Skip to results
1-20 of 42
Keywords: Privacy
Sort by
Chapter
The Black Stack
Get access
Benjamin H. Bratton
Published: 01 March 2016
... world anonymity authority biopolitics Girard Rene Habermas Jürgen invention Karp Alex Palantir privacy Theseus’ paradox Thiel Peter User hacker distinction Arab Spring China Cloud Polis Cohen Jared death of the User geography geopolitical conflict geopolitical geography Google Ideas...
Chapter
Corporate Accountability in Networked Asia
Get access
Rebecca MacKinnon
Published: 30 September 2011
... that are not in sync with the Universal Declaration of Human Rights helping the citizens, as well as themselves, in practicing freedom of expression and privacy rights. Corporate social responsibility Corporations Access Controlled The Shaping of Power Rights and Rule in Cyberspace China Internet filtering...
Chapter
Understanding Regulatory and Consumer Interest in the Cloud
Get access
Jonathan Cave and others
Published: 21 September 2015
... Criminal computing activity CSP practices consumer information and transparency Data protection Foreclosure risk Intellectual property rights Jurisdictional issues Location issues Market forces Privacy issues Reliability Resilience capacity Security issues in cloud computing Utility cloud...
Chapter
Architecting Civil Liberties
Get access
Laura DeNardis
Published: 31 July 2009
... Engineering Taskforce involved in the selection of the final IPv6 protocol. The chapter describes how Internet engineers integrate some privacy protection features into the IPv6 address design and how privacy protection concerns are being expressed by certain privacy advocates within the European Union...
Chapter
Considering Privacy Protections for Human Research
Get access
Suzanne M. Rivera
Published: 30 September 2014
...Protecting the rights and welfare of research subjects requires consideration of risks in the context of everyday life. As our attitudes about privacy in everyday life change, this chapter argues that so should the regulations that govern privacy protections in human research. Overly cautious...
Chapter
Ethical and Practical Considerations for Human Microelectrode Recording Studies
Get access
Itzhak Fried
Published: 31 July 2014
... Microdrive Pallidus globus Stereotactic Thalamus Lesion Intraoperative Prosthetic Electrocorticography Theta oscillations Epilepsy Ethics Privacy Patient rights As methods to study the function of the human brain increase in sophistication, questions once relegated only to theoretical discussion...
Chapter
Core Cases
Get access
Finn Brunton and Helen Nissenbaum
Published: 30 September 2015
... Tor relays Audio surveillance Babble tapes Eavesdropping interference Encryption Operation Vula South African political struggle Jenkin Tim CacheCloak Press Ronnie Obfuscation Privacy Social networks Identity Online activism During the Second World War, a radar operator tracks...
Book
Obfuscation: A User's Guide for Privacy and Protest
Get access
Finn Brunton and Helen Nissenbaum
Published online: 22 September 2016
Published in print: 30 September 2015
... privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation...
Chapter
Privacy and Biometric Technology
Get access
Lisa S. Nelson
Published: 12 November 2010
...Privacy concerns play a significant part in the deployment and use of biometric systems of identification, and are central to the public policy debate over the use of biometric technology. Privacy is considered an important factor in understanding societal acceptance of biometric technology...
Chapter
Published: 27 May 2016
... often, people see what they want to see, look to assert power over others, and use visibility as a justification of violating others’ privacy. This essay explores the dynamics of visibility in social media with an eye towards how visibility can be leveraged to understand, empathize, or help...
Chapter
Published: 27 May 2016
...This chapter examines how digital native youth understand and exercise privacy on social media, and offers ways for concerned groups (such as parents, educators and legislators) to change their perceptions of the risks and rewards of social media use. It identifies the challenges of the converged...
Chapter
Encryption as a Human Right
Get access
David Casacuberta and Adolfo Plasencia
Published: 04 May 2017
... the reasons why access to the Internet should be totally anonymous and argues that cryptography could be a core element for achieving this. He then explains his idea about “privacy as dignity”, and why privacy needs to be redefined. Next, he talks about why we must oppose surveillance from a cultural point...
Book
Health Informatics: A Patient-Centered Approach to Diabetes
Get access
Barbara M. Hayes (ed.) and William Aspray (ed.)
Published online: 22 August 2013
Published in print: 27 August 2010
...The health care industry has been slow to join the information technology revolution; handwritten records are still the primary means of organizing patient care. Concerns about patient privacy, the difficulty of developing appropriate computing tools and information technology, high costs...
Book
Published online: 22 August 2013
Published in print: 12 November 2010
... deployed for such purposes as combating welfare fraud, screening airplane passengers, and identifying terrorists. The accompanying controversy has pitted those who praise the technology's accuracy and efficiency against advocates for privacy and civil liberties. This book investigates the complex public...
Book
Education and Social Media: Toward a Digital Future
Get access
Christine Greenhow (ed.) and others
Published online: 19 January 2017
Published in print: 27 May 2016
..., new literacies and competencies, cultural reproduction, international accreditation, intellectual property, privacy and protection, new business models, and technical architectures for digital education....
Chapter
Security and Governance
Get access
Nayan B. Ruparelia
Published: 28 April 2016
... and Utility) and the CIA Triad (Confidentiality, Integrity and Availability). Enforcing such security regimes is then discussed using security containers and monitoring.Data integrity is considered in terms of encryption, checksums and data loss prevention. Also, data privacy is discussed with regard...
Chapter
Introduction
Get access
Elad Yom-Tov
Published: 29 April 2016
... scientists, and the results of such collaborations can provide insights not otherwise available. The use of Internet data has potentially concerning implications to the privacy of individuals, but done correctly, privacy can be protected while providing the ability to improve peoples’ health in a direct...
Chapter
Four PSIE Challenges
Get access
Alon Peled
Published: 10 October 2014
... that furthers democratic ideals of transparency, accountability, and service delivery (via e-Government). This dilemma is examined through a case study of Iceland’s genome commoditization debate. (2) The privacy challenge concerns the trade-off between citizens’ right to privacy and efficient governance. (3...
Chapter
Epilogue
Get access
Anindya Ghose
Published: 17 April 2017
... importantly, they need to take data security and privacy issues seriously. Data breaches Implants Privacy Apple Differential privacy Google Facebook Social impact of technology “Geeks ” Reich Robert “Shrinks ” Omni Channel Programmatic marketing mobile technology mobile economy consumer behavior...
Chapter
The Promise and Perils of Digital Libraries
Get access
Aaron Perzanowski and Jason Schultz
Published: 04 November 2016
... copies makes it harder for libraries to preserve works that lack perceived economic value or that are subject to censorship. It also threatens the privacy of library patrons and stifles innovation. Archives Franklin Benjamin Library Company of Philadelphia Property Repair Resale American Library...