当前货币:HKD

您的购物车中没有商品。

Dictionary of Privacy, Data Protection and Information Security

Dictionary of Privacy, Data Protection and Information Security

  • 作者:
  • 出版商: Edward Elgar Publishing
  • ISBN: 9781035300914
  • 出版时间 July 2024
  • 规格: Hardback
  • 适应领域: U.K. ? 免责申明:
    Countri(es) stated herein are used as reference only
¥2,467.50
发货时间:大约 4-5 weeks
Extra 2-10 working days if shipping address outside Hong Kong
Free delivery Hong Kong?
Hong Kong: free delivery (order over HKD 1000)
  • 描述 
  • 大纲 
  • 详细

    The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy.

    The revolutionary and pervasive influence of digital technology affects numerous disciplines and sectors of society, and concerns about its potential threats to privacy are growing. With over a thousand terms meticulously set out, described and cross-referenced, this Dictionary enables productive discussion across fields by presenting an accessible and comprehensive coverage of the privacy sphere. In the ever-evolving debate surrounding privacy, this Dictionary takes a longer view, transcending the details of today''s problems, technology, and the law to examine the wider principles that underlie privacy discourse.

    Interdisciplinary in scope, this Dictionary is invaluable to students, scholars and researchers in law, technology and computing, cybersecurity, sociology, public policy and administration, and regulation. It is also a vital reference for legal practitioners and policymakers concerned with privacy, data protection and information security.

  • Acknowledgements xxxviii
    Preface xxxix
    How to use this dictionary xlii
    A
    A29WP 1
    Abortion 1
    Abstract 2
    Accessibility 2
    Access Control 2
    Access Control List (ACL) 2
    Access Point 3
    Accountability 3
    Account Management 4
    Account Take Over (ATO) 4
    Accuracy 4
    ACL 5
    Additivity 5
    Adequacy 5
    Ad Exchange 6
    ADF 6
    Ad Hoc Network 7
    Ad Network 7
    Adtech 8
    Advanced Electronic Signature 8
    Advanced Encryption Standard (AES) 8
    Adversary 9
    Adware 9
    AES 10
    Affinity Analysis 10
    Aggregation 10
    Agreement 10
    AI 11
    Algorithm 11
    American Data Privacy and Protection Act 11
    Analogue Hole 11
    Analysis Server 12
    Analytical Completeness 12
    Analytical Validity 12
    Anomaly Detection 13
    Anonymisation 13
    Anonymisation Decision-Making Framework (ADF) 15
    Anonymising Proxy 15
    Anonymity 15
    Anonymous Search Engine 16
    Anti-Discrimination Law 16
    Anti-Malware Software 16
    Anti-Virus Software 17
    APEC Privacy Principles 17
    API 18
    App 18
    Application (App) 18
    Application Layer Attack 19
    Application Programming Interface (API) 19
    Appropriate Safeguards 20
    Appropriate Technical and Organisational Measures 20
    Appropriation of Name or Likeness 21
    AR 21
    Article 29 Working Party (A29WP) 21
    Artificial Intelligence (AI) 22
    AS 23
    Asset 23
    Associational Privacy 24
    Assured Data Deletion 24
    Asymmetric Cryptography 24
    Asymmetric Information 25
    ATO 25
    Attack 26
    Attacker 26
    Attack Model 26
    Attack Surface 26
    Attack Tree 27
    Attack Vector 27
    Attentional Privacy 27
    Attention as a Resource 28
    Attention Tracking 28
    Attitude–Behaviour Gap 29
    Attribute 29
    Attribute Disclosure 30
    Attribution 30
    Audit Trail 31
    Augmented Reality (AR) 31
    Authentication 32
    Authorisation 32
    Automated Decision-Making 33
    Autonomous System (AS) 34
    Autonomy 34
    Auxiliary Data 35
    Auxiliary Information 35
    Auxiliary Knowledge 35
    Availability 36
    Awareness 36
    B
    Backdoor 38
    Back-Up 38
    Barnardisation 39
    BCI 39
    BCR 40
    Behavioural Advertising 40
    Benefits of Privacy 40
    Bicycle Attack 41
    Big Brother 42
    Big Data 42
    Binary Variable 43
    Binding Corporate Rules (BCR) 44
    Biobank 44
    Biometric Data 45
    Biometrics 46
    Black Hat Attack 46
    Blacklist 46
    Blackmail 47
    Blinding 48
    Blockchain 48
    Block Cipher 50
    Blocking Variable 50
    Blocklist 50
    Bluejacking 50
    Bluesnarfing 51
    Blue Team 51
    Bluetooth 51
    Bodily Privacy 52
    Bot 52
    Botnet 53
    Boundary 54
    Bounded Rationality 54
    Bounds 55
    Brain–Computer Interface (BCI) 55
    Brain Implant 56
    Brainwashing 56
    Breach 57
    Breach Disclosure 58
    Breach of Confidence 59
    Bring Your Own Device Policy (BYOD) 59
    Browser Fingerprinting 60
    Browsing History 60
    Brussels Effect 61
    Brute Force Attack 61
    Buffer Overflow Attack 62
    Bug 63
    Business Case 63
    Business Impact Level 64
    BYOD 64
    C
    CA 65
    Categorical Data 65
    CCTV 65
    Celebrity Privacy 66
    Cell Suppression 66
    Censorship 66
    Census 67
    Centralised Governance 67
    Certification 68
    Certification Authority (CA) 69
    Chain of Trust 69
    Challenge-Response 70
    Charter of Fundamental Rights 70
    Charter Rights 71
    Checksum 71
    Chief Privacy Officer 72
    Children’s Privacy 72
    Chilling Effect 73
    Chinese Wall 74
    Choice Architecture 74
    CIA Triad 74
    Cipher 75
    Ciphertext 76
    Classified Information 76
    Cleartext 76
    Clickstream Data 77
    Client Confidentiality 77
    Client-Side Scanning 78
    Closed Circuit Television (CCTV) 78
    Cloud Computing 79
    Cloud Storage 80
    Code Audit 81
    Code of Conduct 82
    Code of Ethics 82
    Code Review 83
    Commodification 83
    Common Law 84
    Communication 84
    Communication Privacy 85
    Communication Privacy Management (CPM) Theory 86
    Community Privacy 87
    Compliance 88
    Concentration Rule 88
    Conditions for Processing 88
    Confidence 89
    Confidentiality 89
    Confidentiality Club 91
    Confidentiality Pledge 91
    Conflict of Rights 92
    Connected Place 92
    Connectomics 93
    Consent 93
    Consent Form 94
    Consequential Data 95
    Consistency Mechanism 95
    Consumer Information Markets 96
    Consumer Preference Information 97
    Content Data 97
    Contextual Advertising 98
    Contextual Integrity 98
    Continuous Data 99
    Controlled Rounding 99
    Controlled Tabular Adjustment (CTA) 99
    Convention 108 100
    Cookie 100
    Cooperation Mechanism 101
    Co-Privacy 102
    Correct Attribution Probability 102
    Count Data 103
    CPM 103
    Credentials 103
    Creepiness 103
    Creepy Line, The 104
    Crime Prevention Exemptions 104
    CRM 105
    Cross-Border Data Processing 105
    Cross-Device Tracking 105
    Cross-Site Request Forgery (CSRF) 106
    Cross-Site Scripting (XSS) 107
    Cryptanalysis 107
    Cryptocurrency 108
    Cryptographic Hash Function 109
    Cryptographic Key 109
    Cryptographic Protocol 110
    Cryptography 110
    Crypto-Shredding 111
    Crypto Wars 112
    CTA 112
    Cultural Variation of Privacy 113
    Currency 113
    Customer Relationship Management (CRM) 114
    Customer Tracking 114
    Cybercrime 115
    Cyber Insurance 116
    Cyber Resilience 117
    Cybersecurity 117
    Cyberstalking 117
    Cyberterrorism 118
    Cyberwarfare 119
    Cypher 120
    Cypherpunk 120
    D
    Dark Pattern 121
    Dark Web 121
    Data 122
    Data Abuse 123
    Data Ageing 123
    Data Aging 124
    Data at Rest 124
    Database 124
    Database of Ruin 124
    Data Breach 125
    Data Breach Notification 126
    Data Broker 126
    Data Capture 127
    Data Centre 127
    Data Classification 128
    Data Controller 128
    Data Curation 129
    Data Custodian 129
    Data Degaussing 129
    Data Destruction 130
    Data Divergence 130
    Data Dumping 130
    Data Enclave 131
    Data Environment 131
    Data Environment Analysis 132
    Data Ethics 132
    Data Exhaust 133
    Datafication 133
    Data Flow 134
    Data Flow Diagram 134
    Data Governance 135
    Data Harmonisation 136
    Data Harvesting 136
    Data in Motion 137
    Data Intermediary 137
    Data in Transit 137
    Data Intruder 138
    Data Intrusion Simulation 138
    Data in Use 138
    Data Lake 138
    Data Lifecycle 139
    Data Lifecycle Management 140
    Data Linkage 140
    Data Map 141
    Data Minimisation 141
    Data Minimisation Principle 142
    Data Mining 142
    Data Ownership 143
    Data Portability 144
    Data Privacy 145
    Data Processing 145
    Data Processor 145
    Data Protection 145
    Data Protection Authority 146
    Data-Protection-by-Default 146
    Data-Protection-by-Design 147
    Data Protection Directive 147
    Data Protection Impact Assessment (DPIA) 148
    Data Protection Officer (DPO) 149
    Data Protection Policy 150
    Data Protection Principles 151
    Data Provenance 151
    Data Quality 152
    Data Recipient 153
    Data Release 153
    Data Retention 154
    Data Safe Haven 155
    Data Sanitisation 156
    Data Schema 156
    Dataset 156
    Data Sharing 157
    Data Sharing Agreement (DSA) 158
    Data Situation 158
    Data Situation Audit 159
    Data Sovereignty 159
    Data Steward 160
    Data Stewardship Organisation 161
    Data Storage 161
    Data Subject 162
    Data Subject Access Request 163
    Data Synthesis 163
    Data Transfer 164
    Data Trust 165
    Data Unit 166
    Data User 166
    Data Utility 166
    Dataveillance 167
    Data Warehouse 168
    DDOS 168
    Deanonymisation 169
    Decentralisation of the Web 169
    Decisional Privacy 170
    Declared Data 170
    Decryption 171
    Deepfake 171
    Deep Learning 172
    Deep Packet Inspection (DPI) 173
    Deep Web 173
    Defamation 173
    Default Settings 174
    De-Identification 175
    Deletion 175
    Delta 176
    Demographic Advertising 176
    Demonstration Attack 176
    Denial of Service (DoS) 177
    Deterministic Record Linkage 178
    Device Fingerprinting 178
    DICOM Standard (Digital Imaging and Communications in
    Medicine) 179
    Differencing 179
    Differential Identifiability 180
    Differential Privacy 180
    Digital Assistant 181
    Digital Breadcrumbs 182
    Digital Certificate 182
    Digital Divide 183
    Digital Economy 183
    Digital Fingerprinting 183
    Digital Footprint 184
    Digital Footprint Eraser 185
    Digital Hygiene 186
    Digital Imaging and Communications in
    Medicine 186
    Digital Identity 186
    Digital Inequality 187
    Digital Inheritance 188
    Digital Literacy 188
    Digital Persona 189
    Digital Rights Management (DRM) 189
    Digital Self-Determination 190
    Digital Signature 190
    Digital Twin 191
    Digital Wallet 191
    Dignity 192
    Direct Access Attack 192
    Direct Identifier 193
    Direct Marketing 193
    Directory Indexing 194
    Disassociability 194
    Disclosive Data 194
    Disclosure 195
    Disclosure and Barring (Check) 195
    Disclosure Control Methods 195
    Disclosure Risk 196
    Discrete Data 196
    Discretionary Access Control 197
    Discretisation 197
    Disguise 197
    Distributed Denial of Service 197
    Distributed Ledger 198
    DNS Server 198
    Domain Generalisation 198
    Dominance Rule 199
    Do Not Track (Protocol) 199
    DOS 200
    Doxxing 200
    DPI 200
    DPIA 200
    DPO 200
    D-Privacy 200
    DRM 201
    DSA 201
    Duty of Confidence 201
    Duty to Protect 201
    Duty to Warn 201
    Dyad 202
    Dynamic Consent 202
    Dynamic Data Situation 203
    E
    E2EE 204
    E3 204
    Eavesdropping 204
    Eavesdropping Attack 204
    ECHR 205
    E-Commerce 205
    Economics of Privacy 206
    Edge Computing 207
    EDPB 207
    EDPS 207
    EHR 208
    Electronic Health Record (EHR) 208
    EM Algorithm 208
    Emotion Recognition 209
    Employee Information 210
    Encrypt-Everything-Everywhere (E3) 210
    Encryption 211
    Encryption Algorithm 211
    Encryption Key 211
    Endpoint Security 212
    End-to-End Encryption (E2EE) 212
    End-User Licence Agreement (EULA) 213
    Engineering Ethics 213
    Enhanced Privacy ID (EPID) 214
    EPID 214
    Eprivacy Directive 214
    Eprivacy Regulation 215
    Epsilon 215
    Equivalence Class 216
    Equivalence Class Structure 216
    Erasure 216
    Escrow 217
    Ethical Hacking 218
    Ethics 218
    Ethics Committee 218
    EULA 219
    European Convention on Human Rights (ECHR) 219
    European Data Protection Board (EDPB) 220
    European Data Protection Supervisor (EDPS) 221
    Exfiltration 221
    Expectation-Maximization Algorithm 221
    Explainable AI (XAI) 221
    Explanatory Variable 222
    Explicit Consent 222
    Exposure 223
    Express Consent 223
    Extranet 224
    Extrinsic Privacy 224
    F
    Face Recognition 225
    Facial Recognition Technology 225
    FAIR 226
    Fair Information Practice Principles (FIPPS) 226
    Fairness 227
    Fair Processing Notice 228
    Fake Profile 228
    False Light 229
    False Negative 230
    False Positive 230
    Family Resemblance Theory of Meaning 231
    FARAS 231
    Feature 231
    Federal Trade Commission (FTC) 232
    Federated Identity 232
    Federated Learning 233
    Feminist Critique of Privacy 233
    FHE 234
    Fiduciary Duty 234
    Filing System 235
    Financial Privacy 235
    FIPPS 236
    Firewall 236
    Firmware 237
    Fishing Attack 238
    Five Safes 238
    Flexible Output 238
    Formal Anonymisation 239
    Formal Privacy 239
    Format Preserving Encryption (FPE) 240
    Foundation Model 240
    FPE 240
    Freedom of Expression 241
    Freedom of Information 241
    Freely Given Consent 242
    Frequency Data 242
    FTC 243
    Fully Automated Remote Analysis System (FARAS) 243
    Fully Homomorphic Encryption (FHE) 243
    Functional Anonymisation 244
    Functional Unique Identifier 245
    Function Creep 246
    Fuzzing 246
    G
    Gait Recognition 247
    Game Theory 247
    Gatekeeper 248
    GDPR (General Data Protection Regulation) 248
    Gendered Spaces 250
    General Data Protection Regulation 250
    Generative AI 250
    Genetic Data 251
    Genetic Fingerprint 251
    Genetic Privacy 252
    Genomic Data 253
    Geographical Resolution 253
    Geoprivacy 254
    Geo-Social Data 254
    Geotagging 255
    Globally Unique Identifier (GUID) 255
    Global Privacy Control (GPC) 256
    Global Recoding 256
    Global Suppression 257
    Gossip 257
    GPC 257
    Graduated Security 258
    Grey Hat Attack 258
    Group Harms 258
    Group Privacy 259
    GUID 260
    H
    Hacking 261
    Harassment 261
    Harm 262
    Hashing 263
    Header Information 263
    Health Information Exchange (HIE) 264
    Health Insurance Portability and Accountability Act (HIPAA) 265
    Hellinger Distance 265
    Hidden Service 266
    HIE 266
    Hierarchical Data 266
    HIPAA 266
    History of Privacy 266
    Homomorphic Encryption 268
    Honeypot 268
    HRIA 269
    HTTP 269
    HTTPS 269
    Human-Centred Cybersecurity 269
    Human Rights Impact Assessment (HRIA) 270
    Hypertext Transfer Protocol (HTTP) 270
    Hypertext Transfer Protocol Secure (HTTPS) 271
    I
    I2P 272
    ID Card 272
    Idem-Identity 272
    Identifiability 273
    Identifiable Data 273
    Identifiable Individual 273
    Identifiable Natural Person 273
    Identification Card 274
    Identification File 275
    Identified Data 276
    Identified Natural Person 276
    Identifier 277
    Identity 277
    Identity Assurance 279
    Identity Cloning 280
    Identity Disclosure 280
    Identity Documents 281
    Identity Management 281
    Identity Provider 282
    Identity Theft 283
    Ideological Privacy 283
    IDS 284
    Impact Management 284
    Impersonation 284
    Implicit Consent 284
    Imputation 285
    Inadvertent Disclosure 285
    Incognito Mode 286
    Incremental Authorisation 286
    Indirect Identifier 286
    Inference 287
    Inference Attack 288
    Inferential Disclosure 288
    Inferred Data 289
    Inforgs 289
    Information 289
    Informational Privacy 289
    Informational Self-Determination 291
    Information Broker 291
    Information Classification Table 291
    Information Ethics 292
    Information Governance 292
    Information Lifecycle Management 293
    Information Loss 293
    Information Ownership 293
    Information Security 294
    Informed Consent 294
    Infosphere 295
    Inherence 296
    Input Privacy 296
    Input Statistical Discloure Control 297
    Integrity 297
    Intellectual Privacy 298
    Intellectual Property (IP) 298
    Intentional Data 300
    Intention–Behaviour Gap 300
    Interference 300
    Internal Security Testing 301
    International Transfer 301
    Internet 301
    Internet of Humans 302
    Internet of People 302
    Internet of Things 302
    Internet Protocol (IP) 303
    Interoperability 304
    Interval Publication 305
    Intimacy 305
    Intranet 306
    Intruder 306
    Intruder Testing 307
    Intrusion 307
    Intrusion Detection System (IDS) 308
    Intrusion Prevention System (IPS) 308
    Intrusion upon Seclusion 309
    Invasive BCI 309
    Inversion Attack 310
    Inviolate Personality 310
    Invisible Computing 311
    Invisible Internet Project 311
    IP 311
    IP Address 312
    IPS 312
    IPSE-Identity 312
    Iris Scanning 312
    Irreversibility 313
    ISO27001 313
    ISO27002 314
    Isolation 314
    J Jensen–Shannon Divergence 316
    Jigsaw Identification 316
    Joint Data Controller 316
    Jurisdiction 317
    Just-In-Time Consent 317
    Just-In-Time Notice 318
    K
    K-Anonymity 319
    Key Disclosure 319
    Key Logger 319
    Key Logging 319
    Key Variable 320
    Knowledge Economy 320
    Kompromat 320
    L
    Laplace Noise 322
    Large Language Model 322
    Lawful Basis 322
    Lawfulness 323
    Layered Notice 324
    Layered Security Model 324
    LBS 325
    L-Diversity 325
    Lead Supervisory Authority 325
    Least Privilege 326
    Legal Basis for Processing 326
    Legitimate Interest 326
    Libel 327
    Licence Agreement 327
    Lifecasting 328
    Lifelogging 328
    Lifestreaming 329
    Linkability 329
    Linkable Information 330
    Linkage 330
    Linkage Attack 330
    Link Encryption 331
    Local Shared Object (LSO) 331
    Local Suppression 331
    Locational Privacy 332
    Location-Based Service (LBS) 333
    Location Data 333
    Location Tracking 334
    Logic Bomb 334
    Longitudinal Data 335
    Loyalty Card 335
    LSO 336
    M
    MAC 337
    Machine Learning (ML) 337
    Magnitude Data 339
    Main Establishment 339
    Male Gaze, The 339
    Malicious Proxy Server 340
    Malware 340
    Management Information System 340
    Mandatory Access Control (MAC) 341
    Mandatory Decryption 341
    Mandatory Key Disclosure 342
    Man-in-the-Middle Attack 342
    Manual Key Transport 343
    Mash Attack 343
    Mask 343
    Masking 344
    Masquerade 344
    Matching 344
    Material Scope 345
    Material Transfer Agreement 345
    Maximum Knowledge Intruder 346
    Media Access Control (MAC) Address 346
    Medical Record 347
    Membership Inference Attack 347
    Mental Capacity 347
    Mental Privacy 348
    Mesh Network 349
    Message Digest 349
    Metadata 350
    Metadata-Level Controls 350
    Metaverse 351
    MFA 351
    Microaggregation 351
    Microdata 352
    Minimal Unique 352
    Missing Data 353
    Mission Creep 353
    Misuse of Private Information 353
    ML 354
    Mobility Traces 354
    Model Inversion Attack 355
    Molka 355
    Monetary Equivalent Burden (of Privacy) 355
    Mosaic Identification 356
    Motivated Intruder 356
    Motivated Intruder Test 356
    M-Probability 356
    Multi-Factor Authentication (MFA) 357
    Multimodal De-Identification 357
    Multiple Imputation 357
    Multi-Vector Attacks 358
    Mutual Assistance 358
    Mutual Authentication 358
    N
    National Security 360
    Natural Person 360
    Necessity 361
    Need to Know 361
    Negative Externalities of Disclosed Data 362
    Negative Externalities of Privacy 362
    Negligence 363
    Network 364
    Network Encryption 364
    Network Layer Attack 364
    Network Security 365
    Network Segmentation 365
    Neural Prosthesis 366
    Neurocapitalism 366
    Neurodata 367
    Neuroethics 367
    Neuroprivacy 368
    Neuroprosthetics 368
    Neurotechnology 368
    (N,K) Rule 369
    Noise Addition 369
    Nom de Guerre 369
    Nom de Plume 369
    Nominal Data 370
    Non-Disclosure Agreements 370
    Non-Discrimination Law 370
    Non-Invasive BCI 371
    Notice and Consent 371
    Nudge Theory 372
    Nudging 372
    O
    Obfuscation 373
    Objective Harm 373
    Oblivious Transfer (OT) 373
    Obscurity 374
    Obtrusion 375
    OECD Guidelines (On Privacy) 375
    Offline Dictionary Attack 376
    One-Stop-Shop 377
    One-Way Hash Function 377
    Onion Routing 378
    Online Vetting 378
    Ontological Security 378
    Onward Transfer 379
    OPE 380
    Open Access 380
    Open Data 381
    Open Source 382
    Opt-In 383
    Opt-Out 383
    Order-Preserving Encryption 384
    Ordinal Data 385
    Orwell Attack 385
    OT 385
    Other 386
    Outing 386
    Outlier 386
    Output Checking 387
    Output Privacy 387
    Output Statistical Disclosure Control 388
    Overimputation 389
    P
    P3P 390
    Packet Filter 390
    Packet Sniffing 390
    Panel Data 391
    Panopticon 391
    Paparazzi 392
    Paparazzi Attack 392
    Parental Controls 393
    Partially Homomorphic Encryption 393
    Participant Information Sheets 393
    Participatory Surveillance 394
    Passive Collection 394
    Password 395
    Password Manager 395
    Patch 395
    Patch Management 396
    PDS 396
    Peeping Tom 396
    Penetralia 396
    Penetration Test 397
    Persistent Cookie 397
    Persistent Pseudonym 397
    Person 398
    Personal Data 398
    Personal Data Cloud 399
    Personal Data Store (PDS) 399
    Personal Identification Number (PIN) 400
    Personal Information 400
    Personal Information Management System (PIMS) 401
    Personalisation 402
    Personalisation Reactance 403
    Personalised Medicine 403
    Personalised Services 404
    Personally Identifiable Information (PII) 404
    Personal Space 405
    Personhood 405
    Perturbation 406
    Pervasive Computing 406
    PET 406
    Pharming 407
    PHE 407
    Philosophy of Information 407
    Phishing 409
    Phone Hacking 409
    Physical Privacy 409
    PIA 410
    PII 410
    PIMS 410
    PIN 410
    Pixelisation 410
    Plaintext 411
    Platform for Privacy Preferences (P3P) 411
    Poisoning Attack 412
    Population 412
    Population Unique 412
    Population Unit 413
    Port Scan 413
    Positive Externalities of Disclosed Data 414
    Post Quantum Cryptography (PQC) 414
    Post Randomisation (PRAM) 415
    PPDA 415
    PPDM 415
    PPML 415
    P/Q Rule 415
    PRAM 416
    Predictive Analytics 416
    Predictive Modelling 417
    Presence Detection 417
    Price Discrimination 417
    Primary Data 418
    Prior Posterior Ambiguity Rule 418
    Privacy 418
    Privacy as Control 419
    Privacy as Redistribution of Costs 420
    Privacy Avatar 421
    Privacy, Benefits of 421
    Privacy Budget 422
    Privacy-by-Design 422
    Privacy Calculus 423
    Privacy Concern 423
    Privacy, Cultural Variation of 424
    Privacy Elasticity 424
    Privacy Engineering 424
    Privacy-Enhancing Technology (PET) 425
    Privacy First 425
    Privacy Fundamentalists 426
    Privacy Guarantee 426
    Privacy Impact Assessment 427
    Privacy Insurance 427
    Privacy-Invasive Technology 427
    Privacy Metric 428
    Privacy Model 428
    Privacy Notice 429
    Privacy Officer 429
    Privacy Paradox 430
    Privacy Policy 431
    Privacy Pragmatists 431
    Privacy Preference 432
    Privacy Premium 432
    Privacy-Preserving Data Analytics (PPDA) 432
    Privacy-Preserving Data Mining (PPDM) 433
    Privacy-Preserving Data Publishing 433
    Privacy-Preserving Machine Learning (PPML) 433
    Privacy-Preserving Record Linkage (PPRL) 434
    Privacy Risk 434
    Privacy Screen 435
    Privacy Seal 435
    Privacy Settings 436
    Privacy Threat 436
    Privacy Tort 437
    Privacy Trade-Off 438
    Privacy Unconcerned 438
    Privacy, Value of 439
    Private Army 439
    Private Biometrics 439
    Private Browsing Mode 440
    Private Enterprise 440
    Private Key 440
    Private Life 440
    Private Parts 441
    Private Property 442
    Private School 442
    Private Sector 443
    Private Sphere 443
    Probabilistic Record Linkage 444
    Processing 445
    Profile 445
    Profiling 445
    Prolepticon 446
    Proportionate Security 446
    Proportionality 447
    Proprietary Privacy 447
    Protected Characteristics 448
    Protocol 448
    Provable Security 449
    Proxemics 450
    Proxy 450
    P% Rule 450
    Pseudonym 450
    Pseudonymisation 451
    Pseudonym Reversal 453
    Psychographic Advertising 453
    Psychological Privacy 453
    Public 454
    Publication 455
    Public Disclosure of Private Facts 455
    Public Domain 456
    Public Figure 456
    Public Interest 457
    Publicity 458
    Public Key 459
    Public-Key Cryptography 459
    Public-Key Infrastructure (PKI) 460
    Public Records 460
    Public Sphere 461
    Publishing 462
    Purchase History 462
    Purple Team 462
    Purpose Limitation 463
    Purpose Specification 464
    Q
    Quantitative Privacy 465
    Quantum Computing 465
    Quasi-Identifier 466
    Query Logging 466
    Query Overlap 467
    Quishing 467
    R
    Radical Transparency 468
    Radio Frequency Identification (RFID) 468
    Randomised Response 469
    Random Rounding 469
    Random Unique 469
    Ransomware 470
    Rational Consumer 470
    Reality Mining 471
    Reasonable Expectation of Privacy 471
    Reasonable Search 473
    Recognition 473
    Recommendation System 473
    Recommender System 474
    Reconstruction Attack 474
    Record 474
    Record Linkage 475
    Records Management 476
    Record Suppression 476
    Rectification 476
    Redaction 476
    Red Team 477
    Reference Monitor 477
    Regulation 477
    Regulators 478
    Reidentification 478
    Reidentification Attack 480
    Relational Autonomy 480
    Release and Forget 481
    Reliability 481
    Reliance 481
    Reliance Authentication 481
    Remailing 482
    Remediation 482
    Remedies 482
    Remote Access 483
    Remote Access Server 483
    Remote Analysis Server 483
    Remote Query 484
    Replay Attack 484
    Repurposing 485
    Reputation 485
    Reputation Management 485
    Reserve 486
    Resilience 486
    Respondent 486
    Response Knowledge 487
    Response Variable 487
    Responsible Disclosure 487
    Restricted Access 488
    Retention 488
    Revenge Porn 488
    Reverse Fishing Attack 489
    Reversibility 489
    Revocation 489
    Right of Access 490
    Right to an Explanation 490
    Right to Be Forgotten 491
    Right to Be Informed 492
    Right to Be Let Alone 493
    Right to Correct 494
    Right to Data Portability 494
    Right to Data Protection 494
    Right to Deletion 495
    Right to Object 495
    Right to Privacy 496
    Right to Rectification 496
    Right to Restriction 496
    Risk 497
    Risk Assessment 498
    Risk Management 498
    Risk Tolerance 498
    Risk–Utility Trade-Off 499
    Roe v Wade 500
    Role-Based Access Control 500
    Rounding 500
    RSA Encryption 501
    R-U Map 501
    Rumour 501
    S
    Safe Data 502
    Safe Harbor 502
    Safe Output 503
    Safe People 503
    Safe Projects 503
    Safe Settings 503
    Safety 504
    Salt 504
    SAML 505
    Sample Unique 505
    Sample Unit 505
    Sampling 505
    Sampling Fraction 505
    Sandbox 506
    Sandboxing 506
    Scenario Analysis 506
    Schrems 507
    Scraping 507
    Scrutiny 507
    SDC 508
    SDL 508
    SDLC 508
    Search 508
    Search Engine 510
    Seclusion 510
    Secondary Data 510
    Secondary Differentiation 511
    Secondary Use 511
    Secrecy 511
    Secret 512
    Secret Ballot 512
    Secret Sharing 513
    Secure Communication 514
    Secure Messaging 514
    Secure Multi-Party Computation 514
    Secure Sockets Layer (SSL) 515
    Secure Web Gateway (SWG) 515
    Secure Web Platform 516
    Security 516
    Security Assertion Markup Language (SAML) 517
    Security Audit 518
    Security-By-Design 518
    Security-By-Obscurity 518
    Security Information Management (SIM) 519
    Security Parameter 519
    Security Posture 520
    Security Requirement 520
    Security Token 520
    Self-Archiving 521
    Self-Control Security 521
    Self-Disclosure 521
    Self-Reflection 522
    Self-Sovereign Identity (SSI) 522
    Self, The 523
    Semantic Security 524
    Semi-Invasive BCI 524
    Sensitive Data 524
    Sensitive Variable 524
    Sensitivity 525
    Sensor 525
    Serial Number 526
    Service User Agreement 526
    Sessional Cookie 526
    Shoulder Surfing 526
    SIM 527
    Single Out 527
    Single Sign-On 528
    Singularity, The 528
    Slander 529
    Smart City 529
    Smart Device 530
    Smart Grid 530
    Smart Implants 531
    Smart Meter 531
    Smishing 531
    SNARK 532
    Social Credit System 532
    Social Engineering 532
    Social Genome 533
    Social Linked Data (SOLID) 533
    Social Network 534
    Social Network Analysis 536
    Social Profiling 536
    Social Steganography 536
    Sock Puppet 536
    Software 536
    Software Development Lifecycle (SDLC) 537
    SOLID 537
    Solitude 537
    Sousveillance 538
    Spam 538
    Spam Filter 539
    Spatial Cloaking 539
    Spatial Privacy 539
    Spear Phishing 540
    Special Category Data 540
    Special Unique 540
    Speech Recognition 541
    Split Tunnelling 541
    Spontaneous Recognition 542
    Spoofing Attack 542
    Spyware 543
    SQL 543
    SQL Injection 543
    SSI 544
    SSL 544
    Stakeholder 544
    Stalking 545
    Standard 545
    Standard Contractual Clauses 546
    Standard Model Clauses 547
    Static Key 547
    Statistical Disclosure 547
    Statistical Disclosure Control (SDC) 548
    Statistical Disclosure Limitation (SDL) 549
    Steganography 549
    Storage Limitation 549
    Streisand Effect 550
    Structural Zero 550
    Structured Query Language (SQL) 551
    Subject Access Request 551
    Subjective Harm 551
    Subliminal Advertising 552
    Subtraction Attack 552
    Succinct Non-Interactive Zero-Knowledge Proof (SNARK) 553
    Super Cookie 553
    Supervisory Authority 554
    Suppression 554
    Surname Attack 555
    Surveillance 555
    Surveillance Capitalism 556
    Swapping Key 557
    SWG 558
    Symmetric Cryptography 558
    Symmetric Key Encryption 558
    Synthetic Data 558
    T Table Redesign 559
    Tabular Data 559
    Tagging 559
    Target Dataset 560
    Targeted Advertising 560
    Target Variable 560
    TCB 560
    T-Closeness 560
    TCP 561
    Technical And Organisational Measures 561
    TEE 561
    Telephone Tapping 561
    Terms of Service 561
    Territorial Privacy 562
    Territorial Scope 562
    Text Anonymisation 563
    TFA 563
    The Onion Router 564
    Therapeutic Alliance 564
    Thermal Imaging 564
    Third Party 565
    Third Party Doctrine 566
    Thought Police 566
    Threat Modelling 566
    Threshold Rule 567
    Time Bomb 567
    Time Series 568
    TIPS (Trust, Identity, Privacy, Security) 568
    TLS 569
    Tokenisation 569
    Topcoding 569
    TOR (The Onion Router) 569
    Tracing 570
    Tracker 570
    Tracker Blocker 571
    Tracking 571
    Traffic Data 571
    Transmission Control Protocol (TCP) 572
    Transparency 572
    Transparency Notice 573
    Trapdoor 574
    Trespass 574
    Trojan Horse 574
    Trust 575
    Trusted Computing Base (TCB) 576
    Trusted Execution Environment (TEE) 576
    Trusted Research Environment 577
    Trusted Third Party 577
    Trustworthy Digital Identity 578
    Tunnel Encryption 578
    Two Factor Authentication (TFA) 578
    U
    Ubicomp 579
    Ubiquitous Computing (UBICOMP) 579
    UK GDPR 579
    Unambiguous Consent 580
    Unicity 580
    Uniform Resource Identifier (URI) 580
    Unique Identifier 581
    Uniqueness 581
    Unreasonable Search 581
    Untraceability 582
    U-Probability 583
    URI 583
    User 583
    User-Centred Design 584
    User Modelling 584
    Username 585
    US Privacy Laws 585
    Utility First 586
    V Value–Action Gap 587
    Value of Data 587
    Value of Privacy 588
    Value Sensitive Design (VSD) 589
    Veil 589
    Verifiable Secret Sharing (VSS) 590
    Vicarious Liability 590
    Virality 591
    Virtual Machine (VM) 592
    Virtual Private Network (VPN) 592
    Virus 593
    Vishing 593
    Vital Interests 593
    VM 594
    Voice over Internet Protocol (VoIP) 594
    VoIP 595
    Voyeurism 595
    VPN 595
    VSD 595
    VSS 595
    Vulnerability 595
    Vulnerability Management 596
    Vulnerable Population 597
    W Wearable Computing 598
    Wearable Tech 599
    Web 2.0 599
    Web 3.0 599
    Web Beacon 600
    Web Bug 601
    Web of Trust 601
    Web Profiling 602
    Web Skimming Attack 602
    Whistleblowing 602
    White Box Testing 603
    White Hat Attack 604
    Wiretapping 604
    World Wide Web (WWW) 604
    Worm 606
    WWW 606
    X
    XAI 607
    XSS 607
    X Variable 607
    Y
    Y Chromosome 608
    Y Variable 608
    Z
    Zero Day Attack 609
    Zero Knowledge 609
    Zero Knowledge Proof 610
    Zero Trust Security 610

你可能需要

The Hong Kong Company Secretary's Handbook: Practice and Procedure (11th Edition)
The Hong Kong Company Secretary's Handbook: Practice and Procedure (11th Edition)

List Price: ¥517.94

¥502.40 Save ¥15.54 (3%)

Hong Kong Tax & Accounting Practical Toolkit (Basic Package)
Hong Kong Tax & Accounting Practical Toolkit (Basic Package)
¥3,420.66
Hong Kong Company Secretary Checklist, 2nd Edition
Hong Kong Company Secretary Checklist, 2nd Edition

List Price: ¥1,297.20

¥1,258.28 Save ¥38.92 (3%)

Law of Companies in Hong Kong, 4th Edition (Hardcopy + e-Book)
Law of Companies in Hong Kong, 4th Edition (Hardcopy + e-Book)

List Price: ¥3,290.00

¥3,191.30 Save ¥98.70 (3%)

Butterworths Hong Kong Discrimination Law Handbook, 4th Edition
Butterworths Hong Kong Discrimination Law Handbook, 4th Edition

List Price: ¥1,410.00

¥1,367.70 Save ¥42.30 (3%)

Sentencing in Hong Kong, 11th Edition
Sentencing in Hong Kong, 11th Edition

List Price: ¥3,365.20

¥3,264.24 Save ¥100.96 (3%)

Butterworths Hong Kong Company Law (Winding-Up and Miscellaneous Provisions) Handbook, 6th Edition
Butterworths Hong Kong Company Law (Winding-Up and Miscellaneous Provisions) Handbook, 6th Edition

List Price: ¥2,143.20

¥2,078.90 Save ¥64.30 (3%)

Butterworths Hong Kong Company Law Handbook, 26th Edition
Butterworths Hong Kong Company Law Handbook, 26th Edition

List Price: ¥4,136.00

¥4,011.92 Save ¥124.08 (3%)

Cross-Border Crime in Hong Kong: Extradition, Mutual Assistance & Financial Sanctions, 3rd Edition
Cross-Border Crime in Hong Kong: Extradition, Mutual Assistance & Financial Sanctions, 3rd Edition

List Price: ¥1,955.20

¥1,896.54 Save ¥58.66 (3%)

Clough & Clough on Personal Injuries
Clough & Clough on Personal Injuries

List Price: ¥1,410.00

¥1,367.70 Save ¥42.30 (3%)

Hong Kong Personal Insolvency Manual, 3rd Edition
Hong Kong Personal Insolvency Manual, 3rd Edition

List Price: ¥1,880.00

¥1,823.60 Save ¥56.40 (3%)

Butterworths Hong Kong Conveyancing and Property Law Handbook, 6th Edition
Butterworths Hong Kong Conveyancing and Property Law Handbook, 6th Edition

List Price: ¥1,692.00

¥1,641.24 Save ¥50.76 (3%)

A Practical Guide to Resolving Shareholder Disputes, 2nd Edition
A Practical Guide to Resolving Shareholder Disputes, 2nd Edition

List Price: ¥1,692.00

¥1,641.24 Save ¥50.76 (3%)

Tort Law in Hong Kong, 5th Edition (Hardcopy + ebook)
Tort Law in Hong Kong, 5th Edition (Hardcopy + ebook)

List Price: ¥2,350.00

¥2,279.50 Save ¥70.50 (3%)

Company Law in Hong Kong: Practice and Procedure 2023 (Hardcopy + e-Book)
Company Law in Hong Kong: Practice and Procedure 2023 (Hardcopy + e-Book)

List Price: ¥3,006.12

¥2,915.94 Save ¥90.18 (3%)

Company Law in Hong Kong: Insolvency 2023 (Hardcopy + e-Book)
Company Law in Hong Kong: Insolvency 2023 (Hardcopy + e-Book)

List Price: ¥2,672.42

¥2,592.25 Save ¥80.17 (3%)

Hong Kong Company Law, 15th Edition
Hong Kong Company Law, 15th Edition

List Price: ¥462.48

¥448.61 Save ¥13.87 (3%)

Private Equity in Hong Kong and China, 4th Edition
Private Equity in Hong Kong and China, 4th Edition

List Price: ¥1,880.00

¥1,823.60 Save ¥56.40 (3%)

Brooke's Notary Hong Kong, 3rd Edition
Brooke's Notary Hong Kong, 3rd Edition

List Price: ¥1,598.00

¥1,550.06 Save ¥47.94 (3%)

Butterworths Hong Kong Employees' Compensation Handbook, 7th Edition
Butterworths Hong Kong Employees' Compensation Handbook, 7th Edition

List Price: ¥1,974.00

¥1,914.78 Save ¥59.22 (3%)