Lessons from the identity trail: anonymity, privacy and identity in a networked society
During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emer...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Oxford [u.a.]
Oxford Univ. Press
2009
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts.Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXXI, 554 S. |
ISBN: | 9780195372472 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035368801 | ||
003 | DE-604 | ||
005 | 20090622 | ||
007 | t | ||
008 | 090314s2009 xxu |||| 00||| eng d | ||
010 | |a 2008043016 | ||
020 | |a 9780195372472 |c (hardback |9 978-0-19-537247-2 | ||
035 | |a (OCoLC)236333219 | ||
035 | |a (DE-599)BVBBV035368801 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-B170 |a DE-19 | ||
050 | 0 | |a K3264.C65 | |
082 | 0 | |a 342.08/58 | |
245 | 1 | 0 | |a Lessons from the identity trail |b anonymity, privacy and identity in a networked society |c Editors : Ian Kerr, Valerie Steeves, and Carole Lucock |
250 | |a 1. publ. | ||
264 | 1 | |a Oxford [u.a.] |b Oxford Univ. Press |c 2009 | |
300 | |a XXXI, 554 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts.Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes. | |
650 | 4 | |a Recht | |
650 | 4 | |a Data protection |x Law and legislation | |
650 | 4 | |a Identity | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Computer security |x Law and legislation | |
650 | 4 | |a Freedom of information | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymität |0 (DE-588)4471050-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identität |0 (DE-588)4026482-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Identität |0 (DE-588)4026482-8 |D s |
689 | 0 | 3 | |a Anonymität |0 (DE-588)4471050-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 4 | |a Identität |0 (DE-588)4026482-8 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Kerr, Ian J. |e Sonstige |4 oth | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017172719&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017172719 |
Datensatz im Suchindex
_version_ | 1804138696193081344 |
---|---|
adam_text | CONTENTS ABOUT THIS BOOK XI ACKNOWLEDGEMENTS XIII CONTRIBUTORS XV THE
STRANGE RETURN OF GYGES RING: AN INTRODUCTION XXIII I. PRIVACY 1
CHAPTER I. SOFT SURVEILLANCE, HARD CONSENT: THE LAW AND PSYCHOLOGY OF
ENGINEERING CONSENT 5 IAN KERR, JENNIFER BARRIGAR, JACQUELYN BURKELL,
AND KATIE BLACK CHAPTER 2. APPROACHES TO CONSENT IN CANADIAN DATA
PROTECTION LAW 23 PHILIPPA LAWSON AND MARY O DONOGHUE CHAPTER 3.
LEARNING FROM DATA PROTECTION LAW AT THE NEXUS OF COPYRIGHT AND PRIVACY
43 ALEX CAMERON CHAPTER 4. A HEURISTICS APPROACH TO UNDERSTANDING
PRIVACY-PROTECTING BEHAVIORS IN DIGITAL SOCIAL ENVIRONMENTS 65 ROBERT
CAREY AND JACQUELYN BURKELL CHAPTER 5. UBIQUITOUS COMPUTING AND SPATIAL
PRIVACY 83 ANNE UTECK CHAPTER 6. CORE PRIVACY: A PROBLEM FOR PREDICTIVE
DATA MINING 103 JASON MILLAR CHAPTER 7. PRIVACY VERSUS NATIONAL
SECURITY: CLARIFYING THE TRADE-OFF 121 JENNIFER CHANDLER CHAPTER 8.
PRIVACY S SECOND HOME: BUILDING A NEW HOME FOR PRIVACY UNDER SECTION 15
OF THE CHARTER 139 DAPHNE GILBERT CHAPTER 9. WHAT HAVE YOU DONE FOR ME
LATELY? REFLECTIONS ON REDEEMING PRIVACY FOR BATTERED WOMEN 157 JENA
MCGILL CHAPTER 10. GENETIC TECHNOLOGIES AND MEDICINE: PRIVACY, IDENTITY,
AND INFORMED CONSENT 173 MARSHA HANEN CHAPTER U. RECLAIMING THE SOCIAL
VALUE OF PRIVACY 191 VALERIE STEEVES II. IDENTITY 209 CHAPTER 12. A
CONCEPTUAL ANALYSIS OF IDENTITY 213 STEVEN DAVIS CHAPTER 13. IDENTITY:
DIFFERENCE AND CATEGORIZATION 227 CHARLES D. RAAB CHAPTER 14. IDENTITY
CARDS AND IDENTITY ROMANTICISM 245 A. MICHAEL FROOMKIN CHAPTER 15.
WHAT S IN A NAME? WHO BENEFITS FROM THE PUBLICATION BAN IN SEXUAL
ASSAULT TRIALS? 265 JANE DOE CHAPTER 16. LIFE IN THE FISH BOWL: FEMINIST
INTERROGATIONS OF WEBCAMMING 283 JANE BAILEY CHAPTER 17. UBIQUITOUS
COMPUTING, SPATIALITY, AND THE CONSTRUCTION OF IDENTITY: DIRECTIONS FOR
POLICY RESPONSE 303 DAVID J. PHILLIPS CHAPTER 18. DIGNITY AND SELECTIVE
SELF-PRESENTATION 319 DAVID MATHESON CHAPTER 19. THE INTERNET OF PEOPLE?
REFLECTIONS ON THE FUTURE REGULATION OF HUMAN-IMPLANTABLE RADIO
FREQUENCY IDENTIFICATION 335 IAN KERR CHAPTER 20. USING BIOMETRICS TO
REVISUALIZE THE CANADA-U.S. BORDER 359 SHOSHANA MAGNET CHAPTER 21. SOUL
TRAIN: THE NEW SURVEILLANCE IN POPULAR MUSIC 377 GARY T. MARX CHAPTER
22. EXIT NODE REPUDIATION FOR ANONYMITY NETWORKS 399 JEREMY CLARK,
PHILIPPE GAUVIN, AND CARLISLE ADAMS CHAPTER 23. TRACKMENOT: RESISTING
SURVEILLANCE IN WEB SEARCH 417 DANIEL C. HOWE AND HELEN NISSENBAUM III.
ANONYMITY 437 CHAPTER 24. ANONYMITY AND THE LAW IN THE UNITED STATES 441
A. MICHAEL FROOMKIN CHAPTER 25. ANONYMITY AND THE LAW IN CANADA 465
CAROLE LUCOCK AND KATIE BLACK CHAPTER 26. ANONYMITY AND THE LAW IN THE
UNITED KINGDOM 485 IAN LLOYD CHAPTER 27. ANONYMITY AND THE LAW IN THE
NETHERLANDS 503 SIMONE VAN DER HOF, BERT-JAAP KOOPS, AND RONALD LEENES
CHAPTER 28. ANONYMITY AND THE LAW IN ITALY 523 GIUSELLA FINOCCHIARO
INDEX 539
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035368801 |
callnumber-first | K - Law |
callnumber-label | K3264 |
callnumber-raw | K3264.C65 |
callnumber-search | K3264.C65 |
callnumber-sort | K 43264 C65 |
callnumber-subject | K - General Law |
ctrlnum | (OCoLC)236333219 (DE-599)BVBBV035368801 |
dewey-full | 342.08/58 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 342 - Constitutional and administrative law |
dewey-raw | 342.08/58 |
dewey-search | 342.08/58 |
dewey-sort | 3342.08 258 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03782nam a2200637zc 4500</leader><controlfield tag="001">BV035368801</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090622 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090314s2009 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008043016</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780195372472</subfield><subfield code="c">(hardback</subfield><subfield code="9">978-0-19-537247-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)236333219</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035368801</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-B170</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">K3264.C65</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">342.08/58</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Lessons from the identity trail</subfield><subfield code="b">anonymity, privacy and identity in a networked society</subfield><subfield code="c">Editors : Ian Kerr, Valerie Steeves, and Carole Lucock</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford [u.a.]</subfield><subfield code="b">Oxford Univ. Press</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXI, 554 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts.Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Freedom of information</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identität</subfield><subfield code="0">(DE-588)4026482-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Identität</subfield><subfield code="0">(DE-588)4026482-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Identität</subfield><subfield code="0">(DE-588)4026482-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kerr, Ian J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017172719&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017172719</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035368801 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T21:32:17Z |
institution | BVB |
isbn | 9780195372472 |
language | English |
lccn | 2008043016 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017172719 |
oclc_num | 236333219 |
open_access_boolean | |
owner | DE-12 DE-B170 DE-19 DE-BY-UBM |
owner_facet | DE-12 DE-B170 DE-19 DE-BY-UBM |
physical | XXXI, 554 S. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Oxford Univ. Press |
record_format | marc |
spelling | Lessons from the identity trail anonymity, privacy and identity in a networked society Editors : Ian Kerr, Valerie Steeves, and Carole Lucock 1. publ. Oxford [u.a.] Oxford Univ. Press 2009 XXXI, 554 S. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts.Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes. Recht Data protection Law and legislation Identity Privacy, Right of Computer security Law and legislation Freedom of information Internet (DE-588)4308416-3 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Anonymität (DE-588)4471050-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Identität (DE-588)4026482-8 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Datenschutz (DE-588)4011134-9 s Privatsphäre (DE-588)4123980-5 s Identität (DE-588)4026482-8 s Anonymität (DE-588)4471050-1 s DE-604 Computersicherheit (DE-588)4274324-2 s Internet (DE-588)4308416-3 s Kerr, Ian J. Sonstige oth SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017172719&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lessons from the identity trail anonymity, privacy and identity in a networked society Recht Data protection Law and legislation Identity Privacy, Right of Computer security Law and legislation Freedom of information Internet (DE-588)4308416-3 gnd Datenschutz (DE-588)4011134-9 gnd Anonymität (DE-588)4471050-1 gnd Computersicherheit (DE-588)4274324-2 gnd Identität (DE-588)4026482-8 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4011134-9 (DE-588)4471050-1 (DE-588)4274324-2 (DE-588)4026482-8 (DE-588)4123980-5 (DE-588)4143413-4 |
title | Lessons from the identity trail anonymity, privacy and identity in a networked society |
title_auth | Lessons from the identity trail anonymity, privacy and identity in a networked society |
title_exact_search | Lessons from the identity trail anonymity, privacy and identity in a networked society |
title_full | Lessons from the identity trail anonymity, privacy and identity in a networked society Editors : Ian Kerr, Valerie Steeves, and Carole Lucock |
title_fullStr | Lessons from the identity trail anonymity, privacy and identity in a networked society Editors : Ian Kerr, Valerie Steeves, and Carole Lucock |
title_full_unstemmed | Lessons from the identity trail anonymity, privacy and identity in a networked society Editors : Ian Kerr, Valerie Steeves, and Carole Lucock |
title_short | Lessons from the identity trail |
title_sort | lessons from the identity trail anonymity privacy and identity in a networked society |
title_sub | anonymity, privacy and identity in a networked society |
topic | Recht Data protection Law and legislation Identity Privacy, Right of Computer security Law and legislation Freedom of information Internet (DE-588)4308416-3 gnd Datenschutz (DE-588)4011134-9 gnd Anonymität (DE-588)4471050-1 gnd Computersicherheit (DE-588)4274324-2 gnd Identität (DE-588)4026482-8 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Recht Data protection Law and legislation Identity Privacy, Right of Computer security Law and legislation Freedom of information Internet Datenschutz Anonymität Computersicherheit Identität Privatsphäre Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017172719&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kerrianj lessonsfromtheidentitytrailanonymityprivacyandidentityinanetworkedsociety |