Privacy in Context


Book Description

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.




Privacy in the Modern Age


Book Description

The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don't simply describe these problems or warn about the loss of privacy—they propose solutions. They look closely at business practices, public policy, and technology design, and ask, “Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: “What one creates with his hand, he should control with his head.” It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there's a problem—let's find a solution.




Comparative Defamation and Privacy Law


Book Description

Leading experts from common law jurisdictions examine defamation and privacy, two major and interrelated issues for law and media.




Privacy and Publicity


Book Description

Through a series of close readings of two major figures of the modern movement, Adolf Loos and Le Corbusier, Beatriz Colomina argues that architecture only becomes modern in its engagement with the mass media, and that in so doing it radically displaces the traditional sense of space and subjectivity. Privacy and Publicity boldly questions certain ideological assumptions underlying the received view of modern architecture and reconsiders the methodology of architectural criticism itself. Where conventional criticism portrays modern architecture as a high artistic practice in opposition to mass culture, Colomina sees the emerging systems of communication that have come to define twentieth-century culture—the mass media—as the true site within which modern architecture was produced. She considers architectural discourse as the intersection of a number of systems of representation such as drawings, models, photographs, books, films, and advertisements. This does not mean abandoning the architectural object, the building, but rather looking at it in a different way. The building is understood here in the same way as all the media that frame it, as a mechanism of representation in its own right. With modernity, the site of architectural production literally moved from the street into photographs, films, publications, and exhibitions—a displacement that presupposes a new sense of space, one defined by images rather than walls. This age of publicity corresponds to a transformation in the status of the private, Colomina argues; modernity is actually the publicity of the private. Modern architecture renegotiates the traditional relationship between public and private in a way that profoundly alters the experience of space. In a fascinating intellectual journey, Colomina tracks this shift through the modern incarnations of the archive, the city, fashion, war, sexuality, advertising, the window, and the museum, finally concentrating on the domestic interior that constructs the modern subject it appears merely to house.




Privacy Is Hard and Seven Other Myths


Book Description

An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.




Journalism and the Nsa Revelations


Book Description

Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.




Technology and Privacy


Book Description

Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging. Significant changes include large increases in communications bandwidths; the widespread adoption of computer networking and public-key cryptography; new digital media that support a wide range of social relationships; a massive body of practical experience in the development and application of data-protection laws; and the rapid globalization of manufacturing, culture, and policy making. The essays in this book provide a new conceptual framework for the analysis and debate of privacy policy and for the design and development of information systems.




Privacy at Risk


Book Description

Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e-mail logs, and sometimes even our medical histories can be readily accessed by law enforcement officials. As Christopher Slobogin explains in Privacy at Risk, these intrusive acts of surveillance are subject to very little regulation. Applying the Fourth Amendment’s prohibition on unreasonable searches and seizures, Slobogin argues that courts should prod legislatures into enacting more meaningful protection against government overreaching. In setting forth a comprehensive framework meant to preserve rights guaranteed by the Constitution without compromising the government’s ability to investigate criminal acts, Slobogin offers a balanced regulatory regime that should intrigue everyone concerned about privacy rights in the digital age.




Privacy on the Ground


Book Description

An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations. Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on the ground” in changing corporate (or government) behavior—until now. This intensive five-nation study goes inside corporations to examine how the people charged with protecting privacy actually do their work, and what kinds of regulation effectively shape their behavior. And the research yields a surprising result. The countries with more ambiguous regulation—Germany and the United States—had the strongest corporate privacy management practices, despite very different cultural and legal environments. The more rule-bound countries—like France and Spain—trended instead toward compliance processes, not embedded privacy practices. At a crucial time, when Big Data and the Internet of Things are snowballing, Privacy on the Ground helpfully searches out the best practices by corporations, provides guidance to policymakers, and offers important lessons for everyone concerned with privacy, now and in the future.




The Poverty of Privacy Rights


Book Description

The Poverty of Privacy Rights makes a simple, controversial argument: Poor mothers in America have been deprived of the right to privacy. The U.S. Constitution is supposed to bestow rights equally. Yet the poor are subject to invasions of privacy that can be perceived as gross demonstrations of governmental power without limits. Courts have routinely upheld the constitutionality of privacy invasions on the poor, and legal scholars typically understand marginalized populations to have "weak versions" of the privacy rights everyone else enjoys. Khiara M. Bridges investigates poor mothers' experiences with the state—both when they receive public assistance and when they do not. Presenting a holistic view of just how the state intervenes in all facets of poor mothers' privacy, Bridges shows how the Constitution has not been interpreted to bestow these women with family, informational, and reproductive privacy rights. Bridges seeks to turn popular thinking on its head: Poor mothers' lack of privacy is not a function of their reliance on government assistance—rather it is a function of their not bearing any privacy rights in the first place. Until we disrupt the cultural narratives that equate poverty with immorality, poor mothers will continue to be denied this right.