|
CPDP 2016 The great data race - How commercial utilization of personal data challenges privacy |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
CPDP 2016 The great data race - How commercial utilization of personal data challenges privacy Par SecurityTube.NetLe [2016-03-16] à 05:53:08
Présentation : The great data race - How commercial utilization of personal data challenges privacy Organized by the Norwegian Data Protection Authority Chair Frederik Zuiderveen Borgesius, IViR-UvA NL Moderator Rob Van Eijk, Dutch Data Protection Authority NL Panel Townsend Feehan, IAB Europe EU , Monique Goyens, European Consumer Organisation BE , Marie Charlotte Roques Bonnet, Microsoft FR , Bjørn Erik Thon, Norwegian Data Protection Authority NO A data race is currently taking place in the media and advertising industry. New technology and the ability to gather and analyse large volumes of data are changing the ways in which advertisers reach consumers. Computers and algorithms have taken over the sale of advertising space. This results in highly targeted marketing, which presupposes that the marketers have a thorough understanding of our habits, interests, tastes and network of contacts, in order to have the greatest impact. This raises a number of challenges. In this panel, industry and consumer representatives will meet to discuss what measures can be taken to strengthen user control and transparency in the market. In particular, the panel will address the following questions - Is the lack of transparency in the digital advertising market problematic - Is it possible to find a balance between industries need for knowledge and consumers right not to be tracked - Is it acceptable for publishers and other content providers to offer take it or leave it -solutions - To what extent can the new GDPR contribute to more transparency and better consumer control For More Information Please Visit - http www.cpdpconferences.org
Les mots clés de la revue de presse pour cet article : privacy Les videos sur SecuObs pour les mots clés : privacy Les éléments de la revue Twitter pour les mots clé : privacy
Les derniers articles du site "SecurityTube.Net" :
- TROOPERSCON - Crypto code the 9 circles of testing - TROOPERSCON - Towards a LangSec Aware SDLC - TROOPERSCON - Deep dive into SAP archive file formats - TROOPERSCON - Thanks SAP for the vulnerabilities. Exploiting the unexploitable - TROOPERSCON - An easy way into your multi-million dollar SAP systems An unknown default SAP account - TROOPERSCON - One Tool To Rule Them All - TROOPERSCON - Mind The Gap - Exploit Free Whitelisting Evasion Tactics - TROOPERSCON - The Chimaera Processor - TROOPERSCON - Lets Play Hide and Seek in the Cloud - TROOPERSCON - Planes, Trains and Automobiles The Internet of Deadly Things
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|