Privacy in Context

Author: Helen Nissenbaum
Publisher: Stanford University Press
ISBN: 9780804772891
Release Date: 2009-11-24
Genre: Law

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Privacy in the Modern Age

Author: Marc Rotenberg
Publisher: New Press, The
ISBN: 9781620971086
Release Date: 2015-05-12
Genre: Law

The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don’t simply describe these problems or warn about the loss of privacy—they propose solutions. They look closely at business practices, public policy, and technology design, and ask, “Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: “What one creates with his hand, he should control with his head.” It’s a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there’s a problem—let’s find a solution.

International Conference on Security and Privacy in Communication Networks

Author: Jin Tian
Publisher: Springer
ISBN: 9783319238029
Release Date: 2015-12-01
Genre: Computers

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

Privacy in Location Based Applications

Author: Claudio Bettini
Publisher: Springer Science & Business Media
ISBN: 9783642035111
Release Date: 2009-07-30
Genre: Computers

Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioning, enabling the birth of a new generation of information services. Although data security and privacy issues have been extensively investigated in several domains, current techniques are not readily applicable to location-based applications. Conciliating the effectiveness of these applications with privacy concerns constitutes a unique challenge, mostly due to the semantic richness of location and time information. Research in this field involves aspects of spatio-temporal reasoning, query processing, system security, statistical inference, and more importantly, anonymization techniques. Several research groups have been working in recent years to identify privacy attacks and defense techniques in this domain. This state-of-the-art survey provides a solid ground for researchers approaching this topic to understand current achievements through a common categorization of privacy threats and defense techniques. This objective is particularly challenging considering the specific (and often implicit) assumptions that characterize the recent literature on privacy in location-based services. The book also illustrates the many facets that make the study of this topic a particularly interesting research subject, including topics that go beyond privacy preserving transformations of service requests, and include access control, privacy preserving publishing of moving object data, privacy in the use of specific positioning technology, and privacy in vehicular network applications.

Privacy in Public Space

Author: Tjerk Timan
Publisher: Edward Elgar Publishing
ISBN: 9781786435408
Release Date: 2017-11-24
Genre:

This book examines privacy in public space from both legal and regulatory perspectives. With on-going technological innovations such as mobile cameras, WiFi tracking, drones and augmented reality, aspects of citizens’ lives are increasingly vulnerable to intrusion. The contributions describe contemporary challenges to achieving privacy and anonymity in physical public space, at a time when legal protection remains limited compared to ‘private’ space. To address this problem, the book clearly shows why privacy in public space needs defending. Different ways of conceptualizing and shaping such protection are explored, for example through ‘privacy bubbles’, obfuscation and surveillance transparency, as well as revising the assumptions underlying current privacy laws.

Security and Privacy in Mobile Information and Communication Systems

Author: Ramjee Prasad
Publisher: Springer
ISBN: 9783642302442
Release Date: 2012-04-29
Genre: Computers

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization.

Engaging Privacy and Information Technology in a Digital Age

Author: National Research Council
Publisher: National Academies Press
ISBN: 9780309103923
Release Date: 2007-07-28
Genre: Computers

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.

Privacy in Telecommunications

Author: Blanca Rodríguez Ruiz
Publisher: Martinus Nijhoff Publishers
ISBN: 9041102744
Release Date: 1997-04-28
Genre: Political Science

As a Statutory Right.

Security and Privacy in the Age of Uncertainty

Author: Sabrina de Capitani di Vimercati
Publisher: Springer
ISBN: 9780387356914
Release Date: 2013-06-29
Genre: Computers

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

Aspects of Personal Privacy in Communications

Author: Geir M. Koien
Publisher: River Publishers
ISBN: 9788792982087
Release Date: 2013-07-01
Genre: Technology & Engineering

The modern society is rapidly becoming a fully digital society. This has many benefits, but unfortunately it also means that personal privacy is threatened. The threat does not so much come from a 1984 style Big Brother, but rather from a set of smaller big brothers. The small big brothers are companies that we interact with; they are public services and institutions. Many of these little big brothers are indeed also being invited to our private data by ourselves. Privacy as a subject can be problematic. At the extreme it is personal freedom against safety and security. We shall not take a political stand on personal privacy and what level of personal freedom and privacy is the correct one. Aspects of Personal Privacy in Communications is mostly about understanding what privacy is and some of the technologies may help us to regain a bit of privacy. We discuss what privacy is about, what the different aspects of privacy may be and why privacy needs to be there by default. There are boundaries between personal privacy and societal requirements, and inevitably society will set limits to our privacy (Lawful Interception, etc.). There are technologies that are specifically designed to help us regain some digital privacy. These are commonly known as Privacy Enhancing Technologies (PETs). We investigate some these PETs including MIX networks, Onion Routing and various privacy-preserving methods. Other aspects include identity and location privacy in cellular systems, privacy in RFID, Internet-of-Things (IoT) and sensor networks amongst others. Some aspects of cloud systems are also covered. Content: Getting a Grip on Privacy The Legal Context of Privacy Anonymous Communications Secure Multi-party Computations and Privacy Privacy and Data Mining in Telecommunications Requirements for Cellular System Subscriber Privacy The 3GPP Systems and Subscriber Privacy Future Cellular Systems and Enhanced Subscriber Privacy Sensor Networks Radio Frequency Identification Privacy and Trust for the Internet-of-Things Privacy in the Cloud Summary and Concluding Remarks

Mobile and Ubiquitous Systems Computing Networking and Services

Author: Kan Zheng
Publisher: Springer
ISBN: 9783642402388
Release Date: 2013-08-15
Genre: Computers

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.

Digital Whoness

Author: Rafael Capurro
Publisher: Walter de Gruyter
ISBN: 9783110320428
Release Date: 2013-05-02
Genre: Philosophy

The first aim is to provide well-articulated concepts by thinking through elementary phenomena of today’s world, focusing on privacy and the digital, to clarify who we are in the cyberworld — hence a phenomenology of digital whoness. The second aim is to engage critically, hermeneutically with older and current literature on privacy, including in today’s emerging cyberworld. Phenomenological results include concepts of i) self-identity through interplay with the world, ii) personal privacy in contradistinction to the privacy of private property, iii) the cyberworld as an artificial, digital dimension in order to discuss iv) what freedom in the cyberworld can mean, whilst not neglecting v) intercultural aspects and vi) the EU context.

Security and Privacy in Mobile Information and Communication Systems

Author: Andreas U. Schmidt
Publisher: Springer
ISBN: 9783642333927
Release Date: 2012-08-20
Genre: Computers

This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications.

Privacy A Very Short Introduction

Author: Raymond Wacks
Publisher: OUP Oxford
ISBN: 9780191038808
Release Date: 2015-03-26
Genre: Political Science

Some would argue that scarcely a day passes without a new assault on our privacy. In the wake of the whistle-blower Edward Snowden's revelations about the extent of surveillance conducted by the security services in the United States, Britain, and elsewhere, concerns about individual privacy have significantly increased. The Internet generates risks, unimagined even twenty years ago, to the security and integrity of information in all its forms. The manner in which information is collected, stored, exchanged, and used has changed forever; and with it, the character of the threats to individual privacy. The scale of accessible private data generated by the phenomenal growth of blogs, social media, and other contrivances of our information age pose disturbing threats to our privacy. And the hunger for gossip continues to fuel sensationalist media that frequently degrade the notion of a private domain to which we reasonably lay claim. In the new edition of this Very Short Introduction, Raymond Wacks looks at all aspects of privacy to include numerous recent changes, and considers how this fundamental value might be reconciled with competing interests such as security and freedom of expression. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.

Protecting Individual Privacy in the Struggle Against Terrorists

Author: National Research Council
Publisher: National Academies Press
ISBN: 0309134447
Release Date: 2008-09-26
Genre: Computers

All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.