Author: Helen Nissenbaum
Publisher: Stanford University Press
ISBN: 0804772894
Category : Law
Languages : en
Pages : 304
Book Description
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.
Privacy in Context
Author: Helen Nissenbaum
Publisher: Stanford University Press
ISBN: 0804772894
Category : Law
Languages : en
Pages : 304
Book Description
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.
Publisher: Stanford University Press
ISBN: 0804772894
Category : Law
Languages : en
Pages : 304
Book Description
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.
Privacy and the Press
Author: Joshua Rozenberg
Publisher: Oxford University Press, USA
ISBN: 9780199250561
Category : Language Arts & Disciplines
Languages : en
Pages : 304
Book Description
Do we need a law of privacy? Should judges be allowed to stop us reading about a footballer's adultery or enjoying pictures of a film star's wedding? This book explores how the law balances the right to privacy with the freedom of the press.
Publisher: Oxford University Press, USA
ISBN: 9780199250561
Category : Language Arts & Disciplines
Languages : en
Pages : 304
Book Description
Do we need a law of privacy? Should judges be allowed to stop us reading about a footballer's adultery or enjoying pictures of a film star's wedding? This book explores how the law balances the right to privacy with the freedom of the press.
Technology and Privacy
Author: Philip Agre
Publisher: MIT Press
ISBN: 9780262511018
Category : Computers
Languages : en
Pages : 342
Book Description
Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging. Significant changes include large increases in communications bandwidths; the widespread adoption of computer networking and public-key cryptography; new digital media that support a wide range of social relationships; a massive body of practical experience in the development and application of data-protection laws; and the rapid globalization of manufacturing, culture, and policy making. The essays in this book provide a new conceptual framework for the analysis and debate of privacy policy and for the design and development of information systems.
Publisher: MIT Press
ISBN: 9780262511018
Category : Computers
Languages : en
Pages : 342
Book Description
Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging. Significant changes include large increases in communications bandwidths; the widespread adoption of computer networking and public-key cryptography; new digital media that support a wide range of social relationships; a massive body of practical experience in the development and application of data-protection laws; and the rapid globalization of manufacturing, culture, and policy making. The essays in this book provide a new conceptual framework for the analysis and debate of privacy policy and for the design and development of information systems.
Comparative Defamation and Privacy Law
Author: Andrew T. Kenyon
Publisher: Cambridge University Press
ISBN: 110712364X
Category : Law
Languages : en
Pages : 399
Book Description
Leading experts from common law jurisdictions examine defamation and privacy, two major and interrelated issues for law and media.
Publisher: Cambridge University Press
ISBN: 110712364X
Category : Law
Languages : en
Pages : 399
Book Description
Leading experts from common law jurisdictions examine defamation and privacy, two major and interrelated issues for law and media.
Privacy in the Modern Age
Author: Marc Rotenberg
Publisher: New Press, The
ISBN: 1620971089
Category : Law
Languages : en
Pages : 187
Book Description
The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don't simply describe these problems or warn about the loss of privacy—they propose solutions. They look closely at business practices, public policy, and technology design, and ask, “Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: “What one creates with his hand, he should control with his head.” It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there's a problem—let's find a solution.
Publisher: New Press, The
ISBN: 1620971089
Category : Law
Languages : en
Pages : 187
Book Description
The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don't simply describe these problems or warn about the loss of privacy—they propose solutions. They look closely at business practices, public policy, and technology design, and ask, “Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: “What one creates with his hand, he should control with his head.” It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there's a problem—let's find a solution.
Privacy Is Hard and Seven Other Myths
Author: Jaap-Henk Hoepman
Publisher: MIT Press
ISBN: 0262547201
Category : Computers
Languages : en
Pages : 275
Book Description
An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.
Publisher: MIT Press
ISBN: 0262547201
Category : Computers
Languages : en
Pages : 275
Book Description
An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.
Privacy at Risk
Author: Christopher Slobogin
Publisher: ReadHowYouWant.com
ISBN: 1459627067
Category : Computers
Languages : en
Pages : 606
Book Description
Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e - mail logs, and sometimes even o...
Publisher: ReadHowYouWant.com
ISBN: 1459627067
Category : Computers
Languages : en
Pages : 606
Book Description
Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e - mail logs, and sometimes even o...
Privacy and Publicity
Author: Beatriz Colomina
Publisher: MIT Press
ISBN: 0262531399
Category : Architecture
Languages : en
Pages : 403
Book Description
Through a series of close readings of two major figures of the modern movement, Adolf Loos and Le Corbusier, Beatriz Colomina argues that architecture only becomes modern in its engagement with the mass media, and that in so doing it radically displaces the traditional sense of space and subjectivity. Privacy and Publicity boldly questions certain ideological assumptions underlying the received view of modern architecture and reconsiders the methodology of architectural criticism itself. Where conventional criticism portrays modern architecture as a high artistic practice in opposition to mass culture, Colomina sees the emerging systems of communication that have come to define twentieth-century culture—the mass media—as the true site within which modern architecture was produced. She considers architectural discourse as the intersection of a number of systems of representation such as drawings, models, photographs, books, films, and advertisements. This does not mean abandoning the architectural object, the building, but rather looking at it in a different way. The building is understood here in the same way as all the media that frame it, as a mechanism of representation in its own right. With modernity, the site of architectural production literally moved from the street into photographs, films, publications, and exhibitions—a displacement that presupposes a new sense of space, one defined by images rather than walls. This age of publicity corresponds to a transformation in the status of the private, Colomina argues; modernity is actually the publicity of the private. Modern architecture renegotiates the traditional relationship between public and private in a way that profoundly alters the experience of space. In a fascinating intellectual journey, Colomina tracks this shift through the modern incarnations of the archive, the city, fashion, war, sexuality, advertising, the window, and the museum, finally concentrating on the domestic interior that constructs the modern subject it appears merely to house.
Publisher: MIT Press
ISBN: 0262531399
Category : Architecture
Languages : en
Pages : 403
Book Description
Through a series of close readings of two major figures of the modern movement, Adolf Loos and Le Corbusier, Beatriz Colomina argues that architecture only becomes modern in its engagement with the mass media, and that in so doing it radically displaces the traditional sense of space and subjectivity. Privacy and Publicity boldly questions certain ideological assumptions underlying the received view of modern architecture and reconsiders the methodology of architectural criticism itself. Where conventional criticism portrays modern architecture as a high artistic practice in opposition to mass culture, Colomina sees the emerging systems of communication that have come to define twentieth-century culture—the mass media—as the true site within which modern architecture was produced. She considers architectural discourse as the intersection of a number of systems of representation such as drawings, models, photographs, books, films, and advertisements. This does not mean abandoning the architectural object, the building, but rather looking at it in a different way. The building is understood here in the same way as all the media that frame it, as a mechanism of representation in its own right. With modernity, the site of architectural production literally moved from the street into photographs, films, publications, and exhibitions—a displacement that presupposes a new sense of space, one defined by images rather than walls. This age of publicity corresponds to a transformation in the status of the private, Colomina argues; modernity is actually the publicity of the private. Modern architecture renegotiates the traditional relationship between public and private in a way that profoundly alters the experience of space. In a fascinating intellectual journey, Colomina tracks this shift through the modern incarnations of the archive, the city, fashion, war, sexuality, advertising, the window, and the museum, finally concentrating on the domestic interior that constructs the modern subject it appears merely to house.
Privacy on the Ground
Author: Kenneth A. Bamberger
Publisher: MIT Press
ISBN: 0262552426
Category : Law
Languages : en
Pages : 353
Book Description
An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations. Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on the ground” in changing corporate (or government) behavior—until now. This intensive five-nation study goes inside corporations to examine how the people charged with protecting privacy actually do their work, and what kinds of regulation effectively shape their behavior. And the research yields a surprising result. The countries with more ambiguous regulation—Germany and the United States—had the strongest corporate privacy management practices, despite very different cultural and legal environments. The more rule-bound countries—like France and Spain—trended instead toward compliance processes, not embedded privacy practices. At a crucial time, when Big Data and the Internet of Things are snowballing, Privacy on the Ground helpfully searches out the best practices by corporations, provides guidance to policymakers, and offers important lessons for everyone concerned with privacy, now and in the future.
Publisher: MIT Press
ISBN: 0262552426
Category : Law
Languages : en
Pages : 353
Book Description
An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations. Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on the ground” in changing corporate (or government) behavior—until now. This intensive five-nation study goes inside corporations to examine how the people charged with protecting privacy actually do their work, and what kinds of regulation effectively shape their behavior. And the research yields a surprising result. The countries with more ambiguous regulation—Germany and the United States—had the strongest corporate privacy management practices, despite very different cultural and legal environments. The more rule-bound countries—like France and Spain—trended instead toward compliance processes, not embedded privacy practices. At a crucial time, when Big Data and the Internet of Things are snowballing, Privacy on the Ground helpfully searches out the best practices by corporations, provides guidance to policymakers, and offers important lessons for everyone concerned with privacy, now and in the future.
The Privacy Advocates
Author: Colin J. Bennett
Publisher: MIT Press
ISBN: 0262260425
Category : Political Science
Languages : en
Pages : 285
Book Description
An analysis of the people and groups who have emerged to challenge the increasingly intrusive ways personal information is captured, processed, and disseminated. Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society—without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement.
Publisher: MIT Press
ISBN: 0262260425
Category : Political Science
Languages : en
Pages : 285
Book Description
An analysis of the people and groups who have emerged to challenge the increasingly intrusive ways personal information is captured, processed, and disseminated. Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society—without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement.