Record ID | marc_columbia/Columbia-extract-20221130-020.mrc:19554821:5568 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-020.mrc:19554821:5568?format=raw |
LEADER: 05568cam a22004574a 4500
001 9571688
005 20120919173414.0
008 080929s2009 enka b 001 0 eng
010 $a 2008043016
015 $aGBA922424$2bnb
016 7 $a014920553$2Uk
020 $a9780195372472 ((hardback) : alk. paper)
020 $a0195372476 ((hardback) : alk. paper)
035 $a(OCoLC)ocn236333219
035 $a(NNC)9571688
040 $aDLC$beng$cDLC$dBTCTA$dBAKER$dYDXCP$dC#P$dBWX$dCDX$dNLA$dUKM$dOCLCQ$dSEO$dGEBAY$dOCLCQ$dMIX
050 00 $aK3264.C65$bL47 2009
082 00 $a342.08/58$222
245 00 $aLessons from the identity trail :$banonymity, privacy, and identity in a networked society /$cedited by Ian Kerr, Valerie Steeves, and Carole Lucock.
260 $aOxford ;$aNew York :$bOxford University Press,$cc2009.
300 $axxxi, 554 p. :$bill. ;$c25 cm.
504 $aIncludes bibliographical references and index.
505 00 $tSoft surveillance, hard consent : the law and psychology of engineering consent /$rIan Kerr, Jennifer Barrigar, Jacquelyn Burkell, and Katie Black --$tApproaches to consent in Canadian data protection law /$rPhilippa Lawson and Mary O'Donoghue --$tLearning from data protection law at the nexus of copyright and privacy /$rAlex Cameron --$tA heuristics approach to understanding privacy-protecting behaviors in digital social environments /$rRobert Carey and Jacquelyn Burkell --$tUbiquitous computing and spatial privacy /$rAnne Uteck --$tCore privacy : a problem for predictive data mining /$rJason Millar --$tPrivacy versus national security : classifying the trade-off /$rJennifer Chandler --$tPrivacy's second home : building a new home for privacy under section 15 of the charter /$rDaphne Gilbert --$t"What have you done for me lately?" Reflections on redeeming privacy for battered women /$rJena McGill --$tGenetic technologies and medicine : privacy, identity, and informed consent /$rMarsha Hanen --$tReclaiming the social value of privacy /$rValerie Steeves --$tA conceptual analysis of identity /$rSteven Davis --$tIdentity : difference and categorization /$rCharles D. Raab --$tIdentity cards and identity romanticism /$rA. Michael Froomkin --$tWhat's in a name? Who benefits from the publication ban in sexual assault trials? /$rJane Doe --$tLife in a fish bowl : feminist interrogations of webcamming /$rJane Bailey --$tUbiquitous computing, spatiality, and the construction of identity : directions for policy response /$rDavid J. Phillips --$tDignity and selective self-presentation /$rDavid Matheson --$tThe Internet of people? Reflections on the future regulation of human-implantable radio frequency identification /$rIan Kerr --$tUsing biometrics to revisualize the Canada-U.S. border /$rShoshana Magnet --$tSoul train : the new surveillance in popular music /$rGary T. Marx --$tExit node repudiation for anonymity networks /$rJeremy Clark, Philippe Gauvin, and Carlisle Adams --$tTrackMeNot : resisting surveillance in web search /$rDaniel C. Howe and Helen Nissenbaum --$tAnonymity and the law in the United States /$rA. Michael Froomkin --$tAnonymity and the law in Canada /$rCarole Lucock and Katie Black --$tAnonymity and the law int he United Kingdom /$rIan Lloyd --$tAnonymity and the law in the Netherlands /$rSimone van der Hof, Bert-Jaap Koops, and Ronald Leenes --$tAnonymity and the law in Italy /$rGiusella Finocchiaro.
520 $aDuring the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes.
650 0 $aData protection$xLaw and legislation.
650 0 $aIdentity (Philosophical concept)
650 0 $aPrivacy, Right of.
650 0 $aComputer security$xLaw and legislation.
650 0 $aFreedom of information.
650 07 $aDatenschutz.$2swd
650 07 $aPrivatsphäre.$2swd
650 07 $aIdentität.$2swd
650 07 $aAnonymität.$2swd
650 07 $aComputersicherheit.$2swd
650 07 $aInternet.$2swd
700 1 $aKerr, Ian$q(Ian R.)
700 1 $aSteeves, Valerie M.,$d1959-
700 1 $aLucock, Carole.
776 08 $iOnline version:$tLessons from the identity trail.$dOxford ; New York : Oxford University Press, c2009$w(OCoLC)631891925
856 41 $3Table of contents only$uhttp://catdir.loc.gov/catdir/toc/fy1001/2008043016.html
852 00 $bleh$hK3264.C65$iL47 2009