El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy.
Das User Interface, auf dem Benutzeraktionen und -eingaben, beispielsweise zur Authentifizierung auf einer Webseite, getätigt werden, ist ein beliebtes Ziel für Cyberkriminelle, um Zugangsdaten zu erlangen.
En este documento exploramos cuál ha sido la respuesta de la ley y la jurisprudencia colombianas frente a las tensiones entre la intimidad y la publicidad de los datos.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
On 5 June 2013, the Guardian began publishing a series of documents leaked by NSA contractor Edward Snowden, revealing the extent of internet surveillance undertaken by government and intelligence agencies.
In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation.