This volume examines the relationship between privacy, surveillance and security, and the alleged privacy–security trade-off, focusing on the citizen’s perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implemen…
An examination of the public perception of biometric identification technology in the context of privacy, security & civil liberties.OCLC-licensed vendor bibliographic record.
Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups ar…
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the del…
"Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation -- to put …
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations r…
A rallying call for extending human rights beyond our physical selves -- and why we need to reboot rights in our data-intensive world. Our data-intensive world is here to stay, but does that come at the cost of our humanity in terms of autonomy, community, dignity, and equality In We, the Data , Wendy H. Wong argues that we cannot allow that to happen. Exploring the pervasiveness of data collec…
"Chun investigates the centrality of race, gender, class, and sexuality to "Big Data" and network analytics"--OCLC-licensed vendor bibliographic record.
Borders in Cyberspace investigates issues arising from national differences in law, public policy, and social and cultural values in light of the emerging global information infrastructure. The contributions include detailed analyses of some of the most visible issues, including intellectual property, security, privacy, and censorship.OCLC-licensed vendor bibliographic record.
The cultural and media studies perspectives on the technology of electronic consumer profiling.In this book Greg Elmer brings the perspectives of cultural and media studies to the subject of consumer profiling and feedback technology in the digital economy. He examines the multiplicity of processes that monitor consumers and automatically collect, store, and cross-reference personal information…