Browse Results

Showing 25,476 through 25,500 of 34,210 results

The Privacy Fix: How to Preserve Privacy in the Onslaught of Surveillance

by Robert H. Sloan Richard Warner

Online surveillance of our behavior by private companies is on the increase, particularly through the Internet of Things and the increasing use of algorithmic decision-making. This troubling trend undermines privacy and increasingly threatens our ability to control how information about us is shared and used. Written by a computer scientist and a legal scholar, The Privacy Fix proposes a set of evidence-based, practical solutions that will help solve this problem. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. Bridging the gap between computer scientists, economists, lawyers, and public policy makers, this book provides theoretically and practically sound public policy guidance about how to preserve privacy in the onslaught of surveillance. It emphasizes the need to make tradeoffs among the complex concerns that arise, and it outlines a practical norm-creation process to do so.

Privacy Impact Assessment

by Paul De Hert David Wright

Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be exposing themselves to risks, from threats and vulnerabilities, of that data being breached or compromised by negligent or wayward employees, hackers, the police, intelligence agencies or third-party service providers. A recent study by the Ponemon Institute found that 70 per cent of organisations surveyed had suffered a data breach in the previous year. Privacy impact assessment is a tool, a process, a methodology to identify, assess, mitigate or avoid privacy risks and, in collaboration with stakeholders, to identify solutions. Contributors to this book - privacy commissioners, academics, consultants, practitioners, industry representatives - are among the world's leading PIA experts. They share their experience and offer their insights to the reader in the policy and practice of PIA in Australia, Canada, New Zealand, the United Kingdom, the United States and elsewhere. This book, the first such on privacy impact assessment, will be of interest to any organisation that collects or uses personal data and, in particular, to regulators, policy-makers, privacy professionals, including privacy, security and information officials, consultants, system architects, engineers and integrators, compliance lawyers and marketing professionals. In his Foreword, surveillance studies guru Gary Marx says, "This state-of-the-art book describes the most comprehensive tool yet available for policy-makers to evaluate new personal data information technologies before they are introduced." This book could save your organisation many thousands or even millions of euros (or dollars) and the damage to your organisation's reputation and to the trust of employees, customers or citizens if it suffers a data breach that could have been avoided if only it had performed a privacy impact assessment before deploying a new technology, product, service or other initiative involving personal data.

Privacy in a Cyber Age

by Amitai Etzioni

This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can be carried out. In studying these matters, the book examines the privacy issues raised by the NSA, publication of state secrets, and DNA usage.

Privacy in a Digital, Networked World

by Sherali Zeadally Mohamad Badra

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.

Privacy in Context

by Helen Nissenbaum

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself-most people understand that this is crucial to social life -but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts-whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Privacy in the Age of Neuroscience: Reimagining Law, State and Market

by David Grant

Neuroscience has begun to intrude deeply into what it means to be human, an intrusion that offers profound benefits but will demolish our present understanding of privacy. In Privacy in the Age of Neuroscience, David Grant argues that we need to reconceptualize privacy in a manner that will allow us to reap the rewards of neuroscience while still protecting our privacy and, ultimately, our humanity. Grant delves into our relationship with technology, the latest in what he describes as a historical series of 'magnitudes', following Deity, the State and the Market, proposing the idea that, for this new magnitude (Technology), we must control rather than be subjected to it. In this provocative work, Grant unveils a radical account of privacy and an equally radical proposal to create the social infrastructure we need to support it.

Privacy in the Information Society: Volume II (The Library of Essays on Law and Privacy #2)

by Philip Leith

Information society projects promise wealth and better services to those countries which digitise and encourage the consumer and citizen to participate. As paper recedes into the background and digital data becomes the primary resource in the information society, what does this mean for privacy? Can there be privacy when every communication made through ever-developing ubiquitous devices is recorded? Data protection legislation developed as a reply to large scale centralised databases which contained incorrect data and where data controllers denied access and refused to remedy information flaws. Some decades later the technical world is very different one, and whilst data protection remains important, the cries for more privacy-oriented regulation in commerce and eGov continue to rise. What factors should underpin the creation of new means of regulation? The papers in this collection have been drawn together to develop the positive and negative effects upon the information society which privacy regulation implies.

Privacy in the Modern Age

by Jeramie Scott Julia Horwitz Marc Rotenberg

The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies.The contributors to this anthology don't simply describe these problems or warn about the loss of privacy-they propose solutions. They look closely at business practices, public policy, and technology design, and ask, "Should this continue? Is there a better approach?" They take seriously the dictum of Thomas Edison: "What one creates with his hand, he should control with his head." It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there's a problem--let's find a solution.

Privacy in the New Media Age

by Jon L. Mills

Balancing personal dignity and first amendment concerns has become increasingly challenging in the new media age, when, for example, bloggers have no editors and perhaps no moral restraints. Unlimited and unrestricted internet speech has left thousands of victims in its wake, most of them silenced after the media cycle moves on. While the history of free speech and press has noble origins rooted in democratic theory, how does society protect those who are harassed, stalked, and misrepresented online while maintaining a free society?Jon Mills, one of the nation’s top privacy experts and advocates, maps out this complex problem. He discusses the need for forethought and creative remedies, looking at solutions already implemented by the European Union and comparing them to the obsolete privacy laws still extant in the United States. In his search for solutions, Mills closely examines an array of cases, some of them immediately recognizable because of their notoriety and extensive media coverage. In a context of almost instantaneous global communications, where technology moves faster than the law, Mills traces the sharp edge between freedom of expression and the individual dignity that privacy preserves.

Privacy Law Sourcebook 2016: United States Law, International Law and Recent Developments

by Marc Rotenberg

More than a decade has passed since the last publication of The Privacy Law Sourcebook. Although much has happened in the privacy world, we remain committed to providing an accurate and timely collection of the main legal instruments for privacy protection in the modern age, as well as useful resources to aid further research.

The Privacy Leader Compass: A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs

by Valerie Lyons Todd Fitzgerald

Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your company. Or maybe you are an experienced CPO/DPO, and you wonder – "what can I learn from other successful privacy experts to be even more effective?" Or perhaps you are considering a move from a different career path and deciding if this is the right direction for you. Seasoned award-winning Privacy and Cybersecurity leaders Dr. Valerie Lyons (Dublin, Ireland) and Todd Fitzgerald (Chicago, IL USA) have teamed up with over 60 award-winning CPOs, DPOs, highly respected privacy/data protection leaders, data protection authorities, and privacy standard setters who have fought the tough battle. Just as the #1 best-selling and CANON Cybersecurity Hall of Fame winning CISO Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers book provided actionable advice to Chief Information Security Officers, The Privacy Leader Compass is about straight talk – delivering a comprehensive privacy roadmap applied to, and organized by, a time-tested organizational effectiveness model (the McKinsey 7-S Framework) with practical, insightful stories and lessons learned. You own your continued success as a privacy leader. If you want a roadmap to build, lead, and sustain a program respected and supported by your board, management, organization, and peers, this book is for you.

The Privacy Mission: Achieving Ethical Data for Our Lives Online

by Annie Machon

Future-proof yourself and your organization against known threats to privacy and online safety The subject of data ethics has never been more urgent. This is no longer an academic or niche geek issue as it has been since the inception of the internet and the world wide web. Data ethics is an issue that affects all of us now as our personal and professional lives increasingly take place online. Who controls access to the hardware, who runs the software, who can spy on us, hack us, data farm us? What are the threats that we need to mitigate against democratically, societally, and personally? How can corporations protect us and how can that help their bottom line?The Privacy Mission aims to answer these questions and summarise both the overarching concepts and principles about why data ethics is important. It offers practical solutions for companies, policy makers and individuals to push back against known threats and future proof themselves going forward.

Privacy on the Ground: Driving Corporate Behavior in the United States and Europe (Information Policy)

by Kenneth A. Bamberger Deirdre K. Mulligan

An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations. Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on the ground” in changing corporate (or government) behavior—until now. This intensive five-nation study goes inside corporations to examine how the people charged with protecting privacy actually do their work, and what kinds of regulation effectively shape their behavior. And the research yields a surprising result. The countries with more ambiguous regulation—Germany and the United States—had the strongest corporate privacy management practices, despite very different cultural and legal environments. The more rule-bound countries—like France and Spain—trended instead toward compliance processes, not embedded privacy practices. At a crucial time, when Big Data and the Internet of Things are snowballing, Privacy on the Ground helpfully searches out the best practices by corporations, provides guidance to policymakers, and offers important lessons for everyone concerned with privacy, now and in the future.

The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions (ISSN)

by Rebecca Herold

Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response marketing, privacy of financial and health records,

Privacy Rights: Moral and Legal Foundations

by Adam D. Moore

We all know that Google stores huge amounts of information about everyone who uses its search tools, that Amazon can recommend new books to us based on our past purchases, and that the U.S. government engaged in many data-mining activities during the Bush administration to acquire information about us, including involving telecommunications companies in monitoring our phone calls (currently the subject of a bill in Congress). Control over access to our bodies and to special places, like our homes, has traditionally been the focus of concerns about privacy, but access to information about us is raising new challenges for those anxious to protect our privacy. In Privacy Rights, Adam Moore adds informational privacy to physical and spatial privacy as fundamental to developing a general theory of privacy that is well grounded morally and legally.

Privacy Rights: Moral and Legal Foundations

by Adam D. Moore

We all know that Google stores huge amounts of information about everyone who uses its search tools, that Amazon can recommend new books to us based on our past purchases, and that the U.S. government engaged in many data-mining activities during the Bush administration to acquire information about us, including involving telecommunications companies in monitoring our phone calls (currently the subject of a bill in Congress). Control over access to our bodies and to special places, like our homes, has traditionally been the focus of concerns about privacy, but access to information about us is raising new challenges for those anxious to protect our privacy. In Privacy Rights, Adam Moore adds informational privacy to physical and spatial privacy as fundamental to developing a general theory of privacy that is well grounded morally and legally.

Privacy Symposium 2022: Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)

by Stefan Schiffner Sebastien Ziegler Adrian Quesada Rodriguez

This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services.Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Privacy Technologies and Policy

by Bettina Berendt Thomas Engel Demosthenes Ikonomou Daniel Le Métayer Stefan Schiffner

This book constitutes the thoroughly refereedpost-conference proceedings of the Third Annual Privacy Forum, APF 2015, heldin Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume werecarefully reviewed and selected from 24 submissions. The topics focus onprivacy by design (PbD), i. e. the attempt to combine technical and organizationalmeasures to ensure the basic rights of the individual. The papers are organizedin three sessions: measuring privacy; rules and principles; legal and economicperspectives on privacy.

Privacy Technologies and Policy

by Erich Schweighofer Herbert Leitold Andreas Mitrakas Kai Rannenberg

This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, "Data Protection Regulation", discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, "Neutralisation and Anonymization", discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, "Privacy Policies in Practice", discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.

Privacy, Technology, and the Criminal Process (New Advances in Crime and Social Harm)

by Andrew Roberts, Joe Purshouse, and Jason Bosland

This collection considers the implications for privacy of the utilisation of new technologies in the criminal process. In most modern liberal democratic states, privacy is considered a basic right. Many national constitutions, and almost all international human rights instruments, include some guarantee of privacy. Yet privacy interests appear to have had relatively little influence on criminal justice policy making. The threat that technology poses to these interests demands critical re-evaluation of current law, policy, and practice. This is provided by the contributions to this volume. They offer legal, criminological, philosophical and comparative perspectives. The book will be of interest to legal and criminological scholars and postgraduate students. Its interdisciplinary methodology and focus on the intersection between law and technology make it also relevant for philosophers, and those interested in science and technology studies.

Privacy, Trust and Social Media (Routledge Studies in Trust Research)

by Joanna Paliszkiewicz Kuanchin Chen Jerzy Gołuchowski

Trust is important – it influences new technologies adoption and learning, enhances using social media, new technologies, IoT, and blockchain, and it contributes to the practical implementations of cybersecurity policy in organizations. This edited research volume examines the main issues and challenges associated with privacy and trust on social media in a manner relevant to both practitioners and scholars. Readers will gain knowledge across disciplines on trust and related concepts, theoretical underpinnings of privacy issues and trust on social media, and empirically-validated trust-building practice on social media. Social Media, Privacy Issues and Trust-building aims to bring together the theory and practice of social media, privacy issues, and trust. It offers a look at the current state of trust and privacy, including a comprehensive overview of both research and practical applications. It shows the latest state of knowledge on the topic and will be of interest to researchers, students at an advanced level, and academics, in the fields of business ethics, entrepreneurship, management of technology and innovation, marketing, and information management. Practitioners can also use the book as a toolbox to improve their understanding and promote opportunities related to building social media trust while taking into consideration of privacy issues.

Privacy, Trust and Social Media (Routledge Studies in Trust Research)

by Joanna Paliszkiewicz Kuanchin Chen Jerzy Gołuchowski

Trust is important – it influences new technologies adoption and learning, enhances using social media, new technologies, IoT, and blockchain, and it contributes to the practical implementations of cybersecurity policy in organizations. This edited research volume examines the main issues and challenges associated with privacy and trust on social media in a manner relevant to both practitioners and scholars. Readers will gain knowledge across disciplines on trust and related concepts, theoretical underpinnings of privacy issues and trust on social media, and empirically-validated trust-building practice on social media. Social Media, Privacy Issues and Trust-building aims to bring together the theory and practice of social media, privacy issues, and trust. It offers a look at the current state of trust and privacy, including a comprehensive overview of both research and practical applications. It shows the latest state of knowledge on the topic and will be of interest to researchers, students at an advanced level, and academics, in the fields of business ethics, entrepreneurship, management of technology and innovation, marketing, and information management. Practitioners can also use the book as a toolbox to improve their understanding and promote opportunities related to building social media trust while taking into consideration of privacy issues.

Privacy’s Blueprint: The Battle to Control the Design of New Technologies

by Woodrow Hartzog

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them. In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.

Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History

by Denver Nicks

Bradley Manning perpetrated the biggest breach of military security in American history. This intelligence analyst leaked an astounding amount of classified information to WikiLeaks: classified combat videos and hundreds of thousands of documents from the wars in Afghanistan and Iraq and from embassies around the globe. Almost all of WikiLeaks's headline-making releases of information have come from one source only: Bradley Manning. The leaks affected governments the world over--the Arab uprisings were spurred, in part, by Manning's revelations. They propelled WikiLeaks to a level of international prominence it never had before. The world would never be the same. Bradley Manning's story is one of global significance, and yet he remains an enigma. Now, for the first time, the full truth will be told about a man who, at the age of only twenty-two, changed the world. Nicks's book paints a nuanced portrait of a man haunted by demons and driven by hope, impulsive and cocky yet idealistic enough to follow his conscience. Relying on numerous conversations with those who know Manning best, Nicks gives the full story of a bright, gay kid from middle America who signs on to serve his country and finds himself serving a cause he finds far more sinister, and why he betrayed his oath and fellow troops--and his own future--in order to fulfill what he saw as a higher purpose. Denver Nicks has written for The Daily Beast, The Nation, AlterNet, and other publications. He lives in New York City.

Refine Search

Showing 25,476 through 25,500 of 34,210 results