Privacy in the modern age : the search for solutions / edited by Marc Rotenberg, Julia Horwitz, and Jeramie Scott.

"The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical record...

Full description

Bibliographic Details
Other Authors: Rotenberg, Marc
Scott, Jeramie
Horwitz, Julia
Language:English
Published: New York : The New Press, 2015.
Subjects:
Physical Description:xiv, 256 pages : illustrations ; 20 cm
Format: Book

MARC

LEADER 00000cam a2200000 i 4500
001 in00005455168
003 OCoLC
005 20220616115904.0
008 141031t20152015nyua b 001 0 eng
010 |a  2014043176 
020 |z 9781620971086 (e-book) 
020 |a 9781620971079  |q hardcover 
020 |a 1620971070  |q hardcover 
035 |a (CaEvSKY)sky274319579 
035 |a (OCoLC)891126741 
040 |a DLC  |b eng  |e rda  |c DLC  |d YDX  |d BTCTA  |d YDXCP  |d BDX  |d OCLCF  |d UOK  |d APL  |d SKYRV  |d UtOrBLW 
042 |a pcc 
043 |a n-us--- 
049 |a EEMR 
050 0 0 |a JC596.2.U5  |b P77 2015 
082 0 0 |a 323.44/80973  |2 23 
245 0 0 |a Privacy in the modern age :  |b the search for solutions /  |c edited by Marc Rotenberg, Julia Horwitz, and Jeramie Scott. 
264 1 |a New York :  |b The New Press,  |c 2015. 
264 4 |c ©2015 
300 |a xiv, 256 pages :  |b illustrations ;  |c 20 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
505 0 0 |t Epic: the first twenty years /  |r Marc Rotenberg --  |t Privacy and the imperative of open government /  |r Sten Aftergood --  |t What goes around come around /  |r Ross Anderson --  |t New models of privacy for the university /  |r Christine L. Borgman (coauthored with Kent Wada and James F. Davis) --  |t Robot-sized gaps in surveillance law /  |r Ryan Calo --  |t Protecting sexual privacy in the information age /  |r Danielle Citron --  |t Privacy oppurtunities and challenges with Europe's new data protection regine /  |r Simon Davies --  |t Pseudonyms by another name: identity management in a time of surveillance /  |r A. Michael Froomkin --  |t Taking the long way home: the human right of privacy /  |r Deborah Hurley --  |t Accountability unchained: bulk data retention, preemtive surveillance, and transantlantic data protection /  |r Kristina Irion --  |t The surveillance society and transparent you /  |r Jeff Jonas --  |t Anonymity and reason /  |r Harry Lewis --  |t Cryptography is the future /  |r Anna Lysyanskaya --  |t Coming to terms and avoiding information techno-fallacies /  |r Gary T. Marx --  |t When self-help helps: user adoption of privacy technologies /  |r Aleecia M. McDonald --  |t Protecting data privacy in education /  |r Dr. Pablo G. Molina --  |t How might system and network security interact with privacy? /  |r Peter G. Neumann --  |t "Respect for context": fulfilling the promise of the white house report /  |r Helen Nissenbaum --  |t Privacy, autonomy, and internet platforms /  |r Frank Pasquale --  |t The future of health privacy /  |r Dr. Deborah Peel, MD --  |t Anonymity and free speech: Can Icann implement ononymous domain name registration? /  |r Stephanie E. Perrin --  |t Protecting privacy through copyright law? /  |r Pamela Samuelson --  |t Fear and convenience /  |r Bruce Schneier --  |t Envisioning privacy in the world of big data /  |r Christopher Wolf --  |t Epilogue: the Madrid privacy declaration- "global privacy standards for a global world". 
504 |a Includes bibliographical references and index. 
520 |a "The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don't simply describe these problems or warn about the loss of privacy-they propose solutions. They look closely at business practices, public policy, and technology design, and ask, "Should this continue? Is there a better approach?" They take seriously the dictum of Thomas Edison: "What one creates with his hand, he should control with his head." It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there's a problem--let's find a solution."--  |c Provided by publisher. 
650 0 |a Privacy, Right of  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2008108965 
650 7 |a LAW / Privacy.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE / Political Freedom & Security / International Security.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE / Political Freedom & Security / Intelligence.  |2 bisacsh 
700 1 |a Rotenberg, Marc.  |0 http://id.loc.gov/authorities/names/n97019669 
700 1 |a Scott, Jeramie.  |0 http://id.loc.gov/authorities/names/n2014068240 
700 1 |a Horwitz, Julia.  |0 http://id.loc.gov/authorities/names/n2014068241 
907 |y .b108678647  |b 210208  |c 150604 
998 |a mn  |b 150615  |c m  |d a   |e -  |f eng  |g nyu  |h 0  |i 2 
999 f f |i 271a3230-6df4-5a3e-b0fd-4d67ce4dc03e  |s cea33f8b-1bd1-51c3-a522-caa80a99e74e  |t 0 
952 f f |p Can Circulate  |a Michigan State University-Library of Michigan  |b Michigan State University  |c MSU Main Library  |d MSU Main Library  |t 0  |e JC596.2.U5 P77 2015  |h Library of Congress classification  |i Printed Material  |m 31293034689665  |n 1