A clarion call to action against digital abuse of power, this book shows that it is time to stop arguing over whether the Internet empowers people, and address the urgent question of how technology should be governed to support the rights and liberties of users around the world.
Reveals the inner power structure already in place within the architectures and institutions of Internet governance. It provides a theoretical framework for Internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties.Explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates.
Analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society -- without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus.
Draws attention to privacies of seclusion, concealment, confidentiality and data-protection undervalued by their intended beneficiaries and targets - and outlines the best reasons for imposing them. Allen looks at laws designed to keep website operators from collecting personal information, laws that force strippers to wear thongs, and the myriad employee and professional confidentiality rules.
he most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. [This book] makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era.
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less--and why we should. Brunton and Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance--the collection of our data by governments, corporations, advertisers, and hackers.
This volume examines the most recent and contentious issues in relation to cybercrime facing the world today, and how best to address them. The chapters come from established international scholars and policy practitioners in the fields of cybercrime and computer forensics. Their contributions show how Eastern and Western nations are responding to the challenges of cybercrime, and the latest trends and issues in cybercrime prevention and control.
Flaherty examines the passage, revision, and implementation of privacy and data protection laws at the national and state levels in Sweden, Canada, France, Germany, and the United States. He offers a comparative and critical analysis of the challenges data protectors face int their attempt to preserve individual rights.
The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. [This book] makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era.
Argues that we all need to be able to set limits on how big data affects our lives. Hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy.
Security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, author exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop. Book also reveals the serious emotional, professional, and financial harms incurred by victims.
brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field.
OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers.In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims.
In 2013, Edward Snowden revealed that the NSA and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of 'security'. Surveillance expert David Lyon guides the reader through Snowden's ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. Lyon discusses the distinct global reactions to Snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world.
The first collection to focus exclusively on technological surveillance and young people.Organized around three key spheres of children's day-to-day life: schooling, the self and social lives, this book chronicles the increasing surveillance that children, of all ages, are subject to. Numerous surveillance apparatus and tools are examined, including, but not limited to: mobile phones, surveillance cameras, online monitoring, GPS and RFID tracking and big data analytics.
A one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government.
Filmmaker, artist, and journalist Laura Poitras has explored the themes of mass surveillance, "war on terror," drone program, Guantanamo, and torture in her work for more than ten years. In 2013, Poitras was contacted by Edward Snowden, a former National Security Agency subcontractor who leaked classified information about government-sponsored surveillance. For this project she's invited authors ranging from artists and novelists to technologists and academics to respond to the modern-day state of mass surveillance. Among them are the acclaimed author Dave Eggers, the Chinese artist Ai Weiwei, the former Guantanamo Bay detainee Lakhdar Boumediene, the writer and researcher Kate Crawford, and Edward Snowden, to name a few.
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives.
Argues that when privacy and free speech truly conflict, free speech should almost always win. Only when disclosures of truly horrible information are made (such as sex tapes) should privacy be able to trump our commitment to free expression. But in sharp contrast to conventional wisdom, Richards argues that speech and privacy are only rarely in conflict. America's obsession with celebrity culture has blinded us to more important aspects of how privacy and speech fit together.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts--whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify.
Third Edition, the most comprehensive casebook on privacy law ever produced, traces the development of modern privacy law, from the early tort cases to present day disputes over drone surveillance and facial recognition. The text examines the philosophical roots of privacy claims and the significant court cases and statues that have emerged.
Explores how the increasing sophistication of robots and their widespread deployment into hospitals, public spaces, and battlefields requires rethinking of a wide variety of philosophical and public policy issues, including how this technology interacts with existing legal regimes, and thus may inspire changes in policy and in law.