Journalism, Citizenship and Surveillance Society


Book Description

This book shows how surveillance society shapes and interacts with journalistic practices and discourses. It illustrates not only how surveillance debates play out in and through mediated discourses, but also how practices of surveillance inform the stories, everyday work and the ethics of journalists. The increasing entrenchment of data collection and surveillance in all kinds of social processes raises important questions around new threats to journalistic freedom and political dissent; the responsibilities of media organizations and state actors; the nature of journalists’ relationship to the state; journalists’ ability to protect their sources and data; and the ways in which media coverage shape public perceptions of surveillance, to mention just a few areas of concern. Against this backdrop, the contributions gathered in this book examine areas including media coverage of surveillance, encryption and privacy; journalists’ views on surveillance and security; public debate around the power of intelligence agencies, and the strategies of privacy rights activists. The book raises fundamental questions around the role of journalism in creating the conditions for digital citizenship. The chapters in this book were originally published in a special issue of the journal, Digital Journalism.




Privacy as Trust


Book Description

Proposes a new way of thinking about information privacy that leverages law to protect disclosures in contexts of trust.




Adcreep


Book Description

Advertising is everywhere. By some estimates, the average American is exposed to over 3,000 advertisements each day. Whether we realize it or not, "adcreep"—modern marketing's march to create a world where advertising can be expected anywhere and anytime—has come, transforming not just our purchasing decisions, but our relationships, our sense of self, and the way we navigate all spaces, public and private. Adcreep journeys through the curious and sometimes troubling world of modern advertising. Mark Bartholomew exposes an array of marketing techniques that might seem like the stuff of science fiction: neuromarketing, biometric scans, automated online spies, and facial recognition technology, all enlisted to study and stimulate consumer desire. This marriage of advertising and technology has consequences. Businesses wield rich and portable records of consumer preference, delivering advertising tailored to your own idiosyncratic thought processes. They mask their role by using social media to mobilize others, from celebrities to your own relatives, to convey their messages. Guerrilla marketers turn every space into a potential site for a commercial come-on or clandestine market research. Advertisers now know you on a deeper, more intimate level, dramatically tilting the historical balance of power between advertiser and audience. In this world of ubiquitous commercial appeals, consumers and policymakers are numbed to advertising's growing presence. Drawing on a variety of sources, including psychological experiments, marketing texts, communications theory, and historical examples, Bartholomew reveals the consequences of life in a world of non-stop selling. Adcreep mounts a damning critique of the modern American legal system's failure to stem the flow of invasive advertising into our homes, parks, schools, and digital lives.




Modern Socio-Technical Perspectives on Privacy


Book Description

This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.




Privacy Online


Book Description

Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users’ virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users’ concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.




Privacy and Identity Management for Life


Book Description

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.




The Paradox of Tar Heel Politics


Book Description

How can a state be represented by Jesse Helms and John Edwards at the same time? Journalist Rob Christensen answers that question and navigates a century of political history in North Carolina, one of the most politically vibrant and competitive southern states, where neither conservatives nor liberals, Democrats nor Republicans, have been able to rest easy. It is this climate of competition and challenge, Christensen argues, that enabled North Carolina to rise from poverty in the nineteenth century to become a leader in research, education, and banking in the twentieth. In this new paperback edition, Christensen provides updated coverage of recent changes in North Carolina's political landscape, including the scandals surrounding John Edwards and Mike Easley, the defeat of U.S. senator Elizabeth Dole, the election of the state's first woman governor, and voters' approval of an African American candidate for president. The book provides an overview of the run-up to the 2010 elections and explains how North Carolina has become, arguably, the most politically competitive state in the South.




The Algorithmic Foundations of Differential Privacy


Book Description

The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some powerful computational results, there are still fundamental limitations. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power -- certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. The monograph then turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams, is discussed. The Algorithmic Foundations of Differential Privacy is meant as a thorough introduction to the problems and techniques of differential privacy, and is an invaluable reference for anyone with an interest in the topic.




The Personalization Paradox


Book Description

According to Infosys, 86% of consumers surveyed indicated that personalized content has some impact on what they purchase and 25% said that personalization plays a large role in their purchases. And yet, looking at the data, two things stand out: Most companies say that personalizing the customer experience is a critical "must have," and they have the statistics to back it up. Very few companies believe they are delivering enough personalized content, or deliver it well. What's holding these companies back from their personalization goals? And how can you avoid the pitfalls and make personalization possible with your own enterprise content? In this book, global content strategy expert Val Swisher and senior content strategist Regina Lynn Preciado show you exactly what it takes to deliver personalized experiences at scale. You'll learn: Why personalized content is imperative to the enterprise Why so many companies fail to deliver - and how to avoid the pitfalls The five dimensions of content standardization How to bring people, technology, and process together The impact of big data and artificial intelligence The only way to deliver personalized content at scale is to automate the process at the point of delivery. And for that to work, you've got to change how you "do" content. The Personalization Paradox: Why Companies Fail (and How to Succeed) at Delivering Personalized Experiences at Scale shows you how.