This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude (“more of the same”) nor a revolutionary zeal (“never seen before”) is likely to lead to satisfactory solutions. Instead, more reflection and better conceptual design are needed, not least to harmonise different perspectives and legal frameworks internationally. The focus of the book is on how we may reconcile high levels of information security with robust degrees of informational privacy, also in connection with recent challenges presented by phenomena such as “big data” and security scandals, as well as new legislation initiatives, such as those concerning “the right to be forgotten” and the use of personal data in biomedical research. The book seeks to offer analyses and solutions of the new tensions, in order to build a fair, shareable and sustainable balance in this vital area of human interactions.
This book provides a detailed discussion of the theoretical and practical implications of the change driven by ICTs. Such a change is often much more profound than an emphasis on information technology and society can capture, for not only does it bring about ethical and policy vacuums that call for a new understanding of ethics, politics and law, but it also “re-ontologizes reality”, as propounded by Luciano Floridi’s philosophy and ethics of information. The informational turn is transforming our understanding of reality by challenging the conventional ways we have of thinking about our world and our identities in terms of stable and enduring structures and beliefs. The information age we inhabit brings to completion our self-understanding as informational systems that produce, process, and exchange information with other informational systems, in an environment that is itself made up of information. The present volume provides us with a better understanding of the normative nature and role of information, helping us to grasp the sense and extent to which informational resources serve as “constraining affordances” guiding our behaviours. It does so by delineating the background against which we build our beliefs about reality, make decisions, and behave, through our interactions with a multi-agent system that is increasingly dependent on ICTs. The book will be of interest to a vast audience, ranging from information technologists, ethicists, policy makers, social and legal scholars, and all those willing to embrace the following three tenets: we construct our world and ourselves informationally; by constructing our world and ourselves we thereby become aware of our limits; it is precisely these limits that make us become human beings.
Author: Mireille Hildebrandt
Publisher: Edward Elgar Publishing
Release Date: 2015-02-27
This timely book tells the story of the smart technologies that reconstruct our world, by provoking their most salient functionality: the prediction and preemption of our day-to-day activities, preferences, health and credit risks, criminal intent and
This book is a guide to computer security and attempts to create greater awareness about the growing dangers of cyber-hooliganism, cyber-crime, cyber-terrorism and cyber-war, inherent in the new opportunities for good and evil that have been opened up in information technology. It is written for the general reader.
Author: Olga Mironenko Enerstvedt
Release Date: 2017-09-18
This book sheds light on aviation security, considering both technologies and legal principles. It considers the protection of individuals in particular their rights to privacy and data protection and raises aspects of international law, human rights and data security, among other relevant topics. Technologies and practices which arise in this volume include body scanners, camera surveillance, biometrics, profiling, behaviour analysis, and the transfer of air passenger personal data from airlines to state authorities. Readers are invited to explore questions such as: What right to privacy and data protection do air passengers have? How can air passenger rights be safeguarded, whilst also dealing appropriately with security threats at airports and in airplanes? Chapters explore these dilemmas and examine approaches to aviation security which may be transferred to other areas of transport or management of public spaces, thus making the issues dealt with here of paramou nt importance to privacy and human rights more broadly. The work presented here reveals current processes and tendencies in aviation security, such as globalization, harmonization of regulation, modernization of existing data privacy regulation, mechanisms of self-regulation, the growing use of Privacy by Design, and improving passenger experience. This book makes an important contribution to the debate on what can be considered proportionate security, taking into account concerns of privacy and related human rights including the right to health, freedom of movement, equal treatment and non-discrimination, freedom of thought, conscience and religion, and the rights of the child. It will be of interest to graduates and researchers in areas of human rights, international law, data security and related areas of law or information science and technology. I think it will also be of interest to other categories (please see e.g. what the reviewers have written) "I think that the book would be of great appeal for airports managing bodies, regulators, Civil Aviation Authorities, Data Protection Authorities, air carriers, any kind of security companies, European Commission Transport Directorate, European Air Safety Agency (EASA), security equipment producers, security agencies like the US TSA, university researchers and teachers." "Lawyers (aviation, privacy and IT lawyers), security experts, aviation experts (security managers of airports, managers and officers from ANSPs and National Aviation Authorities), decision makers, policy makers (EASA, EUROCONTROL, EU commission)"
Information and communication technology occupies a central place in the modern world, with society becoming increasingly dependent on it every day. It is therefore unsurprising that it has become a growing subject area in contemporary philosophy, which relies heavily on informational concepts. The Routledge Handbook of Philosophy of Information is an outstanding reference source to the key topics and debates in this exciting subject and is the first collection of its kind. Comprising over thirty chapters by a team of international contributors the Handbook is divided into four parts: basic ideas quantitative and formal aspects natural and physical aspects human and semantic aspects. Within these sections central issues are examined, including probability, the logic of information, informational metaphysics, the philosophy of data and evidence, and the epistemic value of information. The Routledge Handbook of Philosophy of Information is essential reading for students and researchers in philosophy, computer science and communication studies.
The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the different approaches and methods that can be used to address them. In doing so, it will help the reader to gain a better grasp of the ethical and legal conundrums posed by group profiling. The volume first maps the current and emerging uses of new data technologies and clarifies the promises and dangers of group profiling in real life situations. It then balances this with an analysis of how far the current legal paradigm grants group rights to privacy and data protection, and discusses possible routes to addressing these problems. Finally, an afterword gathers the conclusions reached by the different authors and discuss future perspectives on regulating new data technologies.
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance. Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of ‘goal structured notation’ together with a ‘judgment calculus’ and their automation as a ‘rule set’ to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security
This volume focuses on the responsibilities of online service providers (OSPs) in contemporary societies. It examines the complexity and global dimensions of the rapidly evolving and serious challenges posed by the exponential development of Internet services and resources. It looks at the major actors – such as Facebook, Google, Twitter, and Yahoo! – and their significant influence on the informational environment and users’ interactions within it, as well as the responsibilities and liabilities such influence entails. It discusses the position of OSPs as information gatekeepers and how they have gone from offering connecting and information-sharing services to paying members to providing open, free infrastructure and applications that facilitate digital expression and the communication of information. The book seeks consensus on the principles that should shape OSPs’ responsibilities and practices, taking into account business ethics and policies. Finally, it discusses the rights of users and international regulations that are in place or currently lacking.
Author: Giovanni Ziccardi
Publisher: Springer Science & Business Media
Release Date: 2012-09-29
This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and “Twitter Revolutions”), and the hacking of political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes.
Author: Evan Selinger
Publisher: Cambridge University Press
Release Date: 2018-04-02
Businesses are rushing to collect personal data to fuel surging demand. Data enthusiasts claim personal information that's obtained from the commercial internet, including mobile platforms, social networks, cloud computing, and connected devices, will unlock path-breaking innovation, including advanced data security. By contrast, regulators and activists contend that corporate data practices too often disempower consumers by creating privacy harms and related problems. As the Internet of Things matures and facial recognition, predictive analytics, big data, and wearable tracking grow in power, scale, and scope, a controversial ecosystem will exacerbate the acrimony over commercial data capture and analysis. The only productive way forward is to get a grip on the key problems right now and change the conversation. That's exactly what Jules Polonetsky, Omer Tene, and Evan Selinger do. They bring together diverse views from leading academics, business leaders, and policymakers to discuss the opportunities and challenges of the new data economy.
Author: Radim Polčák
Publisher: Edward Elgar Publishing
Release Date: 2017
Data not only represent an integral part of the identity of a person, they also represent, together with other essentials, an integral part of the identity of a state. Keeping control over such data is equally important for both an individual and for a state to retain their sovereign existence. This thought-provoking book elaborates on the assumption that information privacy is, in its essence, comparable to information sovereignty. This seemingly rudimentary observation serves as the basis for an analysis of various information instruments in domestic and international law. Information Sovereignty combines a philosophical and methodological analysis of the phenomena of information, sovereignty and privacy. Providing insights into previously unexplored parallels between information privacy and information sovereignty, it examines cross-border discovery, cybersecurity and cyber-defence operations, and legal regimes for cross-border data transfers, encompassing practical discussions from a fresh perspective. In addition, it offers an accessible overview of complex theoretical matters in the domain of Internet legal theory and international law and, crucially, a method to resolve situations where informational domains of individuals and/or states collide. This pioneering state-of the-art assessment of information law and legal theory is a vital resource for students, academics, policy-makers and practitioners alike, seeking a guide to the phenomena of information, sovereignty and privacy.--
Author: John Kleinig
Publisher: ANU E Press
Release Date: 2011-12-01
Genre: Political Science
This study is principally concerned with the ethical dimensions of identity management technology - electronic surveillance, the mining of personal data, and profiling - in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study is to establish an acceptable and sustainable equilibrium between two central moral values in contemporary liberal democracies, namely, security and privacy. Both values are essential to individual liberty, but they come into conflict in times when civil order is threatened, as has been the case from late in the twentieth century, with the advent of global terrorism and trans-national crime. We seek to articulate legally sustainable, politically possible, and technologically feasible, global ethical standards for identity management technology and policies in liberal democracies in the contemporary global security context. Although the standards in question are to be understood as global ethical standards potentially to be adopted not only by the United States, but also by the European Union, India, Australasia, and other contemporary liberal democratic states, we take as our primary focus the tensions that have arisen between the United States and the European Union.
Author: Ian Brown
Publisher: MIT Press
Release Date: 2013-03-01
Internet use has become ubiquitous in the past two decades, but governments, legislators, and their regulatory agencies have struggled to keep up with the rapidly changing Internet technologies and uses. In this groundbreaking collaboration, regulatory lawyer Christopher Marsden and computer scientist Ian Brown analyze the regulatory shaping of "code" -- the technological environment of the Internet -- to achieve more economically efficient and socially just regulation. They examine five "hard cases" that illustrate the regulatory crisis: privacy and data protection; copyright and creativity incentives; censorship; social networks and user-generated content; and net neutrality. The authors describe the increasing "multistakeholderization" of Internet governance, in which user groups argue for representation in the closed business-government dialogue, seeking to bring in both rights-based and technologically expert perspectives. Brown and Marsden draw out lessons for better future regulation from the regulatory and interoperability failures illustrated by the five cases. They conclude that governments, users, and better functioning markets need a smarter "prosumer law" approach. Prosumer law would be designed to enhance the competitive production of public goods, including innovation, public safety, and fundamental democratic rights.
Author: Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals
Publisher: National Academies Press
Release Date: 2008-09-26
All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.