Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

109 results (0,26308 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Privacy Developmental Cultural and Clinical Realms

Privacy Trust and Social Media

The Governance of Privacy Policy Instruments in Global Perspective

Surveillance Privacy and Security Citizens’ Perspectives

Surveillance Privacy and Security Citizens’ Perspectives

This volume examines the relationship between privacy surveillance and security and the alleged privacy–security trade-off focusing on the citizen’s perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is however contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties or is it even necessary to do so and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy surveillance and security comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen’s perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies critical security studies intelligence studies EU politics and IR in general. A PDF version of this book is available for free in open access via www. tandfebooks. com. It has been made available under a Creative Commons Attribution-Non Commercial 3. 0 license. | Surveillance Privacy and Security Citizens’ Perspectives

GBP 38.99
1

The Privacy of the Self

Health Data Privacy under the GDPR Big Data Challenges and Regulatory Responses

Health Data Privacy under the GDPR Big Data Challenges and Regulatory Responses

The growth of data-collecting goods and services such as ehealth and mhealth apps smart watches mobile fitness and dieting apps electronic skin and ingestible tech combined with recent technological developments such as increased capacity of data storage artificial intelligence and smart algorithms has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection storage sharing and analysis of health- related data raises major legal and ethical questions relating to privacy data protection profiling discrimination surveillance personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children’s health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives this book will appeal to those interested in privacy data protection big data health sciences information technology the GDPR EU and human rights law. | Health Data Privacy under the GDPR Big Data Challenges and Regulatory Responses

GBP 36.99
1

Privacy II Exploring Questions of Media Morality: A Special Issue of the journal of Mass Media Ethics

Stalker Hacker Voyeur Spy A Psychoanalytic Study of Erotomania Voyeurism Surveillance and Invasions of Privacy

Silent Virtues Patience Curiosity Privacy Intimacy Humility and Dignity

Privacy and Healthcare Data 'Choice of Control' to 'Choice' and 'Control'

Deconstructing the Talmud The Absolute Book

The Ethics of Surveillance An Introduction

Drones in Society Exploring the strange new world of unmanned aircraft

Young People Social Media and the Law

A Practitioner’s Guide to Cybersecurity and Data Protection How to Ensure Client Confidentiality

A Practitioner’s Guide to Cybersecurity and Data Protection How to Ensure Client Confidentiality

A Practitioner’s Guide to Cybersecurity and Data Protection offers an accessible introduction and practical guidance on the crucial topic of cybersecurity for all those working with clients in the fields of psychology neuropsychology psychotherapy and counselling. With expert insights it provides essential information in an easy-to-understand way to help professionals ensure they are protecting their clients’ data and confidentiality and protecting themselves and their patients from cyberattacks and information breaches along with guidance on ethics data protection cybersecurity practice privacy laws child protection and the rights and freedoms of the people the practitioners work with. Explaining online law privacy and information governance and data protection that goes beyond the GPDR it covers key topics including: contracts and consent; setting up and managing safe spaces; children's data rights and freedoms; email and web security; and considerations for working with other organisations. Illustrated with examples from peer-reviewed research and practice and with practical ‘top tips’ to help you implement the advice this practical guide is a must-read for all working-from-home practitioners in clinical psychology developmental psychology neuropsychology counselling and hypnotherapy. | A Practitioner’s Guide to Cybersecurity and Data Protection How to Ensure Client Confidentiality

GBP 24.99
1

The Politics of Technology in Latin America (Volume 1) Data Protection Homeland Security and the Labor Market

An Integrated Approach to Communication Theory and Research

Media & Entertainment Law

Directions in Person-Environment Research and Practice (Routledge Revivals)

Landscape Construction Volume 3: Earth and Water Retaining Structures

Digital Advertising Theory and Research

How to Overcome Premature Ejaculation

Career Narratives and Academic Womanhood In the Spaces Provided

The Dark Side of Social Media A Consumer Psychology Perspective

Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two Biometric Technology: Authentication Biocryptography and Cloud-Based Architecture is ideal for business IT or security managers that are faced with the task of making purchasing migration or adoption decisions. It brings biometrics down to an understandable level so that you can immediately begin to implement the concepts discussed. Exploring the technological and social implications of widespread biometric use the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud including security and privacy concerns the book includes a chapter that serves as a how-to manual on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U. S. and other countries. The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses it considers ease of use false positives and negatives and privacy and security issues. It also covers emerging applications such as biocryptography. Although the text can be understood by just about anybody it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations. | Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

GBP 31.99
1