Dictionary of Privacy, Data Protection and Information Security

Hardback

Dictionary of Privacy, Data Protection and Information Security

9781035300914 Edward Elgar Publishing
Mark Elliot, Professor of Data Science, School of Social Sciences, University of Manchester, UK, Anna Maria Mandalari, Assistant Professor, Department of Electronic and Electrical Engineering, University College London, UK, Miranda Mourby, Researcher, Faculty of Law, University of Oxford, UK and Kieron O’Hara, Emeritus Fellow in Electronics and Computer Science, University of Southampton, UK
Publication Date: July 2024 ISBN: 978 1 03530 091 4 Extent: 652 pp
This is an open access title available under the terms of a CC BY-NC-ND 4.0 License. It is free to read, download and share on Elgaronline.com.

The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy.

Copyright & permissions

Recommend to librarian

Your Details

Privacy Policy

Librarian Details

Download leaflet

Print page

More Information
Critical Acclaim
Contents
More Information
The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy.

The revolutionary and pervasive influence of digital technology affects numerous disciplines and sectors of society, and concerns about its potential threats to privacy are growing. With over a thousand terms meticulously set out, described and cross-referenced, this Dictionary enables productive discussion by covering the full range of fields accessibly and comprehensively. In the ever-evolving debate surrounding privacy, this Dictionary takes a longer view, transcending the details of today''s problems, technology, and the law to examine the wider principles that underlie privacy discourse.

Interdisciplinary in scope, this Dictionary is invaluable to students, scholars and researchers in law, technology and computing, cybersecurity, sociology, public policy and administration, and regulation. It is also a vital reference for diverse practitioners including data scientists, lawyers, policymakers and regulators.
Critical Acclaim
‘The prize for top class analysis of linked administrative data is huge. But it is critical that such data are held safely and used ethically. This can be hugely enhanced by the use of privacy enhancing methods. This Dictionary, compiled by some of the leading figures in the field, is an important source for identifying the best strategy. I am delighted to endorse it.’
– Sir Ian Diamond, UK National Statistician
Contents
Contents
Acknowledgements xxxviii
Preface xxxix
How to use this dictionary xlii
A
A29WP 1
Abortion 1
Abstract 2
Accessibility 2
Access Control 2
Access Control List (ACL) 2
Access Point 3
Accountability 3
Account Management 4
Account Take Over (ATO) 4
Accuracy 4
ACL 5
Additivity 5
Adequacy 5
Ad Exchange 6
ADF 6
Ad Hoc Network 7
Ad Network 7
Adtech 8
Advanced Electronic Signature 8
Advanced Encryption Standard (AES) 8
Adversary 9
Adware 9
AES 10
Affinity Analysis 10
Aggregation 10
Agreement 10
AI 11
Algorithm 11
American Data Privacy and Protection Act 11
Analogue Hole 11
Analysis Server 12
Analytical Completeness 12
Analytical Validity 12
Anomaly Detection 13
Anonymisation 13
Anonymisation Decision-Making Framework (ADF) 15
Anonymising Proxy 15
Anonymity 15
Anonymous Search Engine 16
Anti-Discrimination Law 16
Anti-Malware Software 16
Anti-Virus Software 17
APEC Privacy Principles 17
API 18
App 18
Application (App) 18
Application Layer Attack 19
Application Programming Interface (API) 19
Appropriate Safeguards 20
Appropriate Technical and Organisational Measures 20
Appropriation of Name or Likeness 21
AR 21
Article 29 Working Party (A29WP) 21
Artificial Intelligence (AI) 22
AS 23
Asset 23
Associational Privacy 24
Assured Data Deletion 24
Asymmetric Cryptography 24
Asymmetric Information 25
ATO 25
Attack 26
Attacker 26
Attack Model 26
Attack Surface 26
Attack Tree 27
Attack Vector 27
Attentional Privacy 27
Attention as a Resource 28
Attention Tracking 28
Attitude–Behaviour Gap 29
Attribute 29
Attribute Disclosure 30
Attribution 30
Audit Trail 31
Augmented Reality (AR) 31
Authentication 32
Authorisation 32
Automated Decision-Making 33
Autonomous System (AS) 34
Autonomy 34
Auxiliary Data 35
Auxiliary Information 35
Auxiliary Knowledge 35
Availability 36
Awareness 36
B
Backdoor 38
Back-Up 38
Barnardisation 39
BCI 39
BCR 40
Behavioural Advertising 40
Benefits of Privacy 40
Bicycle Attack 41
Big Brother 42
Big Data 42
Binary Variable 43
Binding Corporate Rules (BCR) 44
Biobank 44
Biometric Data 45
Biometrics 46
Black Hat Attack 46
Blacklist 46
Blackmail 47
Blinding 48
Blockchain 48
Block Cipher 50
Blocking Variable 50
Blocklist 50
Bluejacking 50
Bluesnarfing 51
Blue Team 51
Bluetooth 51
Bodily Privacy 52
Bot 52
Botnet 53
Boundary 54
Bounded Rationality 54
Bounds 55
Brain–Computer Interface (BCI) 55
Brain Implant 56
Brainwashing 56
Breach 57
Breach Disclosure 58
Breach of Confidence 59
Bring Your Own Device Policy (BYOD) 59
Browser Fingerprinting 60
Browsing History 60
Brussels Effect 61
Brute Force Attack 61
Buffer Overflow Attack 62
Bug 63
Business Case 63
Business Impact Level 64
BYOD 64
C
CA 65
Categorical Data 65
CCTV 65
Celebrity Privacy 66
Cell Suppression 66
Censorship 66
Census 67
Centralised Governance 67
Certification 68
Certification Authority (CA) 69
Chain of Trust 69
Challenge-Response 70
Charter of Fundamental Rights 70
Charter Rights 71
Checksum 71
Chief Privacy Officer 72
Children’s Privacy 72
Chilling Effect 73
Chinese Wall 74
Choice Architecture 74
CIA Triad 74
Cipher 75
Ciphertext 76
Classified Information 76
Cleartext 76
Clickstream Data 77
Client Confidentiality 77
Client-Side Scanning 78
Closed Circuit Television (CCTV) 78
Cloud Computing 79
Cloud Storage 80
Code Audit 81
Code of Conduct 82
Code of Ethics 82
Code Review 83
Commodification 83
Common Law 84
Communication 84
Communication Privacy 85
Communication Privacy Management (CPM) Theory 86
Community Privacy 87
Compliance 88
Concentration Rule 88
Conditions for Processing 88
Confidence 89
Confidentiality 89
Confidentiality Club 91
Confidentiality Pledge 91
Conflict of Rights 92
Connected Place 92
Connectomics 93
Consent 93
Consent Form 94
Consequential Data 95
Consistency Mechanism 95
Consumer Information Markets 96
Consumer Preference Information 97
Content Data 97
Contextual Advertising 98
Contextual Integrity 98
Continuous Data 99
Controlled Rounding 99
Controlled Tabular Adjustment (CTA) 99
Convention 108 100
Cookie 100
Cooperation Mechanism 101
Co-Privacy 102
Correct Attribution Probability 102
Count Data 103
CPM 103
Credentials 103
Creepiness 103
Creepy Line, The 104
Crime Prevention Exemptions 104
CRM 105
Cross-Border Data Processing 105
Cross-Device Tracking 105
Cross-Site Request Forgery (CSRF) 106
Cross-Site Scripting (XSS) 107
Cryptanalysis 107
Cryptocurrency 108
Cryptographic Hash Function 109
Cryptographic Key 109
Cryptographic Protocol 110
Cryptography 110
Crypto-Shredding 111
Crypto Wars 112
CTA 112
Cultural Variation of Privacy 113
Currency 113
Customer Relationship Management (CRM) 114
Customer Tracking 114
Cybercrime 115
Cyber Insurance 116
Cyber Resilience 117
Cybersecurity 117
Cyberstalking 117
Cyberterrorism 118
Cyberwarfare 119
Cypher 120
Cypherpunk 120
D
Dark Pattern 121
Dark Web 121
Data 122
Data Abuse 123
Data Ageing 123
Data Aging 124
Data at Rest 124
Database 124
Database of Ruin 124
Data Breach 125
Data Breach Notification 126
Data Broker 126
Data Capture 127
Data Centre 127
Data Classification 128
Data Controller 128
Data Curation 129
Data Custodian 129
Data Degaussing 129
Data Destruction 130
Data Divergence 130
Data Dumping 130
Data Enclave 131
Data Environment 131
Data Environment Analysis 132
Data Ethics 132
Data Exhaust 133
Datafication 133
Data Flow 134
Data Flow Diagram 134
Data Governance 135
Data Harmonisation 136
Data Harvesting 136
Data in Motion 137
Data Intermediary 137
Data in Transit 137
Data Intruder 138
Data Intrusion Simulation 138
Data in Use 138
Data Lake 138
Data Lifecycle 139
Data Lifecycle Management 140
Data Linkage 140
Data Map 141
Data Minimisation 141
Data Minimisation Principle 142
Data Mining 142
Data Ownership 143
Data Portability 144
Data Privacy 145
Data Processing 145
Data Processor 145
Data Protection 145
Data Protection Authority 146
Data-Protection-by-Default 146
Data-Protection-by-Design 147
Data Protection Directive 147
Data Protection Impact Assessment (DPIA) 148
Data Protection Officer (DPO) 149
Data Protection Policy 150
Data Protection Principles 151
Data Provenance 151
Data Quality 152
Data Recipient 153
Data Release 153
Data Retention 154
Data Safe Haven 155
Data Sanitisation 156
Data Schema 156
Dataset 156
Data Sharing 157
Data Sharing Agreement (DSA) 158
Data Situation 158
Data Situation Audit 159
Data Sovereignty 159
Data Steward 160
Data Stewardship Organisation 161
Data Storage 161
Data Subject 162
Data Subject Access Request 163
Data Synthesis 163
Data Transfer 164
Data Trust 165
Data Unit 166
Data User 166
Data Utility 166
Dataveillance 167
Data Warehouse 168
DDOS 168
Deanonymisation 169
Decentralisation of the Web 169
Decisional Privacy 170
Declared Data 170
Decryption 171
Deepfake 171
Deep Learning 172
Deep Packet Inspection (DPI) 173
Deep Web 173
Defamation 173
Default Settings 174
De-Identification 175
Deletion 175
Delta 176
Demographic Advertising 176
Demonstration Attack 176
Denial of Service (DoS) 177
Deterministic Record Linkage 178
Device Fingerprinting 178
DICOM Standard (Digital Imaging and Communications in
Medicine) 179
Differencing 179
Differential Identifiability 180
Differential Privacy 180
Digital Assistant 181
Digital Breadcrumbs 182
Digital Certificate 182
Digital Divide 183
Digital Economy 183
Digital Fingerprinting 183
Digital Footprint 184
Digital Footprint Eraser 185
Digital Hygiene 186
Digital Imaging and Communications in
Medicine 186
Digital Identity 186
Digital Inequality 187
Digital Inheritance 188
Digital Literacy 188
Digital Persona 189
Digital Rights Management (DRM) 189
Digital Self-Determination 190
Digital Signature 190
Digital Twin 191
Digital Wallet 191
Dignity 192
Direct Access Attack 192
Direct Identifier 193
Direct Marketing 193
Directory Indexing 194
Disassociability 194
Disclosive Data 194
Disclosure 195
Disclosure and Barring (Check) 195
Disclosure Control Methods 195
Disclosure Risk 196
Discrete Data 196
Discretionary Access Control 197
Discretisation 197
Disguise 197
Distributed Denial of Service 197
Distributed Ledger 198
DNS Server 198
Domain Generalisation 198
Dominance Rule 199
Do Not Track (Protocol) 199
DOS 200
Doxxing 200
DPI 200
DPIA 200
DPO 200
D-Privacy 200
DRM 201
DSA 201
Duty of Confidence 201
Duty to Protect 201
Duty to Warn 201
Dyad 202
Dynamic Consent 202
Dynamic Data Situation 203
E
E2EE 204
E3 204
Eavesdropping 204
Eavesdropping Attack 204
ECHR 205
E-Commerce 205
Economics of Privacy 206
Edge Computing 207
EDPB 207
EDPS 207
EHR 208
Electronic Health Record (EHR) 208
EM Algorithm 208
Emotion Recognition 209
Employee Information 210
Encrypt-Everything-Everywhere (E3) 210
Encryption 211
Encryption Algorithm 211
Encryption Key 211
Endpoint Security 212
End-to-End Encryption (E2EE) 212
End-User Licence Agreement (EULA) 213
Engineering Ethics 213
Enhanced Privacy ID (EPID) 214
EPID 214
Eprivacy Directive 214
Eprivacy Regulation 215
Epsilon 215
Equivalence Class 216
Equivalence Class Structure 216
Erasure 216
Escrow 217
Ethical Hacking 218
Ethics 218
Ethics Committee 218
EULA 219
European Convention on Human Rights (ECHR) 219
European Data Protection Board (EDPB) 220
European Data Protection Supervisor (EDPS) 221
Exfiltration 221
Expectation-Maximization Algorithm 221
Explainable AI (XAI) 221
Explanatory Variable 222
Explicit Consent 222
Exposure 223
Express Consent 223
Extranet 224
Extrinsic Privacy 224
F
Face Recognition 225
Facial Recognition Technology 225
FAIR 226
Fair Information Practice Principles (FIPPS) 226
Fairness 227
Fair Processing Notice 228
Fake Profile 228
False Light 229
False Negative 230
False Positive 230
Family Resemblance Theory of Meaning 231
FARAS 231
Feature 231
Federal Trade Commission (FTC) 232
Federated Identity 232
Federated Learning 233
Feminist Critique of Privacy 233
FHE 234
Fiduciary Duty 234
Filing System 235
Financial Privacy 235
FIPPS 236
Firewall 236
Firmware 237
Fishing Attack 238
Five Safes 238
Flexible Output 238
Formal Anonymisation 239
Formal Privacy 239
Format Preserving Encryption (FPE) 240
Foundation Model 240
FPE 240
Freedom of Expression 241
Freedom of Information 241
Freely Given Consent 242
Frequency Data 242
FTC 243
Fully Automated Remote Analysis System (FARAS) 243
Fully Homomorphic Encryption (FHE) 243
Functional Anonymisation 244
Functional Unique Identifier 245
Function Creep 246
Fuzzing 246
G
Gait Recognition 247
Game Theory 247
Gatekeeper 248
GDPR (General Data Protection Regulation) 248
Gendered Spaces 250
General Data Protection Regulation 250
Generative AI 250
Genetic Data 251
Genetic Fingerprint 251
Genetic Privacy 252
Genomic Data 253
Geographical Resolution 253
Geoprivacy 254
Geo-Social Data 254
Geotagging 255
Globally Unique Identifier (GUID) 255
Global Privacy Control (GPC) 256
Global Recoding 256
Global Suppression 257
Gossip 257
GPC 257
Graduated Security 258
Grey Hat Attack 258
Group Harms 258
Group Privacy 259
GUID 260
H
Hacking 261
Harassment 261
Harm 262
Hashing 263
Header Information 263
Health Information Exchange (HIE) 264
Health Insurance Portability and Accountability Act (HIPAA) 265
Hellinger Distance 265
Hidden Service 266
HIE 266
Hierarchical Data 266
HIPAA 266
History of Privacy 266
Homomorphic Encryption 268
Honeypot 268
HRIA 269
HTTP 269
HTTPS 269
Human-Centred Cybersecurity 269
Human Rights Impact Assessment (HRIA) 270
Hypertext Transfer Protocol (HTTP) 270
Hypertext Transfer Protocol Secure (HTTPS) 271
I
I2P 272
ID Card 272
Idem-Identity 272
Identifiability 273
Identifiable Data 273
Identifiable Individual 273
Identifiable Natural Person 273
Identification Card 274
Identification File 275
Identified Data 276
Identified Natural Person 276
Identifier 277
Identity 277
Identity Assurance 279
Identity Cloning 280
Identity Disclosure 280
Identity Documents 281
Identity Management 281
Identity Provider 282
Identity Theft 283
Ideological Privacy 283
IDS 284
Impact Management 284
Impersonation 284
Implicit Consent 284
Imputation 285
Inadvertent Disclosure 285
Incognito Mode 286
Incremental Authorisation 286
Indirect Identifier 286
Inference 287
Inference Attack 288
Inferential Disclosure 288
Inferred Data 289
Inforgs 289
Information 289
Informational Privacy 289
Informational Self-Determination 291
Information Broker 291
Information Classification Table 291
Information Ethics 292
Information Governance 292
Information Lifecycle Management 293
Information Loss 293
Information Ownership 293
Information Security 294
Informed Consent 294
Infosphere 295
Inherence 296
Input Privacy 296
Input Statistical Discloure Control 297
Integrity 297
Intellectual Privacy 298
Intellectual Property (IP) 298
Intentional Data 300
Intention–Behaviour Gap 300
Interference 300
Internal Security Testing 301
International Transfer 301
Internet 301
Internet of Humans 302
Internet of People 302
Internet of Things 302
Internet Protocol (IP) 303
Interoperability 304
Interval Publication 305
Intimacy 305
Intranet 306
Intruder 306
Intruder Testing 307
Intrusion 307
Intrusion Detection System (IDS) 308
Intrusion Prevention System (IPS) 308
Intrusion upon Seclusion 309
Invasive BCI 309
Inversion Attack 310
Inviolate Personality 310
Invisible Computing 311
Invisible Internet Project 311
IP 311
IP Address 312
IPS 312
IPSE-Identity 312
Iris Scanning 312
Irreversibility 313
ISO27001 313
ISO27002 314
Isolation 314
J Jensen–Shannon Divergence 316
Jigsaw Identification 316
Joint Data Controller 316
Jurisdiction 317
Just-In-Time Consent 317
Just-In-Time Notice 318
K
K-Anonymity 319
Key Disclosure 319
Key Logger 319
Key Logging 319
Key Variable 320
Knowledge Economy 320
Kompromat 320
L
Laplace Noise 322
Large Language Model 322
Lawful Basis 322
Lawfulness 323
Layered Notice 324
Layered Security Model 324
LBS 325
L-Diversity 325
Lead Supervisory Authority 325
Least Privilege 326
Legal Basis for Processing 326
Legitimate Interest 326
Libel 327
Licence Agreement 327
Lifecasting 328
Lifelogging 328
Lifestreaming 329
Linkability 329
Linkable Information 330
Linkage 330
Linkage Attack 330
Link Encryption 331
Local Shared Object (LSO) 331
Local Suppression 331
Locational Privacy 332
Location-Based Service (LBS) 333
Location Data 333
Location Tracking 334
Logic Bomb 334
Longitudinal Data 335
Loyalty Card 335
LSO 336
M
MAC 337
Machine Learning (ML) 337
Magnitude Data 339
Main Establishment 339
Male Gaze, The 339
Malicious Proxy Server 340
Malware 340
Management Information System 340
Mandatory Access Control (MAC) 341
Mandatory Decryption 341
Mandatory Key Disclosure 342
Man-in-the-Middle Attack 342
Manual Key Transport 343
Mash Attack 343
Mask 343
Masking 344
Masquerade 344
Matching 344
Material Scope 345
Material Transfer Agreement 345
Maximum Knowledge Intruder 346
Media Access Control (MAC) Address 346
Medical Record 347
Membership Inference Attack 347
Mental Capacity 347
Mental Privacy 348
Mesh Network 349
Message Digest 349
Metadata 350
Metadata-Level Controls 350
Metaverse 351
MFA 351
Microaggregation 351
Microdata 352
Minimal Unique 352
Missing Data 353
Mission Creep 353
Misuse of Private Information 353
ML 354
Mobility Traces 354
Model Inversion Attack 355
Molka 355
Monetary Equivalent Burden (of Privacy) 355
Mosaic Identification 356
Motivated Intruder 356
Motivated Intruder Test 356
M-Probability 356
Multi-Factor Authentication (MFA) 357
Multimodal De-Identification 357
Multiple Imputation 357
Multi-Vector Attacks 358
Mutual Assistance 358
Mutual Authentication 358
N
National Security 360
Natural Person 360
Necessity 361
Need to Know 361
Negative Externalities of Disclosed Data 362
Negative Externalities of Privacy 362
Negligence 363
Network 364
Network Encryption 364
Network Layer Attack 364
Network Security 365
Network Segmentation 365
Neural Prosthesis 366
Neurocapitalism 366
Neurodata 367
Neuroethics 367
Neuroprivacy 368
Neuroprosthetics 368
Neurotechnology 368
(N,K) Rule 369
Noise Addition 369
Nom de Guerre 369
Nom de Plume 369
Nominal Data 370
Non-Disclosure Agreements 370
Non-Discrimination Law 370
Non-Invasive BCI 371
Notice and Consent 371
Nudge Theory 372
Nudging 372
O
Obfuscation 373
Objective Harm 373
Oblivious Transfer (OT) 373
Obscurity 374
Obtrusion 375
OECD Guidelines (On Privacy) 375
Offline Dictionary Attack 376
One-Stop-Shop 377
One-Way Hash Function 377
Onion Routing 378
Online Vetting 378
Ontological Security 378
Onward Transfer 379
OPE 380
Open Access 380
Open Data 381
Open Source 382
Opt-In 383
Opt-Out 383
Order-Preserving Encryption 384
Ordinal Data 385
Orwell Attack 385
OT 385
Other 386
Outing 386
Outlier 386
Output Checking 387
Output Privacy 387
Output Statistical Disclosure Control 388
Overimputation 389
P
P3P 390
Packet Filter 390
Packet Sniffing 390
Panel Data 391
Panopticon 391
Paparazzi 392
Paparazzi Attack 392
Parental Controls 393
Partially Homomorphic Encryption 393
Participant Information Sheets 393
Participatory Surveillance 394
Passive Collection 394
Password 395
Password Manager 395
Patch 395
Patch Management 396
PDS 396
Peeping Tom 396
Penetralia 396
Penetration Test 397
Persistent Cookie 397
Persistent Pseudonym 397
Person 398
Personal Data 398
Personal Data Cloud 399
Personal Data Store (PDS) 399
Personal Identification Number (PIN) 400
Personal Information 400
Personal Information Management System (PIMS) 401
Personalisation 402
Personalisation Reactance 403
Personalised Medicine 403
Personalised Services 404
Personally Identifiable Information (PII) 404
Personal Space 405
Personhood 405
Perturbation 406
Pervasive Computing 406
PET 406
Pharming 407
PHE 407
Philosophy of Information 407
Phishing 409
Phone Hacking 409
Physical Privacy 409
PIA 410
PII 410
PIMS 410
PIN 410
Pixelisation 410
Plaintext 411
Platform for Privacy Preferences (P3P) 411
Poisoning Attack 412
Population 412
Population Unique 412
Population Unit 413
Port Scan 413
Positive Externalities of Disclosed Data 414
Post Quantum Cryptography (PQC) 414
Post Randomisation (PRAM) 415
PPDA 415
PPDM 415
PPML 415
P/Q Rule 415
PRAM 416
Predictive Analytics 416
Predictive Modelling 417
Presence Detection 417
Price Discrimination 417
Primary Data 418
Prior Posterior Ambiguity Rule 418
Privacy 418
Privacy as Control 419
Privacy as Redistribution of Costs 420
Privacy Avatar 421
Privacy, Benefits of 421
Privacy Budget 422
Privacy-by-Design 422
Privacy Calculus 423
Privacy Concern 423
Privacy, Cultural Variation of 424
Privacy Elasticity 424
Privacy Engineering 424
Privacy-Enhancing Technology (PET) 425
Privacy First 425
Privacy Fundamentalists 426
Privacy Guarantee 426
Privacy Impact Assessment 427
Privacy Insurance 427
Privacy-Invasive Technology 427
Privacy Metric 428
Privacy Model 428
Privacy Notice 429
Privacy Officer 429
Privacy Paradox 430
Privacy Policy 431
Privacy Pragmatists 431
Privacy Preference 432
Privacy Premium 432
Privacy-Preserving Data Analytics (PPDA) 432
Privacy-Preserving Data Mining (PPDM) 433
Privacy-Preserving Data Publishing 433
Privacy-Preserving Machine Learning (PPML) 433
Privacy-Preserving Record Linkage (PPRL) 434
Privacy Risk 434
Privacy Screen 435
Privacy Seal 435
Privacy Settings 436
Privacy Threat 436
Privacy Tort 437
Privacy Trade-Off 438
Privacy Unconcerned 438
Privacy, Value of 439
Private Army 439
Private Biometrics 439
Private Browsing Mode 440
Private Enterprise 440
Private Key 440
Private Life 440
Private Parts 441
Private Property 442
Private School 442
Private Sector 443
Private Sphere 443
Probabilistic Record Linkage 444
Processing 445
Profile 445
Profiling 445
Prolepticon 446
Proportionate Security 446
Proportionality 447
Proprietary Privacy 447
Protected Characteristics 448
Protocol 448
Provable Security 449
Proxemics 450
Proxy 450
P% Rule 450
Pseudonym 450
Pseudonymisation 451
Pseudonym Reversal 453
Psychographic Advertising 453
Psychological Privacy 453
Public 454
Publication 455
Public Disclosure of Private Facts 455
Public Domain 456
Public Figure 456
Public Interest 457
Publicity 458
Public Key 459
Public-Key Cryptography 459
Public-Key Infrastructure (PKI) 460
Public Records 460
Public Sphere 461
Publishing 462
Purchase History 462
Purple Team 462
Purpose Limitation 463
Purpose Specification 464
Q
Quantitative Privacy 465
Quantum Computing 465
Quasi-Identifier 466
Query Logging 466
Query Overlap 467
Quishing 467
R
Radical Transparency 468
Radio Frequency Identification (RFID) 468
Randomised Response 469
Random Rounding 469
Random Unique 469
Ransomware 470
Rational Consumer 470
Reality Mining 471
Reasonable Expectation of Privacy 471
Reasonable Search 473
Recognition 473
Recommendation System 473
Recommender System 474
Reconstruction Attack 474
Record 474
Record Linkage 475
Records Management 476
Record Suppression 476
Rectification 476
Redaction 476
Red Team 477
Reference Monitor 477
Regulation 477
Regulators 478
Reidentification 478
Reidentification Attack 480
Relational Autonomy 480
Release and Forget 481
Reliability 481
Reliance 481
Reliance Authentication 481
Remailing 482
Remediation 482
Remedies 482
Remote Access 483
Remote Access Server 483
Remote Analysis Server 483
Remote Query 484
Replay Attack 484
Repurposing 485
Reputation 485
Reputation Management 485
Reserve 486
Resilience 486
Respondent 486
Response Knowledge 487
Response Variable 487
Responsible Disclosure 487
Restricted Access 488
Retention 488
Revenge Porn 488
Reverse Fishing Attack 489
Reversibility 489
Revocation 489
Right of Access 490
Right to an Explanation 490
Right to Be Forgotten 491
Right to Be Informed 492
Right to Be Let Alone 493
Right to Correct 494
Right to Data Portability 494
Right to Data Protection 494
Right to Deletion 495
Right to Object 495
Right to Privacy 496
Right to Rectification 496
Right to Restriction 496
Risk 497
Risk Assessment 498
Risk Management 498
Risk Tolerance 498
Risk–Utility Trade-Off 499
Roe v Wade 500
Role-Based Access Control 500
Rounding 500
RSA Encryption 501
R-U Map 501
Rumour 501
S
Safe Data 502
Safe Harbor 502
Safe Output 503
Safe People 503
Safe Projects 503
Safe Settings 503
Safety 504
Salt 504
SAML 505
Sample Unique 505
Sample Unit 505
Sampling 505
Sampling Fraction 505
Sandbox 506
Sandboxing 506
Scenario Analysis 506
Schrems 507
Scraping 507
Scrutiny 507
SDC 508
SDL 508
SDLC 508
Search 508
Search Engine 510
Seclusion 510
Secondary Data 510
Secondary Differentiation 511
Secondary Use 511
Secrecy 511
Secret 512
Secret Ballot 512
Secret Sharing 513
Secure Communication 514
Secure Messaging 514
Secure Multi-Party Computation 514
Secure Sockets Layer (SSL) 515
Secure Web Gateway (SWG) 515
Secure Web Platform 516
Security 516
Security Assertion Markup Language (SAML) 517
Security Audit 518
Security-By-Design 518
Security-By-Obscurity 518
Security Information Management (SIM) 519
Security Parameter 519
Security Posture 520
Security Requirement 520
Security Token 520
Self-Archiving 521
Self-Control Security 521
Self-Disclosure 521
Self-Reflection 522
Self-Sovereign Identity (SSI) 522
Self, The 523
Semantic Security 524
Semi-Invasive BCI 524
Sensitive Data 524
Sensitive Variable 524
Sensitivity 525
Sensor 525
Serial Number 526
Service User Agreement 526
Sessional Cookie 526
Shoulder Surfing 526
SIM 527
Single Out 527
Single Sign-On 528
Singularity, The 528
Slander 529
Smart City 529
Smart Device 530
Smart Grid 530
Smart Implants 531
Smart Meter 531
Smishing 531
SNARK 532
Social Credit System 532
Social Engineering 532
Social Genome 533
Social Linked Data (SOLID) 533
Social Network 534
Social Network Analysis 536
Social Profiling 536
Social Steganography 536
Sock Puppet 536
Software 536
Software Development Lifecycle (SDLC) 537
SOLID 537
Solitude 537
Sousveillance 538
Spam 538
Spam Filter 539
Spatial Cloaking 539
Spatial Privacy 539
Spear Phishing 540
Special Category Data 540
Special Unique 540
Speech Recognition 541
Split Tunnelling 541
Spontaneous Recognition 542
Spoofing Attack 542
Spyware 543
SQL 543
SQL Injection 543
SSI 544
SSL 544
Stakeholder 544
Stalking 545
Standard 545
Standard Contractual Clauses 546
Standard Model Clauses 547
Static Key 547
Statistical Disclosure 547
Statistical Disclosure Control (SDC) 548
Statistical Disclosure Limitation (SDL) 549
Steganography 549
Storage Limitation 549
Streisand Effect 550
Structural Zero 550
Structured Query Language (SQL) 551
Subject Access Request 551
Subjective Harm 551
Subliminal Advertising 552
Subtraction Attack 552
Succinct Non-Interactive Zero-Knowledge Proof (SNARK) 553
Super Cookie 553
Supervisory Authority 554
Suppression 554
Surname Attack 555
Surveillance 555
Surveillance Capitalism 556
Swapping Key 557
SWG 558
Symmetric Cryptography 558
Symmetric Key Encryption 558
Synthetic Data 558
T Table Redesign 559
Tabular Data 559
Tagging 559
Target Dataset 560
Targeted Advertising 560
Target Variable 560
TCB 560
T-Closeness 560
TCP 561
Technical And Organisational Measures 561
TEE 561
Telephone Tapping 561
Terms of Service 561
Territorial Privacy 562
Territorial Scope 562
Text Anonymisation 563
TFA 563
The Onion Router 564
Therapeutic Alliance 564
Thermal Imaging 564
Third Party 565
Third Party Doctrine 566
Thought Police 566
Threat Modelling 566
Threshold Rule 567
Time Bomb 567
Time Series 568
TIPS (Trust, Identity, Privacy, Security) 568
TLS 569
Tokenisation 569
Topcoding 569
TOR (The Onion Router) 569
Tracing 570
Tracker 570
Tracker Blocker 571
Tracking 571
Traffic Data 571
Transmission Control Protocol (TCP) 572
Transparency 572
Transparency Notice 573
Trapdoor 574
Trespass 574
Trojan Horse 574
Trust 575
Trusted Computing Base (TCB) 576
Trusted Execution Environment (TEE) 576
Trusted Research Environment 577
Trusted Third Party 577
Trustworthy Digital Identity 578
Tunnel Encryption 578
Two Factor Authentication (TFA) 578
U
Ubicomp 579
Ubiquitous Computing (UBICOMP) 579
UK GDPR 579
Unambiguous Consent 580
Unicity 580
Uniform Resource Identifier (URI) 580
Unique Identifier 581
Uniqueness 581
Unreasonable Search 581
Untraceability 582
U-Probability 583
URI 583
User 583
User-Centred Design 584
User Modelling 584
Username 585
US Privacy Laws 585
Utility First 586
V Value–Action Gap 587
Value of Data 587
Value of Privacy 588
Value Sensitive Design (VSD) 589
Veil 589
Verifiable Secret Sharing (VSS) 590
Vicarious Liability 590
Virality 591
Virtual Machine (VM) 592
Virtual Private Network (VPN) 592
Virus 593
Vishing 593
Vital Interests 593
VM 594
Voice over Internet Protocol (VoIP) 594
VoIP 595
Voyeurism 595
VPN 595
VSD 595
VSS 595
Vulnerability 595
Vulnerability Management 596
Vulnerable Population 597
W Wearable Computing 598
Wearable Tech 599
Web 2.0 599
Web 3.0 599
Web Beacon 600
Web Bug 601
Web of Trust 601
Web Profiling 602
Web Skimming Attack 602
Whistleblowing 602
White Box Testing 603
White Hat Attack 604
Wiretapping 604
World Wide Web (WWW) 604
Worm 606
WWW 606
X
XAI 607
XSS 607
X Variable 607
Y
Y Chromosome 608
Y Variable 608
Z
Zero Day Attack 609
Zero Knowledge 609
Zero Knowledge Proof 610
Zero Trust Security 610
eBook for individuals
978 1 03530 092 1
From £48.00
Click here for options
eBook options

Available for individuals to buy from these websites

Or recommend to your institution to acquire on Elgaronline
  • Buy as part of an eBook subject collection - flexible options available
  • Downloading and printing allowed
  • No limits on concurrent user access, ideal for course use
My Cart