Nadzor in zasebnost v informacijski družbi: informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | Slovenian |
Veröffentlicht: |
Ljubljana
Fak. za Družbene Vede
2006
|
Schriftenreihe: | Znanstvena knjižnica / Fakulteta za Družbene Vede
55 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Abstract |
Beschreibung: | Zsfassung in engl. Sprache |
Beschreibung: | 268 S. |
ISBN: | 9612352429 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035308166 | ||
003 | DE-604 | ||
005 | 20090929 | ||
007 | t | ||
008 | 090212s2006 |||| 00||| slv d | ||
020 | |a 9612352429 |9 961-235-242-9 | ||
035 | |a (OCoLC)643065216 | ||
035 | |a (DE-599)BVBBV035308166 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a slv | |
049 | |a DE-12 | ||
084 | |a 7,41 |2 ssgn | ||
100 | 1 | |a Kovačič, Matej |e Verfasser |4 aut | |
245 | 1 | 0 | |a Nadzor in zasebnost v informacijski družbi |b informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu |c Matej Kovačič |
264 | 1 | |a Ljubljana |b Fak. za Družbene Vede |c 2006 | |
300 | |a 268 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Znanstvena knjižnica / Fakulteta za Družbene Vede |v 55 | |
500 | |a Zsfassung in engl. Sprache | ||
650 | 0 | 7 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kontrolle |0 (DE-588)4032312-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Kontrolle |0 (DE-588)4032312-2 |D s |
689 | 0 | |5 DE-604 | |
810 | 2 | |a Fakulteta za Družbene Vede |t Znanstvena knjižnica |v 55 |w (DE-604)BV012660430 |9 55 | |
856 | 4 | 2 | |m Digitalisierung BSBMuenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017112942&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017112942&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
940 | 1 | |n oe | |
999 | |a oai:aleph.bib-bvb.de:BVB01-017112942 |
Datensatz im Suchindex
_version_ | 1804138611326582784 |
---|---|
adam_text | KAZALO
KAZALO
............................................................................................................................................3
PREDGOVOR
....................................................................................................................................7
ZASEBNOST
...................................................................................................................................11
Nastanek sodobne zasebnosti: od polja prisile do polja
svobodě
...........................................13
Oženje zasebne sfere: nastanek socialnega
...............................................................................15
Zasebnostv množični družbi
.....................................................................................................16
Oženje zasebne sfere
kot
način politizacije
konfliktov
............................................................18
Pomen zasebne sfere
...................................................................................................................19
NADZOROVANJE
..........................................................................................................................22
Panoptikon
....................................................................................................................................22
Panoptikon
in
disciplinarna oblast
.............................................................................................24
Biopolitika: od oblasti, ki je usmrtila, do oblasti, ki omogoča življenje
..................................25
Družba nadzora
............................................................................................................................27
Tehnologija nadzorovanja
............................................................................................................28
Nadzor državljana
in
nadzor potrošnika
....................................................................................31
Ambivalentnost nadzora: nadzor oblasti
...................................................................................33
Možnosti
osvoboditve
v
družbi nadzora?
...................................................................................35
PRAVICA DO ZASEBNOSTI
........................................................................................................37
Izvor pravice do zasebnosti
.........................................................................................................38
Problem definicije pravice do zasebnosti
...................................................................................39
Pravica do zasebnosti
in
svoboda
ter
avtonomija
......................................................................41
Medosebni vidik pravice do zasebnosti
......................................................................................42
Pravica do zasebnosti
in
pravica do umika
v samoto
ter
nadzor nad publiciteto
..................43
Pravica do zasebnosti
in
meje tajnosti podatkov
.......................................................................44
Dimenzije pravice do zasebnosti
................................................................................................45
Vpliv tehnoloških sprememb na razvoj pravice do zasebnosti
.................................................46
Vpliv družbenih sprememb na razvoj pravice do zasebnosti
...................................................48
Razvojni temelji pravice do zasebnosti
......................................................................................49
Koncipiranje pravice do zasebnosti
v ZDA kot lastninske
pravice
..........................................50
Načelo upravičenega pričakovanja zasebnosti
...........................................................................52
Pravica do zasebnosti
v ZDA......................................................................................................
55
Ustavni temelji pravice do zasebnosti
v ZDA.....................................................................................
55
Pravica do zasebnosti
v ZDA
na delovnem
mestu
............................................................................58
Varstvo informacijske zasebnosti
v ZDA v
zasebnem sektorju
........................................................62
Obdelava
in
izmenjava osebnih podatkov
v ZDA
-
nove grožnje zasebnosti
...............................67
Pravica do zasebnosti
v
Evropi
..................................................
,y
..............................................71
Varstvo informacijske zasebnosti
v
Evropi
..........................................................................................74
Vpliv
direktiv
EU na varstvo informacijske zasebnosti
v
Evropi
.....................................................78
Iznos osebnih podatkov iz Evropske unije
v ZDA
.............................................................................79
Komunikacijska
zasebnost
v
Evropi
...........................................................................................81
Zasebnost
na delovnem
mestu
....................................................................................................85
Boj
za pravico do zasebnosti
...........................................................
,
...........................................88
KRIPTOGRAFIJA
IN
GIBANJE ZA ELEKTRONSKO ZASEBNOST
..................................91
Kriptografija
..................................................................................................................................91
Nastanek javno dostopne kriptografije
......................................................................................93
Pomen kriptografije
......................................................................................................................95
Vojna ameriške vlade proti kriptografiji
in
elektronski zasebnosti
..........................................97
DES
..........................................................................................................................................................97
Omejevanje
svobodě
govora
..................................................................................................................99
Finanční
pritiski
na raziskovalce
......................................................................................................100
Omejevanje patentiranju
....................................................................................................................102
Omejevanje izvoza kriptografskih izdelkov
.....................................................................................102
Vsiljevanje kriptografskih
štandardov
in
sistem depozita šifrirnih ključev
................................104
Mednarodni poskusi omejevanja kriptografije
........................................................................107
Wassenaarski
sporazum
.....................................................................................................................108
Kriptografske
smernice
OECD
..........................................................................................................109
Svet Evrope
...........................................................................................................................................109
Vrnitev k
izvoru problema: zagotavljanje
možnosti za
nadzorovanje
....................................110
Operacija
Root Canal in
vgrajevanje stranskih vrat
...................................................................110
Carnivore
...............................................................................................................................................115
Izogibanje kriptografski zaščiti
..........................................................................................................121
Primer
Scarfo
........................................................................................................................................124
Kleptograflja
in primer Crypto
AG
...................................................................................................125
Strah pred kriptoanarhijo
..........................................................................................................129
Odgovori na kritike
in
gibanje
cypherpunk
.............................................................................131
Kriptografija na tehtnici
............................................................................................................136
PROBLEM ZASEBNOSTI NA INTERNETU
..........................................................................138
Tehnologija osvobaja...?
.............................................................................................................138
...ali pa je panoptičnost že vgrajena
v
internet?
.......................................................................138
Hekerji: specifični akterji nadzora na intemetu
...............................................,......................140
Informacijska zasebnost na internetu
.......................................................................................143
Elektronske sledi
..................................................................................................................................143
Datoteke aktivnosti
..............................................................................................................................145
Elektronske sledi pri ponudniku intemetnih
storitev in
vsebin
....................................................146
Piškotki
..................................................................................................................................................148
Primer Google Toolbar ......................................................................................................................
152
Preprodaja osebnih podatkov,
oddają
zunanjim izvajakem
in primer Toysmart
.....................153
Javno
dostopni
podatki
in
imeniki elektronske pošte
....................................................................154
Zbirka
Whois
........................................................................................................................................156
Smetje(spam)
......................................................................................................................................158
Smetjein kiberkriminal
......................................................................................................................161
Spackers
.............................................................................................................................................162
Vdor
v
zasebnost
kot stranski účinek
kiberkrlminaìa
..................................................................163
Spyware in
(zakonita)prikrita omrežja.........................................................................................
165
Upravljanje dostopa
do
digitalnih
vsebin
(DKM · Digital
Rights
Management)......................168
Zaupanja
vredno računalništvo
( Trusted
Computing )................................................................169
Informacijska zasebnost
na internetu
in
država
.......................................................................171
Komunikacijska zasebnost na internetu
...................................................................................175
Začetki državnega nadzora elektronske pošte
................................................................................175
Primer
Enron
........................................................................................................................................176
Primer
GMail
ter
Združene države proti
Bradford
С.
Councilman
.............................................177
Prestrezanje podatkov po omrežju
.....................................................................................................182
Prestrezanje elektronske pošte
in
tehnologija za analizo vsebine sporočih SpamAssasin
........183
Prestrezanje prometa
v
brezžičnih omrežjih
.....................................................................................185
Prostorska zasebnost na internetu
............................................................................................188
Razvoj vdiralskih orodij
.............................................................................................................190
Od
vdora do kraje
podatkov
......................................................................................................193
Uporaba novih tehnologij za povećanje nadzora nad posamezniki: nadzor
interneta
v
Sloveniji
.......................................................................................................................................199
Smeri
nadzora
in
zasebnosti na internetu
v příhodnosti
........................................................206
SKLEP.............................................................................................................................................
209
VIRI IN
LITERATURA
................................................................................................................215
Viri
in
literatura
..........................................................................................................................215
Odločbe Evropskega sodišča za
človekove
pravice
.................................................................240
Odločbe ameriških sodišč
..........................................................................................................240
Mednarodni dokumenti
.............................................................................................................241
Direktive
in
dokumenti EU.
................................................................................................................241
Dokumenti Sveta Evrope
....................................................................................................................242
Dokumenti OECD
...............................................................................................................................243
Dokumenti OZN.
.................................................................................................................................243
Zakonodaja
..........................................................................................................................................244
Ameriška zakonodaja
.........................................................................................................................244
Zakonodaja republike Irske
..............................................................................................................245
Zakonodaja Velike Britanije
.............................................................................................................245
Slovenska zakonodaja
........................................................................................................................245
Ostali internetni viri (necitirani)
..............................................................................................246
STVARNO KAZALO
....................................................................................................................248
IMENSKO KAZALO
....................................................................................................................250
KAZALO PRAVNIH VIROV
.......................................................................................................254
KAZALO
SLIK
..............................................................................................................................257
KAZALO
TABEL
..........................................................................................................................257
KAZALO
GRAFOV
......................................................................................................................257
POVZETEK
....................................................................................................................................258
ABSTRACT
....................................................................................................................................261
258
POVZETEK
V
knjigi
Nadzor
in
zasebnost
v
informacijski družbi je obravnavan problem zasebnosti
in
nadzora na internetu
ter vpliva
tehnologije na spreminjanje meje med javnim
in
zasebnim.
Avtor na začetku raziskuje, kdaj je zasebnost sploh nastala
kot
družbena
kategorţja
in
kako se
je spreminjala skozi zgodovino.
Hannah
Arendt
namreč ugotavlja, da zasebnost
v
antiki ni bila
dojemana
kot
polje
svobodě,
temveč
kot
polje prisile. Vsebina pojma zasebnosti,
kot ga
poznamo
danes,
začne
nastajati sele
v
obdobju kapitalizma. Hkrati pa se začenja območje zasebnosti tuđi
ožiti. V
prvi fazi
se s
področja zasebnosti loči sfera socialnega, zasebno pa se
v končni
fazi
zoži na intimno, a
tja
skuša družba ravno tako posegati,
in
sicer
z
vplivom množičnih medjjev
ter
reklamnih sporočil.
Arendtova in Habermas
izpostavljata dva vidika zasebnega: osebni
prostor, torej prostor intime,
ter
prostor, ki omogoča interesno združevanje, torej delovanje
posameznikov. Zato zasebnost
danes
ni več nujno zlo , tako
kot
je bila
v
antiki, temveč je
postala vrednota,
predpogoj posameznikove svobodě
in
emancipacije.
V
nadaljevanju je obravnavana problematika nadzorovanja
s pomočjo
teorij Benthama,
Foucaulta ter
Deleuzeja. Podobno
kot
zasebnost tuđi nadzorovanje skozi zgodovino doživi
spremembe. Zamisel
о
nadzora
kot
sredstvu izvajanja moči nad posamezniki je prvi izpostavi
Bentham
s
svojo zamislijo
o zapora
Panoptikon. Zaradi njegovega miselnega preskoka
v
kaznovanju, preskoka od modela,
kije
zapornika izvrgel,
v
model, kjer je zapornik izpostavljen
oblasti, ki gleda,
Foucault
označuje Benthama
za enega
najpomembnejših inovatorjev na
področju tehnologije oblasti
(Foucault,
1991: 48).
Vendar
pa se nadzorovanje skozi zgodovino
spreminja,
saj
se poleg disciplinarne oblasti
začne
razvijati tuđi regulacijska.
Če
je disciplinarna
oblast usredotočena na posameznika, na njegovo dresuro , na podrejanje
in
discipliniranje,
se regulacijska oblast osredotoča na populacijo. Njen
namen
ni vplivati na konkretnega
posameznika, temveč uvesti regulacijske mehanizme za ohranjanje ravnotežja na globalni ravni,
in
identifikacija tveganja
ter
priložnosti.
Po Foucaultu in
Deleuzeju
obe
vrsti oblasti, disciplinarna
in
regulacijska,
v
družbi nadzora delujeta hkrati. Regulacija ne nadomesti discipline, temveč jo
nadgradi.
Nadzorovanje je mogoče
v
dveh smereh:
v
smeri
proti posamezniku ali
v
smeri
proti oblasti.
Zamisel
о
nadzoru oblasti je
v
leta
1791
objavljenem
delu
Of
Publicity
razvü Bentham.
Čeprav
je
bila prvotno usmerjena proti netransparentnosti oblasti, pa se pogosto uporablja
kot
argument
proti zasebnosti posameznikov. Prišlo je torej do zaobrnjenega načela
transparentnosti, saj
so
posamezniki, ki želijo zaščititi svojo zasebnost, pogosto soočeni
z
očitki
о
skrivanju
in s
tem
о
nemoralnosti. Biti
dober
državljan...
pomeni
biti merljiv
in
predvidljiv potrošnih
(Palmer,
2000:
92),
ugotavlja
Gareth Palmer.
Vnadaljevanju se
delo
posveča pravici do zasebnosti. Temeljni problem pravice do zasebnosti
je
v
tem, daje
zelo
slabo definirana; poleg tega pravica do zasebnosti pogosto
vstopa v
kolizijo
z drugimi
pravicami
in
interesi. Posledično se zastavlja tuđi vprašanje pod-
in nadrejenosti
posameznih pravio. Poleg vprašanja izvora pravice do zasebnosti
so
obravnavana tuđi vprašanja
povezanosti pravice do zasebnosti
z
nekaterimi
drugimi
koncepti (npr.
s
svobodo, avtononujo,
259
medčloveškimi vidiki pravice do zasebnosti itd.),
v
nadaljevanju pa tuđi vpliv družbenih
in
tehnoloških sprememb na njen razvoj.
Ob
tem
delo
primeijalno obravnava tuđi razvoj
in
obseg pravice od zasebnosti
v ZDA
in v
Evropi. Pri tem se pokaže, da ima ameriški sistem varstva pravice do zasebnosti
dve
temeljni
značilnosti, zaradi katerih je zasebnost posameznikov
v ZDA v
splošnem slabše
varovana
kot
v
Evropi.
Kljub
pomembnemu
príspevku,
ki
ga
ima
ameriški
pravni sistem za razvoj pravice do
zasebnosti (uveljavitev načela upravičenega pričakovanja zasebnosti leta
1967),
pa je
v ZDA
na nekaterih področjih še
vedno
opaziti lastninsko pojmovanje zasebnosti (npr. pri varstvu
informacijske zasebnosti
v
zasebnem sektorju
ter
pri varstvu zasebnosti na delovnem
mestu).
Poleg tega
v
ameriški ustavi zasebnost ni izrecno omenjena
in
ni
priznaná
kot
pozitivna pravica.
To hkrati
z dejstvom,
da prvi amandma
к
ameriški ustavi439 vsakomur zagotavlja
svobodo
govora, pomeni, da ameriški pravni sistem
že v
temelju postavlja omejitve posameznim zveznim
državám,
ki
želijo npr. regulirati obdelavo osebnih podatkov
v
zasebnem sektorju. Ta problem
je viđen zlasti
v
primera
US
West proti
FCC*0,
v
katerem
je prizivno sodišče
presodilo, da so
osebni podatki,
ki
jih
zbere
podjetje, vrsta
govora in
je zato uporaba potrošnikovih
podatkov
s
strani tretje stranke
v
poslovnih transakcijah poslovni govor,
kije
zaščiten
s
prvim amandmajem
(White,
2003:24).
V
četrtem
delu
je obravnavan razvoj kriptografije
kot
tehnologije za zaščito zasebnosti.
Kriptografija, ki je sicer znana že skoraj
4000
let, se je
v
preteklosti večinoma uporabljala
v
vojaške
in
diplomatske namene. Nastanek javno dostopne kriptografije
v
60.
letih
20.
stoletja
pa je uporabo kriptografije
vsaj načeloma
omogočil vsakomur. Zaradi
tega so
skušale države
-
vodimo vlogo pri tem
so
imele
ZDA
-
raziskovanje, razvoj
in
uporabo kriptografije sistematično
omejevati.
To so
skušale doseči tako
s
pośrednimi kot
tuđi neposrednimi pritiski na raziskovalce,
s
sodelovanjem tajne službe National
Security Agency
pri razvoju
in
prilagajanju kriptografskui
rešitev (npr. vgrajevanje stranskih vrat), pa tuđi
s
poskusi uveljavljanja mednarodnih sporazumov
о
omejevanju kriptografije za civilne namene.
Vsi
poskusi
so bili
večinoma
neúspešní, zato
so
se
ZDA
lotile drugačne taktike
in
si skušale zagotoviti
možnosti
za nadzorovanje kljub
prosti uporabi kriptografije. Leta
1994
so v
ZDA sprejeli
Communications
Assistance for Law
Enforcement Act,**1
s
katerim so
dosegli,
da so
izdelovalci telefonskih
central
začeli v svoje
izdelke vgrajevati
zmožnosti
za
nadzorovanje komunikacij.
Z drugimi
besedami:
dosegli
so, da
je komunikacijska
tehologija
že v
osnovi zasnovana za nadzor. To
se nadaljuje
tuđi pri uporabi
internetnih tehnologij,
kar dokazuje
primer
uvedbe sistema za nadzor
interneta
Carnivore
v
ZDA
leta
2000
in
pozneje tuđi drugod po svetu.
Poskusi prepovedi
in
omejevanja kriptografije
so
sprožili nastanek močnega gibanja za
elektronsko zasebnost, katerega
ciani so
razvijali predvsem prosto dostopne kriptografske
programe
ter
anonimizacřjske
sisteme. Hkrati seje oblikovalo tuđi protigibanje,
kije poudarjalo
predvsem negativne vidike splošne rabe kriptografije na preiskovanje kaznivih dejarrj. Krjub temu
4
1.
amanđma, Listina svobošiln
(Bill of Rights),
1791.
440
U.S. West
v.
F.CC,
182
F.3d
1224 (1999).
441
Communications Assistance for Law Enforcement Act (Digital Telephony Act) of
1994,47
U.S.C.
(1994).
260
daje bilo gibanje za elektronsko zasebnost pri razvoju kriptografskih rešitev navidezno uspešno,
pa je uporaba
tehnologii,
ki
posamezniku omogočajo, da se izogne nadzoru na internetu,
v
praksi omejena.
Ostają
zgolj
kot možnost,
ki
pa
jo izkoristi
le
málokdo.
V
zadnjem
delu
je
obravnavan problem zasebnosti na internetu. Osnovno vprašanje, ki se
zastavlja, je, ali je internet tehnologija
svobodě , kot
so
nekateri verjeli
v
začetku
90.
let
20.
stoletja, ali pa je panoptičnost že vgrajena
v
internet.
V
iskanju odgovora na to vprašanje avtor
navaja
številne konkretne primere, ki zadevajo informacijsko, komunikacijsko
ter
prostorsko
zasebnost na internetu. Pri tem analizira tuđi poskuse uvajanja nadzora nad internetom
v
Sloveniji
ter
predstavi nekatere
možne
smeri
nadzora
in
zasebnosti na internetu
v příhodnosti.
Uvedba tehnologij za zaščito intelektualne lastnine, tehnologije t. i. zaupanja vrednega
računalništva
( Trusted Computing ) in
nastanki
monopolov
ter
posledično
monokulture na
področju operacijskih sistemov za zasebnost na internetu ne prinašajo
nič dobrega.
Enako
velja za družbeni razvoj, predvsem razvoj neposrednega trženja
in sodobnih modelov
trženja
in
personalizacije storitev, ki zahtevajo zbiranje velikega števila osebnih podatkov.
Posamezniki postajamo kljub nastanku tehnologij varovanja zasebnosti čedalje bolj
transparentní.
Tehnologije varovanja zasebnosti nas
v
praksi sicer ščitijo pred kriminalom, ne pa
tuđi pred državo
(kot
so
bili
v
90.
letih
20.
stoletja
prepričani pripadniki gibanja za elektronsko
zasebnost)
in
družbeno
sfero. Tehnologije varovanja zasebnosti ne onemogočajo tehnologij
nadzora, njihova uporaba za zaščito medsebojnih komunikacij pa je
v
praksi
zelo
omejena.
Tehnologije nadzora pa
so,
nasprotno,
zelo
razširjene
in
navadno veljajo za družbeno povsem
sprejemljive.
261
ABSTRACT
The author addresses the problem of privacy and surveillance on the internet and the
influence of technology on the changes of the boundary between public and private. The first
part examines the question of when privacy emerged as a social category and how it has changed
through history. As Hannah
Arendt
established, privacy in antique has not been perceived as
a field of freedom, but rather as a field of coercion. Privacy as we know it today emerged with
capitalism but, at the same time, began to diminish. First the sphere of social is separated
from the private sphere, then privacy is shrunk to intimacy. But intimacy is not inviolated,
it is subject to intervention by the social sphere, by mass media and advertising.
Arendt
and
Habermas
pointed out two aspects of the private: personal space
-
space of intimacy, and space
which enables associations of individuals and then· action. Therefore privacy today is a value, a
precondition of human freedom and emancipation.
The next part examines the problem of surveillance through the theories of
Bentham,
Foucault
and Deleuze. Similar to privacy, surveillance has been subject to changes through
history. The idea of surveillance as a means of executing power over individuals was first
introduced by
Bentham
in his work describing the idea of prison Panopticon. His mental leap
from the model of punishment, which detached the prisoner to the model where prisoner is
exposed to the authority which observes, made
Foucault
denote him as one of the most important
inventors in the area of technology of power
(Foucault,
1991: 48).
But surveillance transformed
through history, especially when regulatory authority emerged in addition to the disciplinary
one. If the disciplinary authority is focused on the individual, his or her training , coercion and
reining, regulatory authority is focused on the population. It does not tempt to influence a specific
individual but, rahter, tries to introduce regulatory mechanisms for preserving balance on a global
scale and identify risks and opportunities.
Foucault
and Deleuze established that both authorities,
disciplinary and regulatory, act together in the controlled society. Regulation does not replace
discipline, it supersctructures it.
Surveillance and control could be directed in two ways: against individual or against authority
(government). The idea of the control of the state authority has been introduced in
1791
in
Bentham s essay Of Publicity. His idea has been directed against non-transparency and secrecy
of authority, but today is often used as an argument against privacy of individuals. It came to the
conversion of the principle of transparency, and the consequence is that individuals who want
to protect their privacy are often faced with allegations of hiding and consecutive immorality.
To be good citizens
...
is to be measurable and predictable consumers (Palmer,
2000: 92),
is the
opinion of Gareth Palmer.
Next the right to privacy is analysed. The main problem of the right to privacy is that it is
poorly defined and often collides with other rights and interests. Consequently, there is also
a question of which right is superior and which is inferior when this collision emerges. This
section also examines the connection of the right to privacy with some other concepts (such as
262
freedom, autonomy, interpersonal dimension of the right to privacy, etc.), and also the influence
of social and technological changes to the development of the right to privacy.
In addition, this work brings forth an analysis of the development and content of the right to
privacy in the United States and Europe. It is shown that the
U. S.
system of privacy protection
has two fundamental characteristics whose consequence is that privacy protection of the
individual is generally worse than in Europe. Despite the important contribution of the U. S.
legal system to the protection of the right to privacy (recognition of reasonable expectation
of privacy principle in
1967),
privacy in some areas in the United States is still understood
as inferior to the property right. This is especially true in case of information privacy and
personal data in the private sector and protection of privacy in the workplace. The second
characteristic is that privacy is not explicitly mentioned and recognized as a positive right in
the
U. S.
Constitution.442 The fact that the First Amendment443 guarantees freedom of speech
to everybody means that the American legal system sets some important restrictions to the
regulation of personal data processing. This became evident in the case of US West v. F.C.C.44*
where Court of Appeals of the Tenth Circuit characterized private information as a sort of a
speech, and the use of consumer-related information by third parties in commercial transactions
as commercial speech protected by the First Amendment.
The next part of the book focuses on the emergence of the technology for protection of
privacy
-
cryptography. Cryptography has been known for almost
4000
years and in the past
has mostly been used for military and diplomatic purposes. But the phenomenon of publicly
accessible cryptography in 1960 s enabled everyone
-
at least in theory
-
to use it. Hence national
states, most notably the United States, tried to ban or restrict research, development and use of
cryptography. They used different kinds of tactics, including formal and informal pressures on
the researchers, assistance of National Security Agency in the development and adaptation of
cryptography products (for example with back doors, etc.) and attempts to enact international
agreements to restrict the use of cryptography for civil purposes. All attempts were more or
less unsuccessful, which led the USA to attempt to enable surveillance even if cryptography
is allowed to be used. In
1994
Communications Assistance for Law Enforcement Acti,^ was
enforced, which required that all telecommunications operators use technology that enables
government surveillance. In other words
-
they required that technology should be designed
for surveillance. This trend is being continued in the area of internet technologies with the
introduction of Carnivore in
2000
in the USA and later in other countries as well.
The attempts to ban or restrict cryptography triggered the formation of a strong movement
for electronic privacy, whose members began to develop free cryptographic products and
anonymization solutions. At the same, an opponent movement was formed, which mostly
emphasized the negative aspects of the free use of cryptography in crime investigations. But
442
Constitution of United States of America,
1798,
4(3
First Amendment, Bill of Rights,
1791.
444
U.S. West v. F.CC,
182
F.3d
1224 ( 1999).
445
Communications Assistance for Law Enforcement Act (Digital Telephony Act) of
1994,47
U.S.C.
( 1994),
263
despite the apparent success of the movement for electronic privacy, the use of technologies
for enhancing privacy and avoiding surveillance on the internet is limited today. It is merely a
possibility that is rarely used.
The last part of this work is dedicated to the problem of privacy on the internet. The
main question is whether the internet is a technology of freedom , as it has been believed in
1990 s, or panopticism is already built-in. In search of the answer to this question, several cases
concerning information, communication and space privacy on the internet are examined. A
part of the analysis is devoted to the introduction of surveillance of the internet in Slovenia and
some likely future trends of the development of surveillance and privacy issues on the internet.
The development of technologies for intellectual property protection, technology of Trusted
Computing , monopolies and consequent monoculture in the market of computer operating
systems, are bad news for privacy on the internet. The same could be said regarding social
and economic development, especially the development of direct marketing, modern marketing
models and personalisation of services, which all require collecting large amounts of personal
data.
Despite the emergence of the technologies of freedom, individuals are becoming more and
more transparent. The technologies of freedom in everyday reality protect us against cybercrime,
but not against the government (recognised as the main threat by privacy activists in 1990 s) and
the social sphere. The technologies of freedom do not hinder the technologies of surveillance,
and their use for protection of everyday interpersonal communications is limited. On the other
hand, the technologies of surveillance are wide-spread and have become socially acceptable.
|
any_adam_object | 1 |
author | Kovačič, Matej |
author_facet | Kovačič, Matej |
author_role | aut |
author_sort | Kovačič, Matej |
author_variant | m k mk |
building | Verbundindex |
bvnumber | BV035308166 |
ctrlnum | (OCoLC)643065216 (DE-599)BVBBV035308166 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02043nam a2200445 cb4500</leader><controlfield tag="001">BV035308166</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090929 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090212s2006 |||| 00||| slv d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9612352429</subfield><subfield code="9">961-235-242-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)643065216</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035308166</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">slv</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">7,41</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kovačič, Matej</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nadzor in zasebnost v informacijski družbi</subfield><subfield code="b">informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu</subfield><subfield code="c">Matej Kovačič</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ljubljana</subfield><subfield code="b">Fak. za Družbene Vede</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">268 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Znanstvena knjižnica / Fakulteta za Družbene Vede</subfield><subfield code="v">55</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Zsfassung in engl. Sprache</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kontrolle</subfield><subfield code="0">(DE-588)4032312-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kontrolle</subfield><subfield code="0">(DE-588)4032312-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="810" ind1="2" ind2=" "><subfield code="a">Fakulteta za Družbene Vede</subfield><subfield code="t">Znanstvena knjižnica</subfield><subfield code="v">55</subfield><subfield code="w">(DE-604)BV012660430</subfield><subfield code="9">55</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017112942&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017112942&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017112942</subfield></datafield></record></collection> |
id | DE-604.BV035308166 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T21:30:56Z |
institution | BVB |
isbn | 9612352429 |
language | Slovenian |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017112942 |
oclc_num | 643065216 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | 268 S. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Fak. za Družbene Vede |
record_format | marc |
series2 | Znanstvena knjižnica / Fakulteta za Družbene Vede |
spelling | Kovačič, Matej Verfasser aut Nadzor in zasebnost v informacijski družbi informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Matej Kovačič Ljubljana Fak. za Družbene Vede 2006 268 S. txt rdacontent n rdamedia nc rdacarrier Znanstvena knjižnica / Fakulteta za Družbene Vede 55 Zsfassung in engl. Sprache Informationsgesellschaft (DE-588)4114011-4 gnd rswk-swf Kontrolle (DE-588)4032312-2 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Informationsgesellschaft (DE-588)4114011-4 s Internet (DE-588)4308416-3 s Privatsphäre (DE-588)4123980-5 s Kontrolle (DE-588)4032312-2 s DE-604 Fakulteta za Družbene Vede Znanstvena knjižnica 55 (DE-604)BV012660430 55 Digitalisierung BSBMuenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017112942&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung BSB Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017112942&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Kovačič, Matej Nadzor in zasebnost v informacijski družbi informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Informationsgesellschaft (DE-588)4114011-4 gnd Kontrolle (DE-588)4032312-2 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4114011-4 (DE-588)4032312-2 (DE-588)4123980-5 (DE-588)4308416-3 |
title | Nadzor in zasebnost v informacijski družbi informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu |
title_auth | Nadzor in zasebnost v informacijski družbi informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu |
title_exact_search | Nadzor in zasebnost v informacijski družbi informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu |
title_full | Nadzor in zasebnost v informacijski družbi informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Matej Kovačič |
title_fullStr | Nadzor in zasebnost v informacijski družbi informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Matej Kovačič |
title_full_unstemmed | Nadzor in zasebnost v informacijski družbi informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Matej Kovačič |
title_short | Nadzor in zasebnost v informacijski družbi |
title_sort | nadzor in zasebnost v informacijski druzbi informacijski socioloski pravni in tehnicni vidiki nadzora in zasebnosti na internetu |
title_sub | informacijski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu |
topic | Informationsgesellschaft (DE-588)4114011-4 gnd Kontrolle (DE-588)4032312-2 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Informationsgesellschaft Kontrolle Privatsphäre Internet |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017112942&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017112942&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV012660430 |
work_keys_str_mv | AT kovacicmatej nadzorinzasebnostvinformacijskidruzbiinformacijskisocioloskipravniintehnicnividikinadzorainzasebnostinainternetu |