Privacy and Identity in a Networked Society


Book Description

This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age. Privacy is among the most endangered "species" in our networked society: personal information is processed for various purposes beyond our control. Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities inherent to digital technology reinforce this dilemma and benefit surveillance practices, thereby complicating the detection of privacy risks and the creation of appropriate safeguards. Easing this problem requires a novel approach to privacy impact assessment (PIA), and this book proposes an alternative PIA framework which, at its core, comprises a basic typology of (personally and technically) identifiable information. This approach contributes to the theoretical and practical understanding of privacy impacts and thus, to the development of more effective protection standards. This book will be of much interest to students and scholars of critical security studies, surveillance studies, computer and information science, science and technology studies, and politics.




Lessons from the Identity Trail


Book Description

During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these new and emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in an environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recent research outcomes.




A Networked Self


Book Description

A Networked Self examines self presentation and social connection in the digital age. This collection brings together new work on online social networks by leading scholars from a variety of disciplines. The volume is structured around the core themes of identity, community, and culture—the central themes of social network sites. Contributors address theory, research, and practical implications of the many aspects of online social networks.




The Future of Identity in the Information Society


Book Description

Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." –V. Reding, Commissioner, Responsible for Information Society and Media (EU)




Social Media Freaks


Book Description

Social media has been transforming American and global cultural life for over a decade. It has flattened the divide between producer and audience found in other forms of culture while also enriching some massive corporations. At the core of Social Media Freaks is the question: Does social media reproduce inequalities or is it a tool for subverting them? Social Media Freaks presents a virtual ethnography of social media, focusing on issues of identity and inequality along five dimensions-race, class, gender, sexuality, and disability. It presents original and secondary findings, while also utilizing social theory to explain the dynamics of social media. It teaches readers how to engage social media as a tool for social activism while also examining the limits of social media's value in the quest for social change.




It's Complicated


Book Description

Surveys the online social habits of American teens and analyzes the role technology and social media plays in their lives, examining common misconceptions about such topics as identity, privacy, danger, and bullying.




The Routledge Handbook of Ethics and Public Policy


Book Description

What does it mean to do public policy ethics today? How should philosophers engage with ethical issues in policy-making when policy decisions are circumscribed by political and pragmatic concerns? How do ethical issues in public policy differ between areas such as foreign policy, criminal justice, or environmental policy? The Routledge Handbook of Ethics and Public Policy addresses all these questions and more, and is the first handbook of its kind. It is comprised of 41 chapters written by leading international contributors, and is organised into four clear sections covering the following key topics: Methodology: philosophical approaches to public policy, ethical expertise, knowledge, and public policy Democracy and public policy: identity, integration and inclusion: voting, linguistic policy, discrimination, youth policy, religious toleration, and the family Public goods: defence and foreign policy, development and climate change, surveillance and internal security, ethics of welfare, healthcare and fair trade, sovereignty and territorial boundaries, and the ethics of nudging Public policy challenges: criminal justice, policing, taxation, poverty, disability, reparation, and ethics of death policies. The Routledge Handbook of Ethics and Public Policy is essential reading for students and researchers in philosophy, politics, and social policy. It will be equally useful to those in related disciplines, such as economics and law, or professional fields, such as business administration or policy-making in general.




Applied Cryptography and Network Security


Book Description

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.




On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence


Book Description

This edited volume explores the intersection between philosophy and computing. It features work presented at the 2016 annual meeting of the International Association for Computing and Philosophy. The 23 contributions to this volume neatly represent a cross section of 40 papers, four keynote addresses, and eight symposia as they cut across six distinct research agendas. The volume begins with foundational studies in computation and information, epistemology and philosophy of science, and logic. The contributions next examine research into computational aspects of cognition and philosophy of mind. This leads to a look at moral dimensions of man-machine interaction as well as issues of trust, privacy, and justice. This multi-disciplinary or, better yet, a-disciplinary investigation reveals the fruitfulness of erasing distinctions among and boundaries between established academic disciplines. This should come as no surprise. The computational turn itself is a-disciplinary and no former discipline, whether scientific, artistic, or humanistic, has remained unchanged. Rigorous reflection on the nature of these changes opens the door to inquiry into the nature of the world, what constitutes our knowledge of it, and our understanding of our place in it. These investigations are only just beginning. The contributions to this volume make this clear: many encourage further research and end with open questions.




Artificial Intelligence and Human Rights


Book Description

The scope of Artificial Intelligence's (AI) hold on modern life is only just beginning to be fully understood. Academics, professionals, policymakers, and legislators are analysing the effects of AI in the legal realm, notably in human rights work. Artificial Intelligence technologies and modern human rights have lived parallel lives for the last sixty years, and they continue to evolve with one another as both fields take shape. Human Rights and Artificial Intelligence explores the effects of AI on both the concept of human rights and on specific topics, including civil and political rights, privacy, non-discrimination, fair procedure, and asylum. Second- and third-generation human rights are also addressed. By mapping this relationship, the book clarifies the benefits and risks for human rights as new AI applications are designed and deployed. Its granular perspective makes Human Rights and Artificial Intelligence a seminal text on the legal ramifications of machine learning. This expansive volume will be useful to academics and professionals navigating the complex relationship between AI and human rights.