Security and Privacy Volume III * The Library of essays on Law and privacy
During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to
explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly
in a climate of growing public mistrust of State surveillance activities and business predisposition to monetize information relating to the online activities of users. This volume is informed by
the range of discussions currently conducted at scholarly and policy levels. The essays illustrate the value of viewing privacy concerns not only in terms of the means by which information is
communicated but also in terms of the political processes that are inevitably engaged and the institutional, regulatory and cultural contexts within which meanings regarding identity and security are constituted.
INDEX
Introduction.
Part I
Identity, Security and Privacy in Context
Designing for trust, L. Jean Camp
The digital persona and its application to data surveillance, Roger Clarke
Privacy, visibility, transparency, and exposure, Julie E. Cohen
Exploring identity and identification in cyberspace, Oscar H. Gandy, Jr
A contextual approach to privacy online, Helen Nissenbaum.
Part II
Surveillance, Security and Anonymity
Hacking the Panopticon: distributed online surveillance and resistance, Benoît Dupont;
The surveillant assemblage, Kevin D. Haggerty and Richard V. Ericson;
‘Sousveillance’: inverse surveillance in multimedia imaging, Steve Mann;
Surveillance as cultural practice, Torin Monahan;
Surveillance and security: a dodgy relationship, Walter Peissl; Counter-surveillance as political intervention?, Torin Monahan;
Resistance against cyber-surveillance within social movements and how surveillance adapts, Oliver Leistert;
Privacy, surveillance, and law, Richard A. Posner;
Squaring the circle of smart surveillance and privacy, Joseph A. Cannataci.
Part III Privacy,
Data Protection and Security
Data protection pursuant to the right to privacy in human rights treaties, Lee A. Bygrave;
Consumer culture and the commodification of policing and security, Ian Loader;
Information technology and dataveillance, Roger A. Clarke;
Public assessment of new surveillance-oriented security technologies: beyond the trade-off between privacy and security, Vincenzo Pavone and Sara Degli Esposti;
European protectionism in cloud computing: addressing concerns over the PATRIOT Act, John T.
Billings;
Internet intermediaries, cloud computing and geospatial data: how competition and privacy converge in the mobile environment, Lisa Madelon Campbell;
Stolen identities, Jennifer Whitson and Kevin D. Haggerty.
Part IV
Smart Technologies, Social Control and Human Rights
The body as data? Biobank regulation via the ’back door’ of data protection law, Lee A. Bygrave;
CCTV policy
AUTOR: JOSEPH SAVIRIMUTHU