Lessons from the Identity Trail

Lessons from the Identity Trail

Author: Ian Kerr

Publisher: Oxford University Press

Published: 2009-03-18

Total Pages: 587

ISBN-13: 0199707014

DOWNLOAD EBOOK

During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these new and emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in an environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recent research outcomes.


Lessons from the Identity Trail

Lessons from the Identity Trail

Author: Ian R. Kerr

Publisher:

Published: 2009

Total Pages: 587

ISBN-13: 0195372476

DOWNLOAD EBOOK

This contributed volume is the first multidisciplinary analysis about the problems and potential for anonymity and privacy in a networked society. The book examines key questions about identity in a global environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks.


EGirls, ECitizens

EGirls, ECitizens

Author: Valerie Steeves

Publisher: University of Ottawa Press

Published: 2015-04-23

Total Pages: 519

ISBN-13: 0776622595

DOWNLOAD EBOOK

eGirls, eCitizens is a landmark work that explores the many forces that shape girls’ and young women’s experiences of privacy, identity, and equality in our digitally networked society. Drawing on the multi-disciplinary expertise of a remarkable team of leading Canadian and international scholars, as well as Canada’s foremost digital literacy organization, MediaSmarts, this collection presents the complex realities of digitized communications for girls and young women as revealed through the findings of The eGirls Project (www.egirlsproject.ca) and other important research initiatives. Aimed at moving dialogues on scholarship and policy around girls and technology away from established binaries of good vs bad, or risk vs opportunity, these seminal contributions explore the interplay of factors that shape online environments characterized by a gendered gaze and too often punctuated by sexualized violence. Perhaps most importantly, this collection offers first-hand perspectives collected from girls and young women themselves, providing a unique window on what it is to be a girl in today’s digitized society.


Human Rights Responsibilities in the Digital Age

Human Rights Responsibilities in the Digital Age

Author: Jonathan Andrew

Publisher: Bloomsbury Publishing

Published: 2021-08-26

Total Pages: 320

ISBN-13: 1509938842

DOWNLOAD EBOOK

This book examines the tangled responsibilities of states, companies, and individuals surrounding human rights in the digital age. Digital technologies have a huge impact – for better and worse – on human lives; while they can clearly enhance some human rights, they also facilitate a wide range of violations. States are expected to implement efficient measures against powerful private companies, but, at the same time, they are drawn to technologies that extend their own control over citizens. Tech companies are increasingly asked to prevent violations committed online by their users, yet many of their business models depend on the accumulation and exploitation of users' personal data. While civil society has a crucial part to play in upholding human rights, it is also the case that individuals harm other individuals online. All three stakeholders need to ensure that technology does not provoke the disintegration of human rights. Bringing together experts from a range of disciplines, including law, international relations, and journalism, this book provides a detailed analysis of the impact of digital technologies on human rights, which will be of interest to academics, research students and professionals concerned by this issue.


Privacy Is Hard and Seven Other Myths

Privacy Is Hard and Seven Other Myths

Author: Jaap-Henk Hoepman

Publisher: MIT Press

Published: 2023-10-03

Total Pages: 275

ISBN-13: 0262547201

DOWNLOAD EBOOK

An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.


Sexual Assault in Canada

Sexual Assault in Canada

Author: Elizabeth A. Sheehy

Publisher: University of Ottawa Press

Published: 2012-09-29

Total Pages: 833

ISBN-13: 0776619772

DOWNLOAD EBOOK

Sexual Assault in Canada is the first English-language book in almost two decades to assess the state of sexual assault law and legal practice in Canada. Gathering together feminist scholars, lawyers, activists and policy-makers, it presents a picture of the difficult issues that Canadian women face when reporting and prosecuting sexual violence. The volume addresses many themes including the systematic undermining of women who have been sexually assaulted, the experiences of marginalized women, and the role of women’s activism. It explores sexual assault in various contexts, including professional sports, the doctor–patient relationship, and residential schools. And it highlights the influence of certain players in the reporting and litigation of sexual violence, including health care providers, social workers, police, lawyers and judges. Sexual Assault in Canada provides both a multi-faceted assessment of the progress of feminist reforms to Canadian sexual assault law and practice, and articulates a myriad of new ideas, proposed changes to law, and inspired activist strategies. This book was created to celebrate the tenth anniversary of Jane Doe’s remarkable legal victory against the Toronto police for sex discrimination in the policing of rape and for negligence in failing to warn her of a serial rapist. The case made legal history and motivated a new generation of feminist activists. This book honours her pioneering work by reflecting on how law, legal practice and activism have evolved over the past decade and where feminist research and reform should lead in the years to come.


The New Media of Surveillance

The New Media of Surveillance

Author: Shoshana Magnet

Publisher: Routledge

Published: 2013-09-13

Total Pages: 194

ISBN-13: 1317990382

DOWNLOAD EBOOK

The spread of new surveillance technologies is an issue of major concern for democratic societies. More ubiquitous and sophisticated monitoring techniques raise profound questions for the very possibility of individual autonomy and democratic government. Innovations in surveillance systems require equally innovative approaches for analyzing their social and political implications, and the field of critical communication studies is uniquely equipped to provide fresh insights. This book brings together the work of a number of critical communication scholars who take innovative approaches to examining the surveillance dimensions of new media technologies. The essays included in this volume focus on interactive networks, computer generated imagery, biometrics, and intelligent transport systems as sites where communication and surveillance have become virtually inseparable social processes. This book was originally published as a special issue of The Communication Review.


Situational Privacy and Self-Disclosure

Situational Privacy and Self-Disclosure

Author: Philipp K. Masur

Publisher: Springer

Published: 2018-06-28

Total Pages: 394

ISBN-13: 3319788841

DOWNLOAD EBOOK

Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people’s privacy perceptions and behaviors, a situational perspective needs to be adopted. To this end, the book is divided into three parts. Part I advances the theory of situational privacy and self-disclosure by discussing impacts of new information and communication technologies on traditional theories of privacy and self-disclosure. Based on five basic suppositions, it describes three major processes of the theory: pre-situational privacy regulations processes, situational privacy perception and self-disclosure processes, and post-situational evaluation processes. Next, Part II presents the application of the theory to smartphone-based communication. It first analyses how people choose certain communication environments on their smartphones, how they manipulate them, and how these external factors affect self-disclosure within these environments. It then details a multi-method study conducted to test the derived assumptions and discusses the obtained results. Part III reflects on the overall implications of the theory, summarizes the major findings and lastly considers possible extensions and perspectives on future research. Intended mainly for researchers in privacy and communication studies, the book offers privacy scholars a systematic review of both classic and contemporary theories of privacy and self-disclosure. At the same time, communication scholars benefit from an additional methodological discussion of the mobile experience sampling method, which provides an invaluable approach to measuring situational communication processes.


SuperVision

SuperVision

Author: John Gilliom

Publisher: University of Chicago Press

Published: 2012-11-20

Total Pages: 200

ISBN-13: 0226924459

DOWNLOAD EBOOK

We live in a surveillance society. Anyone who uses a credit card, cell phone, or even search engines to navigate the Web is being monitored and assessed—and often in ways that are imperceptible to us. The first general introduction to the growing field of surveillance studies, SuperVision uses examples drawn from everyday technologies to show how surveillance is used, who is using it, and how it affects our world. Beginning with a look at the activities and technologies that connect most people to the surveillance matrix, from identification cards to GPS devices in our cars to Facebook, John Gilliom and Torin Monahan invite readers to critically explore surveillance as it relates to issues of law, power, freedom, and inequality. Even if you avoid using credit cards and stay off Facebook, they show, going to work or school inevitably embeds you in surveillance relationships. Finally, they discuss the more obvious forms of surveillance, including the security systems used at airports and on city streets, which both epitomize contemporary surveillance and make impossibly grand promises of safety and security. Gilliom and Monahan are among the foremost experts on surveillance and society, and, with SuperVision, they offer an immensely accessible and engaging guide, giving readers the tools to understand and to question how deeply surveillance has been woven into the fabric of our everyday lives.