Ian Kerr, Carole Lucock, Valerie Steeves
Lessons from the Identity Trail
Anonymity, Privacy and Identity in a Networked Society
Ian Kerr, Carole Lucock, Valerie Steeves
Lessons from the Identity Trail
Anonymity, Privacy and Identity in a Networked Society
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This contributed volume is the first multidisciplinary analysis about the problems and potential for anonymity and privacy in a networked society. The book examines key questions about identity in a global environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks.
Andere Kunden interessierten sich auch für
- D. BakerPolice, Picket-Lines and Fatalities: Lessons from the Past75,99 €
- W. NylenParticipatory Democracy versus Elitist Democracy: Lessons from Brazil37,99 €
- Tweets from the Campaign Trail76,00 €
- W. NylenParticipatory Democracy Versus Elitist Democracy: Lessons from Brazil60,99 €
- William EllisProgressive Lessons in Social Science31,99 €
- Charles KellyOutlaw Trail22,99 €
- Honors Communication100,65 €
-
-
-
This contributed volume is the first multidisciplinary analysis about the problems and potential for anonymity and privacy in a networked society. The book examines key questions about identity in a global environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks.
Produktdetails
- Produktdetails
- Verlag: Oxford University Press, USA
- Seitenzahl: 592
- Erscheinungstermin: 18. März 2009
- Englisch
- Abmessung: 236mm x 155mm x 37mm
- Gewicht: 953g
- ISBN-13: 9780195372472
- ISBN-10: 0195372476
- Artikelnr.: 26366151
- Verlag: Oxford University Press, USA
- Seitenzahl: 592
- Erscheinungstermin: 18. März 2009
- Englisch
- Abmessung: 236mm x 155mm x 37mm
- Gewicht: 953g
- ISBN-13: 9780195372472
- ISBN-10: 0195372476
- Artikelnr.: 26366151
Ian Kerr holds a three-way appointment in the Faculty of Law, the Faculty of Medicine and the Department of Philosophy at the University of Ottawa. Dr. Kerr teaches in the areas of moral philosophy and applied ethics, internet and ecommerce law, contract law and legal theory. He has published extensively in journals on ethical and legal aspects of digital copyright, automated electronic commerce, artificial intelligence, cybercrime, nanotechnology, internet regulation, ISP and intermediary liability, and online defamation. He is also the co-author of Managing the Law (Prentice Hall).
* PART 1: PRIVACY
* Soft Surveillance, Hard Consent: The Law and Psychology of
Engineering Consent
* Approaches to Consent in Canadian Data Protection Law
* Learning from Data Protection Law at the Nexus of Copyright and
Privacy
* A Heuristics Approach to Understanding Privacy-Protecting Behaviors
in Digital Social Environments
* Ubiquitous Computing and Spatial Privacy
* Core Privacy: A Privacy for Predictive Data Mining
* Privacy Versus National Security: Clarifying the Trade-Off
* Privacy's Second Home: Building a New Home for Privacy under Section
15 of the Charter
* What Have You Done for Me Lately? Reflections on Redeeming Privacy
for Battered Women Genetic Technologies and Medicine: Privacy,
Identity and Informed Consent
* Reclaiming the Social Value of Privacy
*
*
* PART II: IDENTITY
* A Conceptual Analysis of Identity
* Identity: Difference and Categorization
* Identity Cards and Identity Romaticism
* What's in a Name? Who Benefits from the Publication Ban in Sexual
Assault Trials?
* Life in the Fish Bowl: Feminist Interrogations of Webcamming
* Ubiquitous Computing, Spatiality, and the Construction of Identity:
Directions for Policy Response
* Dignity and Selective Self-Presentation
* The Internet of People? Reflections on the Future Regulation of
Human-Implantable Radio Frequency Identification
* Usig Biometrics to Re-Visualize the Canada-US Border
* Soul Train: The New Surveillance in Popular Music
* Exit Node Repudiation for Anonymity Networks
* TrackMeNot: Resisting Surveillance in Web Search
*
*
* PART III: ANONYMITY
* Anonymity and the Law in the USA
* Anonymity and the Law in the United Kingdom
* Anonymity and the Law in Canada
* Anonymity and the Law in the Netherlands
* Anonymity and the Law in Italy
* Soft Surveillance, Hard Consent: The Law and Psychology of
Engineering Consent
* Approaches to Consent in Canadian Data Protection Law
* Learning from Data Protection Law at the Nexus of Copyright and
Privacy
* A Heuristics Approach to Understanding Privacy-Protecting Behaviors
in Digital Social Environments
* Ubiquitous Computing and Spatial Privacy
* Core Privacy: A Privacy for Predictive Data Mining
* Privacy Versus National Security: Clarifying the Trade-Off
* Privacy's Second Home: Building a New Home for Privacy under Section
15 of the Charter
* What Have You Done for Me Lately? Reflections on Redeeming Privacy
for Battered Women Genetic Technologies and Medicine: Privacy,
Identity and Informed Consent
* Reclaiming the Social Value of Privacy
*
*
* PART II: IDENTITY
* A Conceptual Analysis of Identity
* Identity: Difference and Categorization
* Identity Cards and Identity Romaticism
* What's in a Name? Who Benefits from the Publication Ban in Sexual
Assault Trials?
* Life in the Fish Bowl: Feminist Interrogations of Webcamming
* Ubiquitous Computing, Spatiality, and the Construction of Identity:
Directions for Policy Response
* Dignity and Selective Self-Presentation
* The Internet of People? Reflections on the Future Regulation of
Human-Implantable Radio Frequency Identification
* Usig Biometrics to Re-Visualize the Canada-US Border
* Soul Train: The New Surveillance in Popular Music
* Exit Node Repudiation for Anonymity Networks
* TrackMeNot: Resisting Surveillance in Web Search
*
*
* PART III: ANONYMITY
* Anonymity and the Law in the USA
* Anonymity and the Law in the United Kingdom
* Anonymity and the Law in Canada
* Anonymity and the Law in the Netherlands
* Anonymity and the Law in Italy
* PART 1: PRIVACY
* Soft Surveillance, Hard Consent: The Law and Psychology of
Engineering Consent
* Approaches to Consent in Canadian Data Protection Law
* Learning from Data Protection Law at the Nexus of Copyright and
Privacy
* A Heuristics Approach to Understanding Privacy-Protecting Behaviors
in Digital Social Environments
* Ubiquitous Computing and Spatial Privacy
* Core Privacy: A Privacy for Predictive Data Mining
* Privacy Versus National Security: Clarifying the Trade-Off
* Privacy's Second Home: Building a New Home for Privacy under Section
15 of the Charter
* What Have You Done for Me Lately? Reflections on Redeeming Privacy
for Battered Women Genetic Technologies and Medicine: Privacy,
Identity and Informed Consent
* Reclaiming the Social Value of Privacy
*
*
* PART II: IDENTITY
* A Conceptual Analysis of Identity
* Identity: Difference and Categorization
* Identity Cards and Identity Romaticism
* What's in a Name? Who Benefits from the Publication Ban in Sexual
Assault Trials?
* Life in the Fish Bowl: Feminist Interrogations of Webcamming
* Ubiquitous Computing, Spatiality, and the Construction of Identity:
Directions for Policy Response
* Dignity and Selective Self-Presentation
* The Internet of People? Reflections on the Future Regulation of
Human-Implantable Radio Frequency Identification
* Usig Biometrics to Re-Visualize the Canada-US Border
* Soul Train: The New Surveillance in Popular Music
* Exit Node Repudiation for Anonymity Networks
* TrackMeNot: Resisting Surveillance in Web Search
*
*
* PART III: ANONYMITY
* Anonymity and the Law in the USA
* Anonymity and the Law in the United Kingdom
* Anonymity and the Law in Canada
* Anonymity and the Law in the Netherlands
* Anonymity and the Law in Italy
* Soft Surveillance, Hard Consent: The Law and Psychology of
Engineering Consent
* Approaches to Consent in Canadian Data Protection Law
* Learning from Data Protection Law at the Nexus of Copyright and
Privacy
* A Heuristics Approach to Understanding Privacy-Protecting Behaviors
in Digital Social Environments
* Ubiquitous Computing and Spatial Privacy
* Core Privacy: A Privacy for Predictive Data Mining
* Privacy Versus National Security: Clarifying the Trade-Off
* Privacy's Second Home: Building a New Home for Privacy under Section
15 of the Charter
* What Have You Done for Me Lately? Reflections on Redeeming Privacy
for Battered Women Genetic Technologies and Medicine: Privacy,
Identity and Informed Consent
* Reclaiming the Social Value of Privacy
*
*
* PART II: IDENTITY
* A Conceptual Analysis of Identity
* Identity: Difference and Categorization
* Identity Cards and Identity Romaticism
* What's in a Name? Who Benefits from the Publication Ban in Sexual
Assault Trials?
* Life in the Fish Bowl: Feminist Interrogations of Webcamming
* Ubiquitous Computing, Spatiality, and the Construction of Identity:
Directions for Policy Response
* Dignity and Selective Self-Presentation
* The Internet of People? Reflections on the Future Regulation of
Human-Implantable Radio Frequency Identification
* Usig Biometrics to Re-Visualize the Canada-US Border
* Soul Train: The New Surveillance in Popular Music
* Exit Node Repudiation for Anonymity Networks
* TrackMeNot: Resisting Surveillance in Web Search
*
*
* PART III: ANONYMITY
* Anonymity and the Law in the USA
* Anonymity and the Law in the United Kingdom
* Anonymity and the Law in Canada
* Anonymity and the Law in the Netherlands
* Anonymity and the Law in Italy