Privacy in Context

Privacy in Context
Author: Helen Nissenbaum
Publisher: Stanford University Press
Total Pages: 304
Release: 2009-11-24
Genre: Law
ISBN: 0804772894

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Age of Context

Age of Context
Author: Robert Scoble
Publisher: Createspace Independent Pub
Total Pages: 225
Release: 2014
Genre: Business & Economics
ISBN: 9781492348436

In 2006, co-authors Robert Scoble and Shel Israel wrote Naked Conversations, a book that persuaded businesses to embrace what we now call social media. Six years later they have teamed up again to report that social media is but one of five converging forces that promise to change virtually every aspect of our lives. You know these other forces already: mobile, data, sensors and location-based technology. Combined with social media they form a new generation of personalized technology that knows us better than our closest friends. Armed with that knowledge our personal devices can anticipate what we'll need next and serve us better than a butler or an executive assistant. The resulting convergent superforce is so powerful that it is ushering in a era the authors call the Age of Context. In this new era, our devices know when to wake us up early because it snowed last night; they contact the people we are supposed to meet with to warn them we're running late. They even find content worth watching on television. They also promise to cure cancer and make it harder for terrorists to do their damage. Astoundingly, in the coming age you may only receive ads you want to see. Scoble and Israel have spent more than a year researching this book. They report what they have learned from interviewing more than a hundred pioneers of the new technology and by examining hundreds of contextual products. What does it all mean? How will it change society in the future? The authors are unabashed tech enthusiasts, but as they write, an elephant sits in the living room of our book and it is called privacy. We are entering a time when our technology serves us best because it watches us; collecting data on what we do, who we speak with, what we look at. There is no doubt about it: Big Data is watching you. The time to lament the loss of privacy is over. The authors argue that the time is right to demand options that enable people to reclaim some portions of that privacy.

Cellular Convergence and the Death of Privacy

Cellular Convergence and the Death of Privacy
Author: Professor Stephen B. Wicker
Publisher: Oxford University Press
Total Pages: 200
Release: 2013-08-21
Genre: Law
ISBN: 0199968365

Cellular technology has always been a surveillance technology, but "cellular convergence" - the growing trend for all forms of communication to consolidate onto the cellular handset - has dramatically increased the impact of that surveillance. In Cellular Convergence and the Death of Privacy, Stephen Wicker explores this unprecedented threat to privacy from three distinct but overlapping perspectives: the technical, the legal, and the social. Professor Wicker first describes cellular technology and cellular surveillance using language accessible to non-specialists. He then examines current legislation and Supreme Court jurisprudence that form the framework for discussions about rights in the context of cellular surveillance. Lastly, he addresses the social impact of surveillance on individual users. The story he tells is one of a technology that is changing the face of politics and economics, but in ways that remain highly uncertain.

Context-Informed Perspectives of Child Risk and Protection in Israel

Context-Informed Perspectives of Child Risk and Protection in Israel
Author: Dorit Roer-Strier
Publisher: Springer Nature
Total Pages: 338
Release: 2020-07-24
Genre: Social Science
ISBN: 3030442780

This volume adopts a context-informed framework exploring risk, maltreatment, well-being and protection of children in diverse groups in Israel. It incorporates the findings of seven case studies conducted at the Hebrew University of Jerusalem's NEVET Greenhouse of Context-Informed Research and Training for Children in Need. Each case study applies a context-informed approach to the study of perspectives of risk and protection among parents, children and professionals from different communities in Israel, utilizing varied qualitative methodologies. The volume analyses the importance of studying children and parents's perspectives in diverse societies and stresses the need for a context-informed perspective in designing prevention and intervention programs for children at risk and their families living in diverse societies. It further explores potential contribution to theory, research, practice, policy and training in the area of child maltreatment.

Planet Google

Planet Google
Author: Randall Stross
Publisher: Simon and Schuster
Total Pages: 290
Release: 2009-09-22
Genre: Business & Economics
ISBN: 1416546960

Open and closed -- Unlimited capacity -- The algorithm -- Moon shot -- Gootube -- Small world, after all -- A personal matter -- Algorithm, meet humanity.

Big Data in Context

Big Data in Context
Author: Thomas Hoeren
Publisher: Springer
Total Pages: 122
Release: 2017-10-17
Genre: Law
ISBN: 331962461X

This book is open access under a CC BY 4.0 license. This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ’s Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking on the other. Addressing the interests of researchers and practitioners alike, it provides a comprehensive overview of and introduction to the emerging challenges regarding big data.All contributions are based on papers submitted in connection with ABIDA (Assessing Big Data), an interdisciplinary research project exploring the societal aspects of big data and funded by the German Federal Ministry of Education and Research.This volume was produced as a part of the ABIDA project (Assessing Big Data, 01IS15016A-F). ABIDA is a four-year collaborative project funded by the Federal Ministry of Education and Research. However the views and opinions expressed in this book reflect only the authors’ point of view and not necessarily those of all members of the ABIDA project or the Federal Ministry of Education and Research.

Privacy as Trust

Privacy as Trust
Author: Ari Ezra Waldman
Publisher:
Total Pages: 219
Release: 2018-03-29
Genre: Computers
ISBN: 1107186005

Proposes a new way of thinking about information privacy that leverages law to protect disclosures in contexts of trust.

Trusted Computing Platforms

Trusted Computing Platforms
Author: Siani Pearson
Publisher: Prentice Hall Professional
Total Pages: 358
Release: 2003
Genre: Computers
ISBN: 9780130092205

The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike.

Privacy Online

Privacy Online
Author: Sabine Trepte
Publisher: Springer Science & Business Media
Total Pages: 267
Release: 2011-07-21
Genre: Computers
ISBN: 3642215211

Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users’ virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users’ concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.