Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy. This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances. TOC:Part I. Introductory Issues in Privacy and Technology.- The Digital Person and the Future of Privacy.- Privacy and Rationality: A Survey.- Social Norms, Self Control, and Privacy in the Online World.- Part II. Privacy Implications of RFID and Location Tracking.- RFID Privacy: A Technical Primer for the Non-Technical Reader.- Geolocation and Locational Privacy: The "Inside" Story on Geospatial Tracking.- Privacy Inalienability and Personal Data Chips.- Part III. Privacy Implications Biometric Technologies.- Biometrics: Overview and Applications.- Biometrics: Applications, Challenges and the Future.- Constructing Policy: The Unsettled Questions of Biometric Technology and Privacy.- Finding Waldo: Face Recognition Software and Concerns Regarding Anonymity and Public Political Speech.- Part IV. Privacy Implications of Data Mining and Targeted Marketing.- Data Mining and Privacy: An Overview.- Online Privacy, Tailoring and Persuasion.- Data Mining and Attention Consumption.- Is Privacy Regulation the Environmental Law of the Information Age? -Document Sanitization in the Age of Data Mining.- Part V. Implications of Technology for Anonymity and Identification.- Nymity, P2P and ISPs.- Fourth Amendment Limits on National Identity Cards.- Privacy Issues in an Electronic Voting Machine.- Hidden Web Privacy Preservation Surfing (Hi-WePPS) Model.- Global Disclosure Risk for Microdata with Continuous Attributes.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.