privacy 239 Format Preserving Encryption (FPE) 240 Foundation Model 240 FPE 240 Freedom of Expression 241 Freedom of Information 241 Freely Given Consent 242 Frequency Data 242 FTC 243 Fully Automated Remote Analysis System (FARAS) 243 Fully Homomorphic Encryption (FHE) 243 Functional Anonymisation 244 Functional Unique Identifier 245 Function Creep 246 Fuzzing 246 G Gait Recognition 247 Game Theory 247 Gatekeeper 248 GDPR (General Data Protection Regulation) 248 Gendered Spaces 250 General Data Protection Regulation 250 Generative AI 250 Genetic Data 251 Genetic Fingerprint 251 Genetic Privacy 252 Genomic Data 253 Geographical Resolution 253 Geoprivacy 254 Geo-Social Data 254 Geotagging 255 Globally Unique Identifier (GUID) 255 Global Privacy Control (GPC) 256 Global Recoding 256 Global Suppression 257 Gossip 257 GPC 257 Graduated Security 258 Grey Hat Attack 258 Group Harms 258 Group Privacy 259 GUID 260 H Hacking 261 Harassment 261 Harm 262 Hashing 263 Header Information 263 Health Information Exchange (HIE) 264 Health Insurance Portability and Accountability Act (HIPAA) 265 Hellinger Distance 265 Hidden Service 266 HIE 266 Hierarchical Data 266 HIPAA 266 History of Privacy 266 Homomorphic Encryption 268 Honeypot 268 HRIA 269 HTTP 269 HTTPS 269 Human-Centred Cybersecurity 269 Human Rights Impact Assessment (HRIA) 270 Hypertext Transfer Protocol (HTTP) 270 Hypertext Transfer Protocol Secure (HTTPS) 271 I I2P 272 ID Card 272 Idem-Identity 272 Identifiability 273 Identifiable Data 273 Identifiable Individual 273 Identifiable Natural Person 273 Identification Card 274 Identification File 275 Identified Data 276 Identified Natural Person 276 Identifier 277 Identity 277 Identity Assurance 279 Identity Cloning 280 Identity Disclosure 280 Identity Documents 281 Identity Management 281 Identity Provider 282 Identity Theft 283 Ideological Privacy 283 IDS 284 Impact Management 284 Impersonation 284 Implicit Consent 284 Imputation 285 Inadvertent Disclosure 285 Incognito Mode 286 Incremental Authorisation 286 Indirect Identifier 286 Inference 287 Inference Attack 288 Inferential Disclosure 288 Inferred Data 289 Inforgs 289 Information 289 Informational Privacy 289 Informational Self-Determination 291 Information Broker 291 Information Classification Table 291 Information Ethics 292 Information Governance 292 Information Lifecycle Management 293 Information Loss 293 Information Ownership 293 Information Security 294 Informed Consent 294 Infosphere 295 Inherence 296 Input Privacy 296 Input Statistical Discloure Control 297 Integrity 297 Intellectual Privacy 298 Intellectual Property (IP) 298 Intentional Data 300 Intention–Behaviour Gap 300 Interference 300 Internal Security Testing 301 International Transfer 301 Internet 301 Internet of Humans 302 Internet of People 302 Internet of Things 302 Internet Protocol (IP) 303 Interoperability 304 Interval Publication 305 Intimacy 305 Intranet 306 Intruder 306 Intruder Testing 307 Intrusion 307 Intrusion Detection System (IDS) 308 Intrusion Prevention System (IPS) 308 Intrusion upon Seclusion 309 Invasive BCI 309 Inversion Attack 310 Inviolate Personality 310 Invisible Computing 311 Invisible Internet Project 311 IP 311 IP Address 312 IPS 312 IPSE-Identity 312 Iris Scanning 312 Irreversibility 313 ISO27001 313 ISO27002 314 Isolation 314 J Jensen–Shannon Divergence 316 Jigsaw Identification 316 Joint Data Controller 316 Jurisdiction 317 Just-In-Time Consent 317 Just-In-Time Notice 318 K K-Anonymity 319 Key Disclosure 319 Key Logger 319 Key Logging 319 Key Variable 320 Knowledge Economy 320 Kompromat 320 L Laplace Noise 322 Large Language Model 322 Lawful Basis 322 Lawfulness 323 Layered Notice 324 Layered Security Model 324 LBS 325 L-Diversity 325 Lead Supervisory Authority 325 Least Privilege 326 Legal Basis for Processing 326 Legitimate Interest 326 Libel 327 Licence Agreement 327 Lifecasting 328 Lifelogging 328 Lifestreaming 329 Linkability 329 Linkable Information 330 Linkage 330 Linkage Attack 330 Link Encryption 331 Local Shared Object (LSO) 331 Local Suppression 331 Locational Privacy 332 Location-Based Service (LBS) 333 Location Data 333 Location Tracking 334 Logic Bomb 334 Longitudinal Data 335 Loyalty Card 335 LSO 336 M MAC 337 Machine Learning (ML) 337 Magnitude Data 339 Main Establishment 339 Male Gaze, The 339 Malicious Proxy Server 340 Malware 340 Management Information System 340 Mandatory Access Control (MAC) 341 Mandatory Decryption 341 Mandatory Key Disclosure 342 Man-in-the-Middle Attack 342 Manual Key Transport 343 Mash Attack 343 Mask 343 Masking 344 Masquerade 344 Matching 344 Material Scope 345 Material Transfer Agreement 345 Maximum Knowledge Intruder 346 Media Access Control (MAC) Address 346 Medical Record 347 Membership Inference Attack 347 Mental Capacity 347 Mental Privacy 348 Mesh Network 349 Message Digest 349 Metadata 350 Metadata-Level Controls 350 Metaverse 351 MFA 351 Microaggregation 351 Microdata 352 Minimal Unique 352 Missing Data 353 Mission Creep 353 Misuse of Private Information 353 ML 354 Mobility Traces 354 Model Inversion Attack 355 Molka 355 Monetary Equivalent Burden (of Privacy) 355 Mosaic Identification 356 Motivated Intruder 356 Motivated Intruder Test 356 M-Probability 356 Multi-Factor Authentication (MFA) 357 Multimodal De-Identification 357 Multiple Imputation 357 Multi-Vector Attacks 358 Mutual Assistance 358 Mutual Authentication 358 N National Security 360 Natural Person 360 Necessity 361 Need to Know 361 Negative Externalities of Disclosed Data 362 Negative Externalities of Privacy 362 Negligence 363 Network 364 Network Encryption 364 Network Layer Attack 364 Network Security 365 Network Segmentation 365 Neural Prosthesis 366 Neurocapitalism 366 Neurodata 367 Neuroethics 367 Neuroprivacy 368 Neuroprosthetics 368 Neurotechnology 368 (N,K) Rule 369 Noise Addition 369 Nom de Guerre 369 Nom de Plume 369 Nominal Data 370 Non-Disclosure Agreements 370 Non-Discrimination Law 370 Non-Invasive BCI 371 Notice and Consent 371 Nudge Theory 372 Nudging 372 O Obfuscation 373 Objective Harm 373 Oblivious Transfer (OT) 373 Obscurity 374 Obtrusion 375 OECD Guidelines (On Privacy) 375 Offline Dictionary Attack 376 One-Stop-Shop 377 One-Way Hash Function 377 Onion Routing 378 Online Vetting 378 Ontological Security 378 Onward Transfer 379 OPE 380 Open Access 380 Open Data 381 Open Source 382 Opt-In 383 Opt-Out 383 Order-Preserving Encryption 384 Ordinal Data 385 Orwell Attack 385 OT 385 Other 386 Outing 386 Outlier 386 Output Checking 387 Output Privacy 387 Output Statistical Disclosure Control 388 Overimputation 389 P P3P 390 Packet Filter 390 Packet Sniffing 390 Panel Data 391 Panopticon 391 Paparazzi 392 Paparazzi Attack 392 Parental Controls 393 Partially Homomorphic Encryption 393 Participant Information Sheets 393 Participatory Surveillance 394 Passive Collection 394 Password 395 Password Manager 395 Patch 395 Patch Management 396 PDS 396 Peeping Tom 396 Penetralia 396 Penetration Test 397 Persistent Cookie 397 Persistent Pseudonym 397 Person 398 Personal Data 398 Personal Data Cloud 399 Personal Data Store (PDS) 399 Personal Identification Number (PIN) 400 Personal Information 400 Personal Information Management System (PIMS) 401 Personalisation 402 Personalisation Reactance 403 Personalised Medicine 403 Personalised Services 404 Personally Identifiable Information (PII) 404 Personal Space 405 Personhood 405 Perturbation 406 Pervasive Computing 406 PET 406 Pharming 407 PHE 407 Philosophy of Information 407 Phishing 409 Phone Hacking 409 Physical Privacy 409 PIA 410 PII 410 PIMS 410 PIN 410 Pixelisation 410 Plaintext 411 Platform for Privacy Preferences (P3P) 411 Poisoning Attack 412 Population 412 Population Unique 412 Population Unit 413 Port Scan 413 Positive Externalities of Disclosed Data 414 Post Quantum Cryptography (PQC) 414 Post Randomisation (PRAM) 415 PPDA 415 PPDM 415 PPML 415 P/Q Rule 415 PRAM 416 Predictive Analytics 416 Predictive Modelling 417 Presence Detection 417 Price Discrimination 417 Primary Data 418 Prior Posterior Ambiguity Rule 418 Privacy 418 Privacy as Control 419 Privacy as Redistribution of Costs 420 Privacy Avatar 421 Privacy, Benefits of 421 Privacy Budget 422 Privacy-by-Design 422 Privacy Calculus 423 Privacy Concern 423 Privacy, Cultural Variation of 424 Privacy Elasticity 424 Privacy Engineering 424 Privacy-Enhancing Technology (PET) 425 Privacy First 425 Privacy Fundamentalists 426 Privacy Guarantee 426 Privacy Impact Assessment 427 Privacy Insurance 427 Privacy-Invasive Technology 427 Privacy Metric 428 Privacy Model 428 Privacy Notice 429 Privacy Officer 429 Privacy Paradox 430 Privacy Policy 431 Privacy Pragmatists 431 Privacy Preference 432 Privacy Premium 432 Privacy-Preserving Data Analytics (PPDA) 432 Privacy-Preserving Data Mining (PPDM) 433 Privacy-Preserving Data Publishing 433 Privacy-Preserving Machine Learning (PPML) 433 Privacy-Preserving Record Linkage (PPRL) 434 Privacy Risk 434 Privacy Screen 435 Privacy Seal 435 Privacy Settings 436 Privacy Threat 436 Privacy Tort 437 Privacy Trade-Off 438 Privacy Unconcerned 438 Privacy, Value of 439 Private Army 439 Private Biometrics 439 Private Browsing Mode 440 Private Enterprise 440 Private Key 440 Private Life 440 Private Parts 441 Private Property 442 Private School 442 Private Sector 443 Private Sphere 443 Probabilistic Record Linkage 444 Processing 445 Profile 445 Profiling 445 Prolepticon 446 Proportionate Security 446 Proportionality 447 Proprietary Privacy 447 Protected Characteristics 448 Protocol 448 Provable Security 449 Proxemics 450 Proxy 450 P% Rule 450 Pseudonym 450 Pseudonymisation 451 Pseudonym Reversal 453 Psychographic Advertising 453 Psychological Privacy 453 Public 454 Publication 455 Public Disclosure of Private Facts 455 Public Domain 456 Public Figure 456 Public Interest 457 Publicity 458 Public Key 459 Public-Key Cryptography 459 Public-Key Infrastructure (PKI) 460 Public Records 460 Public Sphere 461 Publishing 462 Purchase History 462 Purple Team 462 Purpose Limitation 463 Purpose Specification 464 Q Quantitative Privacy 465 Quantum Computing 465 Quasi-Identifier 466 Query Logging 466 Query Overlap 467 Quishing 467 R Radical Transparency 468 Radio Frequency Identification (RFID) 468 Randomised Response 469 Random Rounding 469 Random Unique 469 Ransomware 470 Rational Consumer 470 Reality Mining 471 Reasonable Expectation of Privacy 471 Reasonable Search 473 Recognition 473 Recommendation System 473 Recommender System 474 Reconstruction Attack 474 Record 474 Record Linkage 475 Records Management 476 Record Suppression 476 Rectification 476 Redaction 476 Red Team 477 Reference Monitor 477 Regulation 477 Regulators 478 Reidentification 478 Reidentification Attack 480 Relational Autonomy 480 Release and Forget 481 Reliability 481 Reliance 481 Reliance Authentication 481 Remailing 482 Remediation 482 Remedies 482 Remote Access 483 Remote Access Server 483 Remote Analysis Server 483 Remote Query 484 Replay Attack 484 Repurposing 485 Reputation 485 Reputation Management 485 Reserve 486 Resilience 486 Respondent 486 Response Knowledge 487 Response Variable 487 Responsible Disclosure 487 Restricted Access 488 Retention 488 Revenge Porn 488 Reverse Fishing Attack 489 Reversibility 489 Revocation 489 Right of Access 490 Right to an Explanation 490 Right to Be Forgotten 491 Right to Be Informed 492 Right to Be Let Alone 493 Right to Correct 494 Right to Data Portability 494 Right to Data Protection 494 Right to Deletion 495 Right to Object 495 Right to Privacy 496 Right to Rectification 496 Right to Restriction 496 Risk 497 Risk Assessment 498 Risk Management 498 Risk Tolerance 498 Risk–Utility Trade-Off 499 Roe v Wade 500 Role-Based Access Control 500 Rounding 500 RSA Encryption 501 R-U Map 501 Rumour 501 S Safe Data 502 Safe Harbor 502 Safe Output 503 Safe People 503 Safe Projects 503 Safe Settings 503 Safety 504 Salt 504 SAML 505 Sample Unique 505 Sample Unit 505 Sampling 505 Sampling Fraction 505 Sandbox 506 Sandboxing 506 Scenario Analysis 506 Schrems 507 Scraping 507 Scrutiny 507 SDC 508 SDL 508 SDLC 508 Search 508 Search Engine 510 Seclusion 510 Secondary Data 510 Secondary Differentiation 511 Secondary Use 511 Secrecy 511 Secret 512 Secret Ballot 512 Secret Sharing 513 Secure Communication 514 Secure Messaging 514 Secure Multi-Party Computation 514 Secure Sockets Layer (SSL) 515 Secure Web Gateway (SWG) 515 Secure Web Platform 516 Security 516 Security Assertion Markup Language (SAML) 517 Security Audit 518 Security-By-Design 518 Security-By-Obscurity 518 Security Information Management (SIM) 519 Security Parameter 519 Security Posture 520 Security Requirement 520 Security Token 520 Self-Archiving 521 Self-Control Security 521 Self-Disclosure 521 Self-Reflection 522 Self-Sovereign Identity (SSI) 522 Self, The 523 Semantic Security 524 Semi-Invasive BCI 524 Sensitive Data 524 Sensitive Variable 524 Sensitivity 525 Sensor 525 Serial Number 526 Service User Agreement 526 Sessional Cookie 526 Shoulder Surfing 526 SIM 527 Single Out 527 Single Sign-On 528 Singularity, The 528 Slander 529 Smart City 529 Smart Device 530 Smart Grid 530 Smart Implants 531 Smart Meter 531 Smishing 531 SNARK 532 Social Credit System 532 Social Engineering 532 Social Genome 533 Social Linked Data (SOLID) 533 Social Network 534 Social Network Analysis 536 Social Profiling 536 Social Steganography 536 Sock Puppet 536 Software 536 Software Development Lifecycle (SDLC) 537 SOLID 537 Solitude 537 Sousveillance 538 Spam 538 Spam Filter 539 Spatial Cloaking 539 Spatial Privacy 539 Spear Phishing 540 Special Category Data 540 Special Unique 540 Speech Recognition 541 Split Tunnelling 541 Spontaneous Recognition 542 Spoofing Attack 542 Spyware 543 SQL 543 SQL Injection 543 SSI 544 SSL 544 Stakeholder 544 Stalking 545 Standard 545 Standard Contractual Clauses 546 Standard Model Clauses 547 Static Key 547 Statistical Disclosure 547 Statistical Disclosure Control (SDC) 548 Statistical Disclosure Limitation (SDL) 549 Steganography 549 Storage Limitation 549 Streisand Effect 550 Structural Zero 550 Structured Query Language (SQL) 551 Subject Access Request 551 Subjective Harm 551 Subliminal Advertising 552 Subtraction Attack 552 Succinct Non-Interactive Zero-Knowledge Proof (SNARK) 553 Super Cookie 553 Supervisory Authority 554 Suppression 554 Surname Attack 555 Surveillance 555 Surveillance Capitalism 556 Swapping Key 557 SWG 558 Symmetric Cryptography 558 Symmetric Key Encryption 558 Synthetic Data 558 T Table Redesign 559 Tabular Data 559 Tagging 559 Target Dataset 560 Targeted Advertising 560 Target Variable 560 TCB 560 T-Closeness 560 TCP 561 Technical And Organisational Measures 561 TEE 561 Telephone Tapping 561 Terms of Service 561 Territorial Privacy 562 Territorial Scope 562 Text Anonymisation 563 TFA 563 The Onion Router 564 Therapeutic Alliance 564 Thermal Imaging 564 Third Party 565 Third Party Doctrine 566 Thought Police 566 Threat Modelling 566 Threshold Rule 567 Time Bomb 567 Time Series 568 TIPS (Trust, Identity, Privacy, Security) 568 TLS 569 Tokenisation 569 Topcoding 569 TOR (The Onion Router) 569 Tracing 570 Tracker 570 Tracker Blocker 571 Tracking 571 Traffic Data 571 Transmission Control Protocol (TCP) 572 Transparency 572 Transparency Notice 573 Trapdoor 574 Trespass 574 Trojan Horse 574 Trust 575 Trusted Computing Base (TCB) 576 Trusted Execution Environment (TEE) 576 Trusted Research Environment 577 Trusted Third Party 577 Trustworthy Digital Identity 578 Tunnel Encryption 578 Two Factor Authentication (TFA) 578 U Ubicomp 579 Ubiquitous Computing (UBICOMP) 579 UK GDPR 579 Unambiguous Consent 580 Unicity 580 Uniform Resource Identifier (URI) 580 Unique Identifier 581 Uniqueness 581 Unreasonable Search 581 Untraceability 582 U-Probability 583 URI 583 User 583 User-Centred Design 584 User Modelling 584 Username 585 US Privacy Laws 585 Utility First 586 V Value–Action Gap 587 Value of Data 587 Value of Privacy 588 Value Sensitive Design (VSD) 589 Veil 589 Verifiable Secret Sharing (VSS) 590 Vicarious Liability 590 Virality 591 Virtual Machine (VM) 592 Virtual Private Network (VPN) 592 Virus 593 Vishing 593 Vital Interests 593 VM 594 Voice over Internet Protocol (VoIP) 594 VoIP 595 Voyeurism 595 VPN 595 VSD 595 VSS 595 Vulnerability 595 Vulnerability Management 596 Vulnerable Population 597 W Wearable Computing 598 Wearable Tech 599 Web 2.0 599 Web 3.0 599 Web Beacon 600 Web Bug 601 Web of Trust 601 Web Profiling 602 Web Skimming Attack 602 Whistleblowing 602 White Box Testing 603 White Hat Attack 604 Wiretapping 604 World Wide Web (WWW) 604 Worm 606 WWW 606 X XAI 607 XSS 607 X Variable 607 Y Y Chromosome 608 Y Variable 608 Z Zero Day Attack 609 Zero Knowledge 609 Zero Knowledge Proof 610 Zero Trust Security 610


Best Sellers


Product Details
  • ISBN-13: 9781035300914
  • Publisher: Edward Elgar Publishing Ltd
  • Publisher Imprint: Edward Elgar Publishing Ltd
  • Height: 234 mm
  • No of Pages: 652
  • Width: 156 mm
  • ISBN-10: 1035300915
  • Publisher Date: 12 Jul 2024
  • Binding: Hardback
  • Language: English
  • Weight: 38.1 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Dictionary of Privacy, Data Protection and Information Security
Edward Elgar Publishing Ltd -
Dictionary of Privacy, Data Protection and Information Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Dictionary of Privacy, Data Protection and Information Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA