Ian Kerr, Carole Lucock, Valerie Steeves
Lessons from the Identity Trail
Anonymity, Privacy and Identity in a Networked Society
Ian Kerr, Carole Lucock, Valerie Steeves
Lessons from the Identity Trail
Anonymity, Privacy and Identity in a Networked Society
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This contributed volume is the first multidisciplinary analysis about the problems and potential for anonymity and privacy in a networked society. The book examines key questions about identity in a global environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks.
Andere Kunden interessierten sich auch für
- W. NylenParticipatory Democracy versus Elitist Democracy: Lessons from Brazil37,99 €
- Tweets from the Campaign Trail76,00 €
- Sidney Fagundes VieiraOn the waves of the media and on the trail of young people55,99 €
- W. NylenParticipatory Democracy Versus Elitist Democracy: Lessons from Brazil63,99 €
- William EllisProgressive Lessons in Social Science33,99 €
- Charles KellyOutlaw Trail22,99 €
- Honors Communication100,65 €
-
-
-
This contributed volume is the first multidisciplinary analysis about the problems and potential for anonymity and privacy in a networked society. The book examines key questions about identity in a global environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Hurst & Co.
- Seitenzahl: 592
- Erscheinungstermin: 18. März 2009
- Englisch
- Abmessung: 236mm x 155mm x 37mm
- Gewicht: 953g
- ISBN-13: 9780195372472
- ISBN-10: 0195372476
- Artikelnr.: 26366151
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Hurst & Co.
- Seitenzahl: 592
- Erscheinungstermin: 18. März 2009
- Englisch
- Abmessung: 236mm x 155mm x 37mm
- Gewicht: 953g
- ISBN-13: 9780195372472
- ISBN-10: 0195372476
- Artikelnr.: 26366151
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Ian Kerr holds a three-way appointment in the Faculty of Law, the Faculty of Medicine and the Department of Philosophy at the University of Ottawa. Dr. Kerr teaches in the areas of moral philosophy and applied ethics, internet and ecommerce law, contract law and legal theory. He has published extensively in journals on ethical and legal aspects of digital copyright, automated electronic commerce, artificial intelligence, cybercrime, nanotechnology, internet regulation, ISP and intermediary liability, and online defamation. He is also the co-author of Managing the Law (Prentice Hall).
* PART 1: PRIVACY
* Soft Surveillance, Hard Consent: The Law and Psychology of
Engineering Consent
* Approaches to Consent in Canadian Data Protection Law
* Learning from Data Protection Law at the Nexus of Copyright and
Privacy
* A Heuristics Approach to Understanding Privacy-Protecting Behaviors
in Digital Social Environments
* Ubiquitous Computing and Spatial Privacy
* Core Privacy: A Privacy for Predictive Data Mining
* Privacy Versus National Security: Clarifying the Trade-Off
* Privacy's Second Home: Building a New Home for Privacy under Section
15 of the Charter
* What Have You Done for Me Lately? Reflections on Redeeming Privacy
for Battered Women Genetic Technologies and Medicine: Privacy,
Identity and Informed Consent
* Reclaiming the Social Value of Privacy
*
*
* PART II: IDENTITY
* A Conceptual Analysis of Identity
* Identity: Difference and Categorization
* Identity Cards and Identity Romaticism
* What's in a Name? Who Benefits from the Publication Ban in Sexual
Assault Trials?
* Life in the Fish Bowl: Feminist Interrogations of Webcamming
* Ubiquitous Computing, Spatiality, and the Construction of Identity:
Directions for Policy Response
* Dignity and Selective Self-Presentation
* The Internet of People? Reflections on the Future Regulation of
Human-Implantable Radio Frequency Identification
* Usig Biometrics to Re-Visualize the Canada-US Border
* Soul Train: The New Surveillance in Popular Music
* Exit Node Repudiation for Anonymity Networks
* TrackMeNot: Resisting Surveillance in Web Search
*
*
* PART III: ANONYMITY
* Anonymity and the Law in the USA
* Anonymity and the Law in the United Kingdom
* Anonymity and the Law in Canada
* Anonymity and the Law in the Netherlands
* Anonymity and the Law in Italy
* Soft Surveillance, Hard Consent: The Law and Psychology of
Engineering Consent
* Approaches to Consent in Canadian Data Protection Law
* Learning from Data Protection Law at the Nexus of Copyright and
Privacy
* A Heuristics Approach to Understanding Privacy-Protecting Behaviors
in Digital Social Environments
* Ubiquitous Computing and Spatial Privacy
* Core Privacy: A Privacy for Predictive Data Mining
* Privacy Versus National Security: Clarifying the Trade-Off
* Privacy's Second Home: Building a New Home for Privacy under Section
15 of the Charter
* What Have You Done for Me Lately? Reflections on Redeeming Privacy
for Battered Women Genetic Technologies and Medicine: Privacy,
Identity and Informed Consent
* Reclaiming the Social Value of Privacy
*
*
* PART II: IDENTITY
* A Conceptual Analysis of Identity
* Identity: Difference and Categorization
* Identity Cards and Identity Romaticism
* What's in a Name? Who Benefits from the Publication Ban in Sexual
Assault Trials?
* Life in the Fish Bowl: Feminist Interrogations of Webcamming
* Ubiquitous Computing, Spatiality, and the Construction of Identity:
Directions for Policy Response
* Dignity and Selective Self-Presentation
* The Internet of People? Reflections on the Future Regulation of
Human-Implantable Radio Frequency Identification
* Usig Biometrics to Re-Visualize the Canada-US Border
* Soul Train: The New Surveillance in Popular Music
* Exit Node Repudiation for Anonymity Networks
* TrackMeNot: Resisting Surveillance in Web Search
*
*
* PART III: ANONYMITY
* Anonymity and the Law in the USA
* Anonymity and the Law in the United Kingdom
* Anonymity and the Law in Canada
* Anonymity and the Law in the Netherlands
* Anonymity and the Law in Italy
* PART 1: PRIVACY
* Soft Surveillance, Hard Consent: The Law and Psychology of
Engineering Consent
* Approaches to Consent in Canadian Data Protection Law
* Learning from Data Protection Law at the Nexus of Copyright and
Privacy
* A Heuristics Approach to Understanding Privacy-Protecting Behaviors
in Digital Social Environments
* Ubiquitous Computing and Spatial Privacy
* Core Privacy: A Privacy for Predictive Data Mining
* Privacy Versus National Security: Clarifying the Trade-Off
* Privacy's Second Home: Building a New Home for Privacy under Section
15 of the Charter
* What Have You Done for Me Lately? Reflections on Redeeming Privacy
for Battered Women Genetic Technologies and Medicine: Privacy,
Identity and Informed Consent
* Reclaiming the Social Value of Privacy
*
*
* PART II: IDENTITY
* A Conceptual Analysis of Identity
* Identity: Difference and Categorization
* Identity Cards and Identity Romaticism
* What's in a Name? Who Benefits from the Publication Ban in Sexual
Assault Trials?
* Life in the Fish Bowl: Feminist Interrogations of Webcamming
* Ubiquitous Computing, Spatiality, and the Construction of Identity:
Directions for Policy Response
* Dignity and Selective Self-Presentation
* The Internet of People? Reflections on the Future Regulation of
Human-Implantable Radio Frequency Identification
* Usig Biometrics to Re-Visualize the Canada-US Border
* Soul Train: The New Surveillance in Popular Music
* Exit Node Repudiation for Anonymity Networks
* TrackMeNot: Resisting Surveillance in Web Search
*
*
* PART III: ANONYMITY
* Anonymity and the Law in the USA
* Anonymity and the Law in the United Kingdom
* Anonymity and the Law in Canada
* Anonymity and the Law in the Netherlands
* Anonymity and the Law in Italy
* Soft Surveillance, Hard Consent: The Law and Psychology of
Engineering Consent
* Approaches to Consent in Canadian Data Protection Law
* Learning from Data Protection Law at the Nexus of Copyright and
Privacy
* A Heuristics Approach to Understanding Privacy-Protecting Behaviors
in Digital Social Environments
* Ubiquitous Computing and Spatial Privacy
* Core Privacy: A Privacy for Predictive Data Mining
* Privacy Versus National Security: Clarifying the Trade-Off
* Privacy's Second Home: Building a New Home for Privacy under Section
15 of the Charter
* What Have You Done for Me Lately? Reflections on Redeeming Privacy
for Battered Women Genetic Technologies and Medicine: Privacy,
Identity and Informed Consent
* Reclaiming the Social Value of Privacy
*
*
* PART II: IDENTITY
* A Conceptual Analysis of Identity
* Identity: Difference and Categorization
* Identity Cards and Identity Romaticism
* What's in a Name? Who Benefits from the Publication Ban in Sexual
Assault Trials?
* Life in the Fish Bowl: Feminist Interrogations of Webcamming
* Ubiquitous Computing, Spatiality, and the Construction of Identity:
Directions for Policy Response
* Dignity and Selective Self-Presentation
* The Internet of People? Reflections on the Future Regulation of
Human-Implantable Radio Frequency Identification
* Usig Biometrics to Re-Visualize the Canada-US Border
* Soul Train: The New Surveillance in Popular Music
* Exit Node Repudiation for Anonymity Networks
* TrackMeNot: Resisting Surveillance in Web Search
*
*
* PART III: ANONYMITY
* Anonymity and the Law in the USA
* Anonymity and the Law in the United Kingdom
* Anonymity and the Law in Canada
* Anonymity and the Law in the Netherlands
* Anonymity and the Law in Italy