Stephen B Wicker
Cellular Convergence and the Death of Privacy
Stephen B Wicker
Cellular Convergence and the Death of Privacy
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Cellular Convergence and the Death of Privacy explores the recent technological developments in the communication industry and the growing trend for all forms of communication to converge into the cellular handset. Stephen Wicker addresses the impact of cellular convergence on privacy from technical, legal, and social perspectives.
Andere Kunden interessierten sich auch für
- Kinfe YilmaPrivacy and the Role of International Law in the Digital Age189,99 €
- Nóra Ni LoideainEU Data Privacy Law and Serious Crime116,99 €
- Joshua BurgessThe Medical and Legal Relations of Madness37,99 €
- Hugo Adam Bedau (ed.)The Death Penalty in America44,99 €
- Damian CliffordData Protection Law and Emotion131,99 €
- David L SlossDeath of Treaty Supremacy187,99 €
- Fernando Dos SantosInnovation in Africa131,99 €
-
-
-
Cellular Convergence and the Death of Privacy explores the recent technological developments in the communication industry and the growing trend for all forms of communication to converge into the cellular handset. Stephen Wicker addresses the impact of cellular convergence on privacy from technical, legal, and social perspectives.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Oxford University Press
- Seitenzahl: 200
- Erscheinungstermin: 19. September 2013
- Englisch
- Abmessung: 234mm x 157mm x 23mm
- Gewicht: 454g
- ISBN-13: 9780199915354
- ISBN-10: 0199915350
- Artikelnr.: 39339029
- Verlag: Oxford University Press
- Seitenzahl: 200
- Erscheinungstermin: 19. September 2013
- Englisch
- Abmessung: 234mm x 157mm x 23mm
- Gewicht: 454g
- ISBN-13: 9780199915354
- ISBN-10: 0199915350
- Artikelnr.: 39339029
Stephen B. Wicker is a Professor of Electrical and Computer Engineering at Cornell University, and a member of the graduate fields of Information Science and Computer Science. He teaches and conducts research in wireless and wired information networks, privacy-aware design, computer security, and digital telephony. His research focuses on the interface between information networking technology, law, and sociology, with a particular emphasis on how design choices and regulation can affect the privacy and speech rights of users. He is the author of six books, holds a number of patents, and has received four Cornell teaching awards. He is the Cornell Principal Investigator for the National Science Foundation TRUST Science and Technology Center, a research center dedicated to cybersecurity, electronic privacy, and the protection of critical infrastructure. He is a Fellow of the IEEE.
PREFACE
PART I CELLULAR CONVERGENCE
CHAPTER ONE: CELLULAR CONVERGENCE
The Evolution of a Cellular World
Politics and the Cellular Platform
Surveillance and Control
PART II CELLULAR SURVEILLANCE
CHAPTER TWO: CELLULAR SURVEILLANCE
The Origins of Wiretapping
Built-In Location Surveillance
Taking It to the Next Level
The Carrier IQ Debacle
CHAPTER THREE: CELLULAR SURVEILLANCE AND THE LAW
The Fourth Amendment
Search and Seizure of Electrical Communication
Protecting (or Not) the Context of Communication
The ECPA and Cellular Privacy
CALEA and the USA PATRIOT ACT
Concluding Thoughts
CHAPTER FOUR: PRIVACY AND THE IMPACT OF SURVEILLANCE
Defining Privacy
When Privacy is Invaded
Bentham, Foucault, and the Panoptic Effect
When You Don't Know You Are Being Watched
Location-Based Advertising - The Ultimate Invasion?
Location-Based Advertising and the Philosophy of Place
Concluding Thoughts
PART III CELLULAR CONTROL
CHAPTER FIVE: THE ROLE OF THE FCC
The Early Years of Wireless and the Politics of Spectrum
The FCC Creates Roadblocks for Early Mobile Systems
The FCC and the Future of Cellular Convergence
CHAPTER SIX: THE ARCHITECTURE OF CENTRALIZED CONTROL
A Centralized Architecture
End-to-End Architectures
Architecture and Innovation
Architecture and Censorship
Concluding Thoughts
PART IV CELLULAR SOLUTIONS: OPTIONS FOR PRIVACY PROTECTION
CHAPTER SEVEN: Working within the Current System - Cryptology and Private Communication
Cryptology: The Art of Secret Communication
Early Crypto
The Politics of Cryptography
Public Key Cryptography and Digital Signatures
A Private Overlay for Cellular Handsets
Privacy-Aware Location-Based Services
Concluding Thoughts
CHAPTER EIGHT: THROW THE OLD SYSTEM OUT - BRING IN A CELLULAR COMMONS
Unlicensed Spectrum - A Radio Commons
WiFi Telephony Shows the Way
End-to-End Cellular and Open Source Development
Privacy-Aware Mobility Management
Concluding Thoughts
CHAPTER NINE: A RIGHT TO SURVEILLANCE-FREE CELLULAR ACCESS?
Cellular Access to the Internet
A Right to Access the Internet?
Rights, Freedom of Expression, and the Internet
Beyond Enablement
Consequences of Rights Status
A Right to be Free of Government Surveillance?
A Right to be Free of Corporate Surveillance?
A Closing Thought
TABLE OF CASES
INDEX
PART I CELLULAR CONVERGENCE
CHAPTER ONE: CELLULAR CONVERGENCE
The Evolution of a Cellular World
Politics and the Cellular Platform
Surveillance and Control
PART II CELLULAR SURVEILLANCE
CHAPTER TWO: CELLULAR SURVEILLANCE
The Origins of Wiretapping
Built-In Location Surveillance
Taking It to the Next Level
The Carrier IQ Debacle
CHAPTER THREE: CELLULAR SURVEILLANCE AND THE LAW
The Fourth Amendment
Search and Seizure of Electrical Communication
Protecting (or Not) the Context of Communication
The ECPA and Cellular Privacy
CALEA and the USA PATRIOT ACT
Concluding Thoughts
CHAPTER FOUR: PRIVACY AND THE IMPACT OF SURVEILLANCE
Defining Privacy
When Privacy is Invaded
Bentham, Foucault, and the Panoptic Effect
When You Don't Know You Are Being Watched
Location-Based Advertising - The Ultimate Invasion?
Location-Based Advertising and the Philosophy of Place
Concluding Thoughts
PART III CELLULAR CONTROL
CHAPTER FIVE: THE ROLE OF THE FCC
The Early Years of Wireless and the Politics of Spectrum
The FCC Creates Roadblocks for Early Mobile Systems
The FCC and the Future of Cellular Convergence
CHAPTER SIX: THE ARCHITECTURE OF CENTRALIZED CONTROL
A Centralized Architecture
End-to-End Architectures
Architecture and Innovation
Architecture and Censorship
Concluding Thoughts
PART IV CELLULAR SOLUTIONS: OPTIONS FOR PRIVACY PROTECTION
CHAPTER SEVEN: Working within the Current System - Cryptology and Private Communication
Cryptology: The Art of Secret Communication
Early Crypto
The Politics of Cryptography
Public Key Cryptography and Digital Signatures
A Private Overlay for Cellular Handsets
Privacy-Aware Location-Based Services
Concluding Thoughts
CHAPTER EIGHT: THROW THE OLD SYSTEM OUT - BRING IN A CELLULAR COMMONS
Unlicensed Spectrum - A Radio Commons
WiFi Telephony Shows the Way
End-to-End Cellular and Open Source Development
Privacy-Aware Mobility Management
Concluding Thoughts
CHAPTER NINE: A RIGHT TO SURVEILLANCE-FREE CELLULAR ACCESS?
Cellular Access to the Internet
A Right to Access the Internet?
Rights, Freedom of Expression, and the Internet
Beyond Enablement
Consequences of Rights Status
A Right to be Free of Government Surveillance?
A Right to be Free of Corporate Surveillance?
A Closing Thought
TABLE OF CASES
INDEX
PREFACE
PART I CELLULAR CONVERGENCE
CHAPTER ONE: CELLULAR CONVERGENCE
The Evolution of a Cellular World
Politics and the Cellular Platform
Surveillance and Control
PART II CELLULAR SURVEILLANCE
CHAPTER TWO: CELLULAR SURVEILLANCE
The Origins of Wiretapping
Built-In Location Surveillance
Taking It to the Next Level
The Carrier IQ Debacle
CHAPTER THREE: CELLULAR SURVEILLANCE AND THE LAW
The Fourth Amendment
Search and Seizure of Electrical Communication
Protecting (or Not) the Context of Communication
The ECPA and Cellular Privacy
CALEA and the USA PATRIOT ACT
Concluding Thoughts
CHAPTER FOUR: PRIVACY AND THE IMPACT OF SURVEILLANCE
Defining Privacy
When Privacy is Invaded
Bentham, Foucault, and the Panoptic Effect
When You Don't Know You Are Being Watched
Location-Based Advertising - The Ultimate Invasion?
Location-Based Advertising and the Philosophy of Place
Concluding Thoughts
PART III CELLULAR CONTROL
CHAPTER FIVE: THE ROLE OF THE FCC
The Early Years of Wireless and the Politics of Spectrum
The FCC Creates Roadblocks for Early Mobile Systems
The FCC and the Future of Cellular Convergence
CHAPTER SIX: THE ARCHITECTURE OF CENTRALIZED CONTROL
A Centralized Architecture
End-to-End Architectures
Architecture and Innovation
Architecture and Censorship
Concluding Thoughts
PART IV CELLULAR SOLUTIONS: OPTIONS FOR PRIVACY PROTECTION
CHAPTER SEVEN: Working within the Current System - Cryptology and Private Communication
Cryptology: The Art of Secret Communication
Early Crypto
The Politics of Cryptography
Public Key Cryptography and Digital Signatures
A Private Overlay for Cellular Handsets
Privacy-Aware Location-Based Services
Concluding Thoughts
CHAPTER EIGHT: THROW THE OLD SYSTEM OUT - BRING IN A CELLULAR COMMONS
Unlicensed Spectrum - A Radio Commons
WiFi Telephony Shows the Way
End-to-End Cellular and Open Source Development
Privacy-Aware Mobility Management
Concluding Thoughts
CHAPTER NINE: A RIGHT TO SURVEILLANCE-FREE CELLULAR ACCESS?
Cellular Access to the Internet
A Right to Access the Internet?
Rights, Freedom of Expression, and the Internet
Beyond Enablement
Consequences of Rights Status
A Right to be Free of Government Surveillance?
A Right to be Free of Corporate Surveillance?
A Closing Thought
TABLE OF CASES
INDEX
PART I CELLULAR CONVERGENCE
CHAPTER ONE: CELLULAR CONVERGENCE
The Evolution of a Cellular World
Politics and the Cellular Platform
Surveillance and Control
PART II CELLULAR SURVEILLANCE
CHAPTER TWO: CELLULAR SURVEILLANCE
The Origins of Wiretapping
Built-In Location Surveillance
Taking It to the Next Level
The Carrier IQ Debacle
CHAPTER THREE: CELLULAR SURVEILLANCE AND THE LAW
The Fourth Amendment
Search and Seizure of Electrical Communication
Protecting (or Not) the Context of Communication
The ECPA and Cellular Privacy
CALEA and the USA PATRIOT ACT
Concluding Thoughts
CHAPTER FOUR: PRIVACY AND THE IMPACT OF SURVEILLANCE
Defining Privacy
When Privacy is Invaded
Bentham, Foucault, and the Panoptic Effect
When You Don't Know You Are Being Watched
Location-Based Advertising - The Ultimate Invasion?
Location-Based Advertising and the Philosophy of Place
Concluding Thoughts
PART III CELLULAR CONTROL
CHAPTER FIVE: THE ROLE OF THE FCC
The Early Years of Wireless and the Politics of Spectrum
The FCC Creates Roadblocks for Early Mobile Systems
The FCC and the Future of Cellular Convergence
CHAPTER SIX: THE ARCHITECTURE OF CENTRALIZED CONTROL
A Centralized Architecture
End-to-End Architectures
Architecture and Innovation
Architecture and Censorship
Concluding Thoughts
PART IV CELLULAR SOLUTIONS: OPTIONS FOR PRIVACY PROTECTION
CHAPTER SEVEN: Working within the Current System - Cryptology and Private Communication
Cryptology: The Art of Secret Communication
Early Crypto
The Politics of Cryptography
Public Key Cryptography and Digital Signatures
A Private Overlay for Cellular Handsets
Privacy-Aware Location-Based Services
Concluding Thoughts
CHAPTER EIGHT: THROW THE OLD SYSTEM OUT - BRING IN A CELLULAR COMMONS
Unlicensed Spectrum - A Radio Commons
WiFi Telephony Shows the Way
End-to-End Cellular and Open Source Development
Privacy-Aware Mobility Management
Concluding Thoughts
CHAPTER NINE: A RIGHT TO SURVEILLANCE-FREE CELLULAR ACCESS?
Cellular Access to the Internet
A Right to Access the Internet?
Rights, Freedom of Expression, and the Internet
Beyond Enablement
Consequences of Rights Status
A Right to be Free of Government Surveillance?
A Right to be Free of Corporate Surveillance?
A Closing Thought
TABLE OF CASES
INDEX