Computerized Monitoring and Online Privacy


Book Description

Increasingly, computers are a part of even the most ordinary and simple aspects of human existence. Computers have changed forever how we work, learn, shop and seek information. They have also, since the 1960s, been programmed to monitor and analyze in various ways the interaction between humans and themselves. The rapid development of the World Wide Web in the 1990s has given new life, direction and urgency to this enterprise. This work describes the myriad ways, benign or malign, in which computers are used to monitor people's use of computers. Four distinct contexts for monitoring are examined: formal learning environments (e.g., educational software); information seeking environments (e.g., online library catalogs); the workplace; and the Internet (e.g., online shopping). Computerized monitoring often is called an invasion of privacy, and the conceptual and ethical dimensions of confidentiality and privacy in virtual environments are explored at length. In addition to providing information about the various computerized monitoring tools and techniques, this work focuses on the broader social, conceptual, ethical and legal implications.




The Cambridge Handbook of Technology and Employee Behavior


Book Description

Experts from across all industrial-organizational (IO) psychology describe how increasingly rapid technological change has affected the field. In each chapter, authors describe how this has altered the meaning of IO research within a particular subdomain and what steps must be taken to avoid IO research from becoming obsolete. This Handbook presents a forward-looking review of IO psychology's understanding of both workplace technology and how technology is used in IO research methods. Using interdisciplinary perspectives to further this understanding and serving as a focal text from which this research will grow, it tackles three main questions facing the field. First, how has technology affected IO psychological theory and practice to date? Second, given the current trends in both research and practice, could IO psychological theories be rendered obsolete? Third, what are the highest priorities for both research and practice to ensure IO psychology remains appropriately engaged with technology moving forward?




Online Consumer Protection: Theories of Human Relativism


Book Description

Presents a broad range of international findings in online consumer protection. Covers the nature of online threats, consumer concerns, and techniques for online privacy protection.




Encyclopedia of the Fourth Amendment


Book Description

This work provides a unique overview for individuals seeking to understand the Fourth Amendment to the U.S. Constitution. It covers key concepts, events, laws and legal doctrines, court decisions, and litigators and litigants regarding the law of search and seizure.




The Digital Person


Book Description

Daniel Solove presents a startling revelation of how digital dossiers are created, usually without the knowledge of the subject, & argues that we must rethink our understanding of what privacy is & what it means in the digital age before addressing the need to reform the laws that regulate it.







Naked in Cyberspace


Book Description

Reveals the personal records available on the Internet; examines Internet privacy; and explores such sources of information as mailing lists, telephone directories, news databases, bank records, and consumer credit records.




Geospatial Research: Concepts, Methodologies, Tools, and Applications


Book Description

Having the ability to measure and explore the geographic space that surrounds us provides endless opportunities for us to utilize and interact with the world. As a broad field of study, geospatial research has applications in a variety of fields including military science, environmental science, civil engineering, and space exploration. Geospatial Research: Concepts, Methodologies, Tools, and Applications is a multi-volume publication highlighting critical topics related to geospatial analysis, geographic information systems, and geospatial technologies. Exploring multidisciplinary applications of geographic information systems and technologies in addition to the latest trends and developments in the field, this publication is ideal for academic and government library inclusion, as well as for reference by data scientists, engineers, government agencies, researchers, and graduate-level students in GIS programs.




Security and Privacy in User Modeling


Book Description

User-adaptive (or "personalized") systems take individual character istics of their current users into account and adapt their behavior ac cordingly. Several empirical studies demonstrate their benefits in areas like education and training, online help for complex software, dynamic information delivery, provision of computer access to people with dis abilities, and to some extent information retrieval. Recently, personal ized systems have also started to appear on the World Wide Web where they are primarily used for customer relationship management. The aim hereby is to provide value to customers by serving them as individuals and by offering them a unique personal relationship with the business. Studies show that web visitors indeed spend considerably more time at personalized than at regular portals and view considerably more web pages. Personalized sites in general also draw more visitors and turn more visitors into buyers. Personalization therefore would look like a win-win technology for both consumers and online businesses. However, it has a major down side: in order to be able to exhibit personalized behavior, user-adaptive systems have to collect considerable amounts of personal data and "lay them in stock" for possible future usage. Moreover, the collection of information about the user is often performed in a relatively inconspic uous manner (such as by monitoring users' web navigation behavior), in order not to distract users from their tasks.




Privacies


Book Description

This ambitious, interdisciplinary collection responds to present intellectual debates concerning the value and limits of privacy. Ever since the beginning of modernity, the line of demarcation between private and public spaces, and the distinction between them, have continually been challenged and redrawn. Such developments as new technologies that introduce previously unforeseen possibilities for infringement upon privacy and the modern spectacles of television talk shows and “reality-TV” give added urgency to the discussion on privacy. This collection examines the fundamental issues structuring that debate. Bringing together for the first time leading contributors to the recent debates on privacy from both Europe and the United States, this collection affirms that privacy, in all its dimensions, remains a central value of liberal democracies. Its essays expose the complex ways in which privacy is essentially and intimately intertwined with our ideas of freedom, identity, and “the good life.”