1-20 of 42
Keywords: Privacy
Sort by
Chapter
Published: 01 March 2016
... world anonymity authority biopolitics Girard Rene Habermas Jürgen invention Karp Alex Palantir privacy Theseus’ paradox Thiel Peter User hacker distinction Arab Spring China Cloud Polis Cohen Jared death of the User geography geopolitical conflict geopolitical geography Google Ideas...
Chapter
Published: 30 September 2011
... that are not in sync with the Universal Declaration of Human Rights helping the citizens, as well as themselves, in practicing freedom of expression and privacy rights. Corporate social responsibility Corporations Access Controlled The Shaping of Power Rights and Rule in Cyberspace China Internet filtering...
Chapter
Published: 21 September 2015
... Criminal computing activity CSP practices consumer information and transparency Data protection Foreclosure risk Intellectual property rights Jurisdictional issues Location issues Market forces Privacy issues Reliability Resilience capacity Security issues in cloud computing Utility cloud...
Chapter
Published: 31 July 2009
... Engineering Taskforce involved in the selection of the final IPv6 protocol. The chapter describes how Internet engineers integrate some privacy protection features into the IPv6 address design and how privacy protection concerns are being expressed by certain privacy advocates within the European Union...
Chapter
Published: 30 September 2014
...Protecting the rights and welfare of research subjects requires consideration of risks in the context of everyday life. As our attitudes about privacy in everyday life change, this chapter argues that so should the regulations that govern privacy protections in human research. Overly cautious...
Chapter
Published: 31 July 2014
... Microdrive Pallidus globus Stereotactic Thalamus Lesion Intraoperative Prosthetic Electrocorticography Theta oscillations Epilepsy Ethics Privacy Patient rights As methods to study the function of the human brain increase in sophistication, questions once relegated only to theoretical discussion...
Chapter
Published: 30 September 2015
... Tor relays Audio surveillance Babble tapes Eavesdropping interference Encryption Operation Vula South African political struggle Jenkin Tim CacheCloak Press Ronnie Obfuscation Privacy Social networks Identity Online activism During the Second World War, a radar operator tracks...
Book
Published online: 22 September 2016
Published in print: 30 September 2015
... privacy against data surveillance, and protesting the unjust collection or misuse of data. The authors provide strategies and an argument for evasion, noncompliance, refusal, even sabotage, particularly for average users not in a position to opt out or exert control over data about themselves. Obfuscation...
Chapter
Published: 12 November 2010
...Privacy concerns play a significant part in the deployment and use of biometric systems of identification, and are central to the public policy debate over the use of biometric technology. Privacy is considered an important factor in understanding societal acceptance of biometric technology...
Chapter
Published: 27 May 2016
... often, people see what they want to see, look to assert power over others, and use visibility as a justification of violating others’ privacy. This essay explores the dynamics of visibility in social media with an eye towards how visibility can be leveraged to understand, empathize, or help...
Chapter
Published: 27 May 2016
...This chapter examines how digital native youth understand and exercise privacy on social media, and offers ways for concerned groups (such as parents, educators and legislators) to change their perceptions of the risks and rewards of social media use. It identifies the challenges of the converged...
Chapter
Published: 04 May 2017
... the reasons why access to the Internet should be totally anonymous and argues that cryptography could be a core element for achieving this. He then explains his idea about “privacy as dignity”, and why privacy needs to be redefined. Next, he talks about why we must oppose surveillance from a cultural point...
Book

Barbara M. Hayes (ed.) and William Aspray (ed.)
Published online: 22 August 2013
Published in print: 27 August 2010
...The health care industry has been slow to join the information technology revolution; handwritten records are still the primary means of organizing patient care. Concerns about patient privacy, the difficulty of developing appropriate computing tools and information technology, high costs...
Book
Published online: 22 August 2013
Published in print: 12 November 2010
... deployed for such purposes as combating welfare fraud, screening airplane passengers, and identifying terrorists. The accompanying controversy has pitted those who praise the technology's accuracy and efficiency against advocates for privacy and civil liberties. This book investigates the complex public...
Book
Published online: 19 January 2017
Published in print: 27 May 2016
..., new literacies and competencies, cultural reproduction, international accreditation, intellectual property, privacy and protection, new business models, and technical architectures for digital education....
Chapter
Published: 28 April 2016
... and Utility) and the CIA Triad (Confidentiality, Integrity and Availability). Enforcing such security regimes is then discussed using security containers and monitoring.Data integrity is considered in terms of encryption, checksums and data loss prevention. Also, data privacy is discussed with regard...
Chapter
Published: 29 April 2016
... scientists, and the results of such collaborations can provide insights not otherwise available. The use of Internet data has potentially concerning implications to the privacy of individuals, but done correctly, privacy can be protected while providing the ability to improve peoples’ health in a direct...
Chapter
Published: 10 October 2014
... that furthers democratic ideals of transparency, accountability, and service delivery (via e-Government). This dilemma is examined through a case study of Iceland’s genome commoditization debate. (2) The privacy challenge concerns the trade-off between citizens’ right to privacy and efficient governance. (3...
Chapter
Published: 17 April 2017
... importantly, they need to take data security and privacy issues seriously. Data breaches Implants Privacy Apple Differential privacy Google Facebook Social impact of technology “Geeks ” Reich Robert “Shrinks ” Omni Channel Programmatic marketing mobile technology mobile economy consumer behavior...
Chapter
Published: 04 November 2016
... copies makes it harder for libraries to preserve works that lack perceived economic value or that are subject to censorship. It also threatens the privacy of library patrons and stifles innovation. Archives Franklin Benjamin Library Company of Philadelphia Property Repair Resale American Library...