Lessons from the identity trail :: anonymity, privacy, and identity in a networked society /
During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emer...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Oxford ; New York :
Oxford University Press,
©2009.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes. |
Beschreibung: | 1 online resource (xxxi, 554 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780199707010 0199707014 1283130041 9781283130042 9786613130044 6613130044 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn729246265 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 110606s2009 enka ob 001 0 eng d | ||
010 | |z 2008043016 | ||
040 | |a N$T |b eng |e pn |c N$T |d E7B |d OCLCQ |d YDXCP |d OCLCF |d OCLCE |d OCLCQ |d NLGGC |d IDEBK |d EBLCP |d OCLCQ |d AZK |d AGLDB |d MOR |d OCLCO |d PIFAG |d ZCU |d OCLCQ |d MERUC |d OCLCQ |d U3W |d STF |d WRM |d OCLCQ |d VTS |d OCLCQ |d NRAMU |d ICG |d INT |d OCLCA |d VT2 |d OCLCQ |d WYU |d OCLCQ |d OCLCA |d DKC |d OCLCQ |d UX1 |d HS0 |d UWK |d ADU |d OCLCQ |d UKCRE |d BOL |d OCLCO |d OCLCQ |d CNNOR |d DKU |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d YDX |d QGK |d OCLCO |d OCLCL |d INARC | ||
019 | |a 631891925 |a 680760817 |a 741453235 |a 816843990 |a 819503709 |a 821637069 |a 961511196 |a 962631628 |a 975207311 |a 975241700 |a 988487433 |a 992040352 |a 1016803568 |a 1018084873 |a 1037920156 |a 1038042990 |a 1038682556 |a 1041571069 |a 1045538526 |a 1047937724 |a 1053503809 |a 1055327282 |a 1065115059 |a 1065787654 |a 1081234288 |a 1100569677 |a 1101723802 |a 1109120112 |a 1110384799 |a 1112856450 |a 1114442103 |a 1119120333 |a 1153563810 |a 1157966830 |a 1178722143 |a 1183976090 |a 1227634068 |a 1228553323 |a 1249168957 |a 1259218999 |a 1410450733 |a 1424786948 | ||
020 | |a 9780199707010 |q (electronic bk.) | ||
020 | |a 0199707014 |q (electronic bk.) | ||
020 | |a 1283130041 | ||
020 | |a 9781283130042 | ||
020 | |a 9786613130044 | ||
020 | |a 6613130044 | ||
020 | |z 9780195372472 | ||
020 | |z 0195372476 | ||
035 | |a (OCoLC)729246265 |z (OCoLC)631891925 |z (OCoLC)680760817 |z (OCoLC)741453235 |z (OCoLC)816843990 |z (OCoLC)819503709 |z (OCoLC)821637069 |z (OCoLC)961511196 |z (OCoLC)962631628 |z (OCoLC)975207311 |z (OCoLC)975241700 |z (OCoLC)988487433 |z (OCoLC)992040352 |z (OCoLC)1016803568 |z (OCoLC)1018084873 |z (OCoLC)1037920156 |z (OCoLC)1038042990 |z (OCoLC)1038682556 |z (OCoLC)1041571069 |z (OCoLC)1045538526 |z (OCoLC)1047937724 |z (OCoLC)1053503809 |z (OCoLC)1055327282 |z (OCoLC)1065115059 |z (OCoLC)1065787654 |z (OCoLC)1081234288 |z (OCoLC)1100569677 |z (OCoLC)1101723802 |z (OCoLC)1109120112 |z (OCoLC)1110384799 |z (OCoLC)1112856450 |z (OCoLC)1114442103 |z (OCoLC)1119120333 |z (OCoLC)1153563810 |z (OCoLC)1157966830 |z (OCoLC)1178722143 |z (OCoLC)1183976090 |z (OCoLC)1227634068 |z (OCoLC)1228553323 |z (OCoLC)1249168957 |z (OCoLC)1259218999 |z (OCoLC)1410450733 |z (OCoLC)1424786948 | ||
037 | |n Title subscribed to via ProQuest Academic Complete | ||
042 | |a dlr | ||
050 | 4 | |a K3264.C65 |b L47 2009eb | |
055 | 4 | |a K3264 C65 |b L47 | |
072 | 7 | |a LAW |x 116000 |2 bisacsh | |
080 | |a 342.738(08) | ||
082 | 7 | |a 342.08/58 |2 22 | |
084 | |a KM209.P7 LES |q UkBrU-I |2 moys | ||
049 | |a MAIN | ||
245 | 0 | 0 | |a Lessons from the identity trail : |b anonymity, privacy, and identity in a networked society / |c edited by Ian Kerr, Valerie Steeves, and Carole Lucock. |
260 | |a Oxford ; |a New York : |b Oxford University Press, |c ©2009. | ||
300 | |a 1 online resource (xxxi, 554 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a data file | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t Soft surveillance, hard consent : the law and psychology of engineering consent / |r Ian Kerr, Jennifer Barrigar, Jacquelyn Burkell, and Katie Black -- |t Approaches to consent in Canadian data protection law / |r Philippa Lawson and Mary O'Donoghue -- |t Learning from data protection law at the nexus of copyright and privacy / |r Alex Cameron -- |t A heuristics approach to understanding privacy-protecting behaviors in digital social environments / |r Robert Carey and Jacquelyn Burkell -- |t Ubiquitous computing and spatial privacy / |r Anne Uteck -- |t Core privacy : a problem for predictive data mining / |r Jason Millar -- |t Privacy versus national security : classifying the trade-off / |r Jennifer Chandler -- |t Privacy's second home : building a new home for privacy under section 15 of the charter / |r Daphne Gilbert -- |t "What have you done for me lately?" Reflections on redeeming privacy for battered women / |r Jena McGill -- |t Genetic technologies and medicine : privacy, identity, and informed consent / |r Marsha Hanen -- |t Reclaiming the social value of privacy / |r Valerie Steeves -- |t A conceptual analysis of identity / |r Steven Davis -- |t Identity : difference and categorization / |r Charles D. Raab -- |t Identity cards and identity romanticism / |r A. Michael Froomkin -- |t What's in a name? Who benefits from the publication ban in sexual assault trials? / |r Jane Doe -- |t Life in a fish bowl : feminist interrogations of webcamming / |r Jane Bailey -- |t Ubiquitous computing, spatiality, and the construction of identity : directions for policy response / |r David J. Phillips -- |t Dignity and selective self-presentation / |r David Matheson -- |t The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification / |r Ian Kerr -- |t Using biometrics to revisualize the Canada-U.S. border / |r Shoshana Magnet -- |t Soul train : the new surveillance in popular music / |r Gary T. Marx -- |t Exit node repudiation for anonymity networks / |r Jeremy Clark, Philippe Gauvin, and Carlisle Adams -- |t TrackMeNot : resisting surveillance in web search / |r Daniel C. Howe and Helen Nissenbaum -- |t Anonymity and the law in the United States / |r A. Michael Froomkin -- |t Anonymity and the law in Canada / |r Carole Lucock and Katie Black -- |t Anonymity and the law int he United Kingdom / |r Ian Lloyd -- |t Anonymity and the law in the Netherlands / |r Simone van der Hof, Bert-Jaap Koops, and Ronald Leenes -- |t Anonymity and the law in Italy / |r Giusella Finocchiaro. |
520 | |a During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes. | ||
588 | 0 | |a Print version record. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
546 | |a English. | ||
650 | 0 | |a Data protection |x Law and legislation. |0 http://id.loc.gov/authorities/subjects/sh93000189 | |
650 | 0 | |a Identity (Philosophical concept) |0 http://id.loc.gov/authorities/subjects/sh85064150 | |
650 | 0 | |a Privacy, Right of. |0 http://id.loc.gov/authorities/subjects/sh85107029 | |
650 | 0 | |a Computer security |x Law and legislation. |0 http://id.loc.gov/authorities/subjects/sh2002005084 | |
650 | 0 | |a Freedom of information. |0 http://id.loc.gov/authorities/subjects/sh85051702 | |
650 | 2 | |a Access to Information |0 https://id.nlm.nih.gov/mesh/D022126 | |
650 | 6 | |a Identité. | |
650 | 6 | |a Liberté d'information. | |
650 | 7 | |a identity. |2 aat | |
650 | 7 | |a LAW |x Privacy. |2 bisacsh | |
650 | 7 | |a Computer security |x Law and legislation |2 fast | |
650 | 7 | |a Data protection |x Law and legislation |2 fast | |
650 | 7 | |a Freedom of information |2 fast | |
650 | 7 | |a Identity (Philosophical concept) |2 fast | |
650 | 7 | |a Privacy, Right of |2 fast | |
650 | 7 | |a Datenschutz |2 gnd | |
650 | 7 | |a Privatsphäre |2 gnd |0 http://d-nb.info/gnd/4123980-5 | |
650 | 7 | |a Identität |2 gnd |0 http://d-nb.info/gnd/4026482-8 | |
650 | 7 | |a Anonymität |2 gnd |0 http://d-nb.info/gnd/4471050-1 | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Internet |2 gnd |0 http://d-nb.info/gnd/4308416-3 | |
650 | 7 | |a Data protection |x Law and legislation. |2 nli | |
650 | 7 | |a Identity (Philosophical concept) |2 nli | |
650 | 7 | |a Privacy, Right of. |2 nli | |
650 | 7 | |a Computer security |x Law and legislation. |2 nli | |
650 | 7 | |a Freedom of information. |2 nli | |
655 | 4 | |a Aufsatzsammlung. | |
700 | 1 | |a Kerr, Ian |q (Ian R.) |1 https://id.oclc.org/worldcat/entity/E39PBJmtxPR8PcXxx7WP4hTmBP |0 http://id.loc.gov/authorities/names/n2008066534 | |
700 | 1 | |a Steeves, Valerie M., |d 1959- |1 https://id.oclc.org/worldcat/entity/E39PCjBwQy7ckY9pBtpBTHfH4q |0 http://id.loc.gov/authorities/names/no2005016937 | |
700 | 1 | |a Lucock, Carole. |0 http://id.loc.gov/authorities/names/nr93029362 | |
758 | |i has work: |a Lessons from the identity trail (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFw9hWjfyDjQf8kVM3rqjP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Lessons from the identity trail. |d Oxford ; New York : Oxford University Press, ©2009 |z 9780195372472 |w (DLC) 2008043016 |w (OCoLC)236333219 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=369098 |3 Volltext |
938 | |a YBP Library Services |b YANK |n 20446382 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL3054189 | ||
938 | |a ebrary |b EBRY |n ebr10476908 | ||
938 | |a EBSCOhost |b EBSC |n 369098 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 313004 | ||
938 | |a YBP Library Services |b YANK |n 6929815 | ||
938 | |a Internet Archive |b INAR |n bwb_P8-CUU-860 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn729246265 |
---|---|
_version_ | 1816881761155547136 |
adam_text | |
any_adam_object | |
author2 | Kerr, Ian (Ian R.) Steeves, Valerie M., 1959- Lucock, Carole |
author2_role | |
author2_variant | i k ik v m s vm vms c l cl |
author_GND | http://id.loc.gov/authorities/names/n2008066534 http://id.loc.gov/authorities/names/no2005016937 http://id.loc.gov/authorities/names/nr93029362 |
author_additional | Ian Kerr, Jennifer Barrigar, Jacquelyn Burkell, and Katie Black -- Philippa Lawson and Mary O'Donoghue -- Alex Cameron -- Robert Carey and Jacquelyn Burkell -- Anne Uteck -- Jason Millar -- Jennifer Chandler -- Daphne Gilbert -- Jena McGill -- Marsha Hanen -- Valerie Steeves -- Steven Davis -- Charles D. Raab -- A. Michael Froomkin -- Jane Doe -- Jane Bailey -- David J. Phillips -- David Matheson -- Ian Kerr -- Shoshana Magnet -- Gary T. Marx -- Jeremy Clark, Philippe Gauvin, and Carlisle Adams -- Daniel C. Howe and Helen Nissenbaum -- Carole Lucock and Katie Black -- Ian Lloyd -- Simone van der Hof, Bert-Jaap Koops, and Ronald Leenes -- Giusella Finocchiaro. |
author_facet | Kerr, Ian (Ian R.) Steeves, Valerie M., 1959- Lucock, Carole |
author_sort | Kerr, Ian |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | K - Law |
callnumber-label | K3264 |
callnumber-raw | K3264.C65 L47 2009eb |
callnumber-search | K3264.C65 L47 2009eb |
callnumber-sort | K 43264 C65 L47 42009EB |
callnumber-subject | K - General Law |
collection | ZDB-4-EBA |
contents | Soft surveillance, hard consent : the law and psychology of engineering consent / Approaches to consent in Canadian data protection law / Learning from data protection law at the nexus of copyright and privacy / A heuristics approach to understanding privacy-protecting behaviors in digital social environments / Ubiquitous computing and spatial privacy / Core privacy : a problem for predictive data mining / Privacy versus national security : classifying the trade-off / Privacy's second home : building a new home for privacy under section 15 of the charter / "What have you done for me lately?" Reflections on redeeming privacy for battered women / Genetic technologies and medicine : privacy, identity, and informed consent / Reclaiming the social value of privacy / A conceptual analysis of identity / Identity : difference and categorization / Identity cards and identity romanticism / What's in a name? Who benefits from the publication ban in sexual assault trials? / Life in a fish bowl : feminist interrogations of webcamming / Ubiquitous computing, spatiality, and the construction of identity : directions for policy response / Dignity and selective self-presentation / The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification / Using biometrics to revisualize the Canada-U.S. border / Soul train : the new surveillance in popular music / Exit node repudiation for anonymity networks / TrackMeNot : resisting surveillance in web search / Anonymity and the law in the United States / Anonymity and the law in Canada / Anonymity and the law int he United Kingdom / Anonymity and the law in the Netherlands / Anonymity and the law in Italy / |
ctrlnum | (OCoLC)729246265 |
dewey-full | 342.08/58 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 342 - Constitutional and administrative law |
dewey-raw | 342.08/58 |
dewey-search | 342.08/58 |
dewey-sort | 3342.08 258 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>10389cam a2201045 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn729246265</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">110606s2009 enka ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008043016</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">OCLCO</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UX1</subfield><subfield code="d">HS0</subfield><subfield code="d">UWK</subfield><subfield code="d">ADU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BOL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CNNOR</subfield><subfield code="d">DKU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDX</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">INARC</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">631891925</subfield><subfield code="a">680760817</subfield><subfield code="a">741453235</subfield><subfield code="a">816843990</subfield><subfield code="a">819503709</subfield><subfield code="a">821637069</subfield><subfield code="a">961511196</subfield><subfield code="a">962631628</subfield><subfield code="a">975207311</subfield><subfield code="a">975241700</subfield><subfield code="a">988487433</subfield><subfield code="a">992040352</subfield><subfield code="a">1016803568</subfield><subfield code="a">1018084873</subfield><subfield code="a">1037920156</subfield><subfield code="a">1038042990</subfield><subfield code="a">1038682556</subfield><subfield code="a">1041571069</subfield><subfield code="a">1045538526</subfield><subfield code="a">1047937724</subfield><subfield code="a">1053503809</subfield><subfield code="a">1055327282</subfield><subfield code="a">1065115059</subfield><subfield code="a">1065787654</subfield><subfield code="a">1081234288</subfield><subfield code="a">1100569677</subfield><subfield code="a">1101723802</subfield><subfield code="a">1109120112</subfield><subfield code="a">1110384799</subfield><subfield code="a">1112856450</subfield><subfield code="a">1114442103</subfield><subfield code="a">1119120333</subfield><subfield code="a">1153563810</subfield><subfield code="a">1157966830</subfield><subfield code="a">1178722143</subfield><subfield code="a">1183976090</subfield><subfield code="a">1227634068</subfield><subfield code="a">1228553323</subfield><subfield code="a">1249168957</subfield><subfield code="a">1259218999</subfield><subfield code="a">1410450733</subfield><subfield code="a">1424786948</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199707010</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0199707014</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283130041</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283130042</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613130044</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613130044</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780195372472</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0195372476</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)729246265</subfield><subfield code="z">(OCoLC)631891925</subfield><subfield code="z">(OCoLC)680760817</subfield><subfield code="z">(OCoLC)741453235</subfield><subfield code="z">(OCoLC)816843990</subfield><subfield code="z">(OCoLC)819503709</subfield><subfield code="z">(OCoLC)821637069</subfield><subfield code="z">(OCoLC)961511196</subfield><subfield code="z">(OCoLC)962631628</subfield><subfield code="z">(OCoLC)975207311</subfield><subfield code="z">(OCoLC)975241700</subfield><subfield code="z">(OCoLC)988487433</subfield><subfield code="z">(OCoLC)992040352</subfield><subfield code="z">(OCoLC)1016803568</subfield><subfield code="z">(OCoLC)1018084873</subfield><subfield code="z">(OCoLC)1037920156</subfield><subfield code="z">(OCoLC)1038042990</subfield><subfield code="z">(OCoLC)1038682556</subfield><subfield code="z">(OCoLC)1041571069</subfield><subfield code="z">(OCoLC)1045538526</subfield><subfield code="z">(OCoLC)1047937724</subfield><subfield code="z">(OCoLC)1053503809</subfield><subfield code="z">(OCoLC)1055327282</subfield><subfield code="z">(OCoLC)1065115059</subfield><subfield code="z">(OCoLC)1065787654</subfield><subfield code="z">(OCoLC)1081234288</subfield><subfield code="z">(OCoLC)1100569677</subfield><subfield code="z">(OCoLC)1101723802</subfield><subfield code="z">(OCoLC)1109120112</subfield><subfield code="z">(OCoLC)1110384799</subfield><subfield code="z">(OCoLC)1112856450</subfield><subfield code="z">(OCoLC)1114442103</subfield><subfield code="z">(OCoLC)1119120333</subfield><subfield code="z">(OCoLC)1153563810</subfield><subfield code="z">(OCoLC)1157966830</subfield><subfield code="z">(OCoLC)1178722143</subfield><subfield code="z">(OCoLC)1183976090</subfield><subfield code="z">(OCoLC)1227634068</subfield><subfield code="z">(OCoLC)1228553323</subfield><subfield code="z">(OCoLC)1249168957</subfield><subfield code="z">(OCoLC)1259218999</subfield><subfield code="z">(OCoLC)1410450733</subfield><subfield code="z">(OCoLC)1424786948</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="n">Title subscribed to via ProQuest Academic Complete</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">K3264.C65</subfield><subfield code="b">L47 2009eb</subfield></datafield><datafield tag="055" ind1=" " ind2="4"><subfield code="a">K3264 C65</subfield><subfield code="b">L47</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">116000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">342.738(08)</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">342.08/58</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">KM209.P7 LES</subfield><subfield code="q">UkBrU-I</subfield><subfield code="2">moys</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Lessons from the identity trail :</subfield><subfield code="b">anonymity, privacy, and identity in a networked society /</subfield><subfield code="c">edited by Ian Kerr, Valerie Steeves, and Carole Lucock.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Oxford ;</subfield><subfield code="a">New York :</subfield><subfield code="b">Oxford University Press,</subfield><subfield code="c">©2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxi, 554 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="g">polychrome.</subfield><subfield code="2">rdacc</subfield><subfield code="0">http://rdaregistry.info/termList/RDAColourContent/1003</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Soft surveillance, hard consent : the law and psychology of engineering consent /</subfield><subfield code="r">Ian Kerr, Jennifer Barrigar, Jacquelyn Burkell, and Katie Black --</subfield><subfield code="t">Approaches to consent in Canadian data protection law /</subfield><subfield code="r">Philippa Lawson and Mary O'Donoghue --</subfield><subfield code="t">Learning from data protection law at the nexus of copyright and privacy /</subfield><subfield code="r">Alex Cameron --</subfield><subfield code="t">A heuristics approach to understanding privacy-protecting behaviors in digital social environments /</subfield><subfield code="r">Robert Carey and Jacquelyn Burkell --</subfield><subfield code="t">Ubiquitous computing and spatial privacy /</subfield><subfield code="r">Anne Uteck --</subfield><subfield code="t">Core privacy : a problem for predictive data mining /</subfield><subfield code="r">Jason Millar --</subfield><subfield code="t">Privacy versus national security : classifying the trade-off /</subfield><subfield code="r">Jennifer Chandler --</subfield><subfield code="t">Privacy's second home : building a new home for privacy under section 15 of the charter /</subfield><subfield code="r">Daphne Gilbert --</subfield><subfield code="t">"What have you done for me lately?" Reflections on redeeming privacy for battered women /</subfield><subfield code="r">Jena McGill --</subfield><subfield code="t">Genetic technologies and medicine : privacy, identity, and informed consent /</subfield><subfield code="r">Marsha Hanen --</subfield><subfield code="t">Reclaiming the social value of privacy /</subfield><subfield code="r">Valerie Steeves --</subfield><subfield code="t">A conceptual analysis of identity /</subfield><subfield code="r">Steven Davis --</subfield><subfield code="t">Identity : difference and categorization /</subfield><subfield code="r">Charles D. Raab --</subfield><subfield code="t">Identity cards and identity romanticism /</subfield><subfield code="r">A. Michael Froomkin --</subfield><subfield code="t">What's in a name? Who benefits from the publication ban in sexual assault trials? /</subfield><subfield code="r">Jane Doe --</subfield><subfield code="t">Life in a fish bowl : feminist interrogations of webcamming /</subfield><subfield code="r">Jane Bailey --</subfield><subfield code="t">Ubiquitous computing, spatiality, and the construction of identity : directions for policy response /</subfield><subfield code="r">David J. Phillips --</subfield><subfield code="t">Dignity and selective self-presentation /</subfield><subfield code="r">David Matheson --</subfield><subfield code="t">The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification /</subfield><subfield code="r">Ian Kerr --</subfield><subfield code="t">Using biometrics to revisualize the Canada-U.S. border /</subfield><subfield code="r">Shoshana Magnet --</subfield><subfield code="t">Soul train : the new surveillance in popular music /</subfield><subfield code="r">Gary T. Marx --</subfield><subfield code="t">Exit node repudiation for anonymity networks /</subfield><subfield code="r">Jeremy Clark, Philippe Gauvin, and Carlisle Adams --</subfield><subfield code="t">TrackMeNot : resisting surveillance in web search /</subfield><subfield code="r">Daniel C. Howe and Helen Nissenbaum --</subfield><subfield code="t">Anonymity and the law in the United States /</subfield><subfield code="r">A. Michael Froomkin --</subfield><subfield code="t">Anonymity and the law in Canada /</subfield><subfield code="r">Carole Lucock and Katie Black --</subfield><subfield code="t">Anonymity and the law int he United Kingdom /</subfield><subfield code="r">Ian Lloyd --</subfield><subfield code="t">Anonymity and the law in the Netherlands /</subfield><subfield code="r">Simone van der Hof, Bert-Jaap Koops, and Ronald Leenes --</subfield><subfield code="t">Anonymity and the law in Italy /</subfield><subfield code="r">Giusella Finocchiaro.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh93000189</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Identity (Philosophical concept)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85064150</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85107029</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2002005084</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Freedom of information.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85051702</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Access to Information</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D022126</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Identité.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Liberté d'information.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">identity.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Privacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Freedom of information</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identity (Philosophical concept)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4123980-5</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identität</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4026482-8</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Anonymität</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4471050-1</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4308416-3</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation.</subfield><subfield code="2">nli</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identity (Philosophical concept)</subfield><subfield code="2">nli</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of.</subfield><subfield code="2">nli</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation.</subfield><subfield code="2">nli</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Freedom of information.</subfield><subfield code="2">nli</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Aufsatzsammlung.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kerr, Ian</subfield><subfield code="q">(Ian R.)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJmtxPR8PcXxx7WP4hTmBP</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2008066534</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Steeves, Valerie M.,</subfield><subfield code="d">1959-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjBwQy7ckY9pBtpBTHfH4q</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2005016937</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lucock, Carole.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nr93029362</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Lessons from the identity trail (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFw9hWjfyDjQf8kVM3rqjP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Lessons from the identity trail.</subfield><subfield code="d">Oxford ; New York : Oxford University Press, ©2009</subfield><subfield code="z">9780195372472</subfield><subfield code="w">(DLC) 2008043016</subfield><subfield code="w">(OCoLC)236333219</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=369098</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">20446382</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL3054189</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10476908</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">369098</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">313004</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">6929815</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">bwb_P8-CUU-860</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Aufsatzsammlung. |
genre_facet | Aufsatzsammlung. |
id | ZDB-4-EBA-ocn729246265 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:51Z |
institution | BVB |
isbn | 9780199707010 0199707014 1283130041 9781283130042 9786613130044 6613130044 |
language | English |
oclc_num | 729246265 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxxi, 554 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Oxford University Press, |
record_format | marc |
spelling | Lessons from the identity trail : anonymity, privacy, and identity in a networked society / edited by Ian Kerr, Valerie Steeves, and Carole Lucock. Oxford ; New York : Oxford University Press, ©2009. 1 online resource (xxxi, 554 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 data file Includes bibliographical references and index. Soft surveillance, hard consent : the law and psychology of engineering consent / Ian Kerr, Jennifer Barrigar, Jacquelyn Burkell, and Katie Black -- Approaches to consent in Canadian data protection law / Philippa Lawson and Mary O'Donoghue -- Learning from data protection law at the nexus of copyright and privacy / Alex Cameron -- A heuristics approach to understanding privacy-protecting behaviors in digital social environments / Robert Carey and Jacquelyn Burkell -- Ubiquitous computing and spatial privacy / Anne Uteck -- Core privacy : a problem for predictive data mining / Jason Millar -- Privacy versus national security : classifying the trade-off / Jennifer Chandler -- Privacy's second home : building a new home for privacy under section 15 of the charter / Daphne Gilbert -- "What have you done for me lately?" Reflections on redeeming privacy for battered women / Jena McGill -- Genetic technologies and medicine : privacy, identity, and informed consent / Marsha Hanen -- Reclaiming the social value of privacy / Valerie Steeves -- A conceptual analysis of identity / Steven Davis -- Identity : difference and categorization / Charles D. Raab -- Identity cards and identity romanticism / A. Michael Froomkin -- What's in a name? Who benefits from the publication ban in sexual assault trials? / Jane Doe -- Life in a fish bowl : feminist interrogations of webcamming / Jane Bailey -- Ubiquitous computing, spatiality, and the construction of identity : directions for policy response / David J. Phillips -- Dignity and selective self-presentation / David Matheson -- The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification / Ian Kerr -- Using biometrics to revisualize the Canada-U.S. border / Shoshana Magnet -- Soul train : the new surveillance in popular music / Gary T. Marx -- Exit node repudiation for anonymity networks / Jeremy Clark, Philippe Gauvin, and Carlisle Adams -- TrackMeNot : resisting surveillance in web search / Daniel C. Howe and Helen Nissenbaum -- Anonymity and the law in the United States / A. Michael Froomkin -- Anonymity and the law in Canada / Carole Lucock and Katie Black -- Anonymity and the law int he United Kingdom / Ian Lloyd -- Anonymity and the law in the Netherlands / Simone van der Hof, Bert-Jaap Koops, and Ronald Leenes -- Anonymity and the law in Italy / Giusella Finocchiaro. During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes. Print version record. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL English. Data protection Law and legislation. http://id.loc.gov/authorities/subjects/sh93000189 Identity (Philosophical concept) http://id.loc.gov/authorities/subjects/sh85064150 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer security Law and legislation. http://id.loc.gov/authorities/subjects/sh2002005084 Freedom of information. http://id.loc.gov/authorities/subjects/sh85051702 Access to Information https://id.nlm.nih.gov/mesh/D022126 Identité. Liberté d'information. identity. aat LAW Privacy. bisacsh Computer security Law and legislation fast Data protection Law and legislation fast Freedom of information fast Identity (Philosophical concept) fast Privacy, Right of fast Datenschutz gnd Privatsphäre gnd http://d-nb.info/gnd/4123980-5 Identität gnd http://d-nb.info/gnd/4026482-8 Anonymität gnd http://d-nb.info/gnd/4471050-1 Computersicherheit gnd Internet gnd http://d-nb.info/gnd/4308416-3 Data protection Law and legislation. nli Identity (Philosophical concept) nli Privacy, Right of. nli Computer security Law and legislation. nli Freedom of information. nli Aufsatzsammlung. Kerr, Ian (Ian R.) https://id.oclc.org/worldcat/entity/E39PBJmtxPR8PcXxx7WP4hTmBP http://id.loc.gov/authorities/names/n2008066534 Steeves, Valerie M., 1959- https://id.oclc.org/worldcat/entity/E39PCjBwQy7ckY9pBtpBTHfH4q http://id.loc.gov/authorities/names/no2005016937 Lucock, Carole. http://id.loc.gov/authorities/names/nr93029362 has work: Lessons from the identity trail (Text) https://id.oclc.org/worldcat/entity/E39PCFw9hWjfyDjQf8kVM3rqjP https://id.oclc.org/worldcat/ontology/hasWork Print version: Lessons from the identity trail. Oxford ; New York : Oxford University Press, ©2009 9780195372472 (DLC) 2008043016 (OCoLC)236333219 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=369098 Volltext |
spellingShingle | Lessons from the identity trail : anonymity, privacy, and identity in a networked society / Soft surveillance, hard consent : the law and psychology of engineering consent / Approaches to consent in Canadian data protection law / Learning from data protection law at the nexus of copyright and privacy / A heuristics approach to understanding privacy-protecting behaviors in digital social environments / Ubiquitous computing and spatial privacy / Core privacy : a problem for predictive data mining / Privacy versus national security : classifying the trade-off / Privacy's second home : building a new home for privacy under section 15 of the charter / "What have you done for me lately?" Reflections on redeeming privacy for battered women / Genetic technologies and medicine : privacy, identity, and informed consent / Reclaiming the social value of privacy / A conceptual analysis of identity / Identity : difference and categorization / Identity cards and identity romanticism / What's in a name? Who benefits from the publication ban in sexual assault trials? / Life in a fish bowl : feminist interrogations of webcamming / Ubiquitous computing, spatiality, and the construction of identity : directions for policy response / Dignity and selective self-presentation / The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification / Using biometrics to revisualize the Canada-U.S. border / Soul train : the new surveillance in popular music / Exit node repudiation for anonymity networks / TrackMeNot : resisting surveillance in web search / Anonymity and the law in the United States / Anonymity and the law in Canada / Anonymity and the law int he United Kingdom / Anonymity and the law in the Netherlands / Anonymity and the law in Italy / Data protection Law and legislation. http://id.loc.gov/authorities/subjects/sh93000189 Identity (Philosophical concept) http://id.loc.gov/authorities/subjects/sh85064150 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer security Law and legislation. http://id.loc.gov/authorities/subjects/sh2002005084 Freedom of information. http://id.loc.gov/authorities/subjects/sh85051702 Access to Information https://id.nlm.nih.gov/mesh/D022126 Identité. Liberté d'information. identity. aat LAW Privacy. bisacsh Computer security Law and legislation fast Data protection Law and legislation fast Freedom of information fast Identity (Philosophical concept) fast Privacy, Right of fast Datenschutz gnd Privatsphäre gnd http://d-nb.info/gnd/4123980-5 Identität gnd http://d-nb.info/gnd/4026482-8 Anonymität gnd http://d-nb.info/gnd/4471050-1 Computersicherheit gnd Internet gnd http://d-nb.info/gnd/4308416-3 Data protection Law and legislation. nli Identity (Philosophical concept) nli Privacy, Right of. nli Computer security Law and legislation. nli Freedom of information. nli |
subject_GND | http://id.loc.gov/authorities/subjects/sh93000189 http://id.loc.gov/authorities/subjects/sh85064150 http://id.loc.gov/authorities/subjects/sh85107029 http://id.loc.gov/authorities/subjects/sh2002005084 http://id.loc.gov/authorities/subjects/sh85051702 https://id.nlm.nih.gov/mesh/D022126 http://d-nb.info/gnd/4123980-5 http://d-nb.info/gnd/4026482-8 http://d-nb.info/gnd/4471050-1 http://d-nb.info/gnd/4308416-3 |
title | Lessons from the identity trail : anonymity, privacy, and identity in a networked society / |
title_alt | Soft surveillance, hard consent : the law and psychology of engineering consent / Approaches to consent in Canadian data protection law / Learning from data protection law at the nexus of copyright and privacy / A heuristics approach to understanding privacy-protecting behaviors in digital social environments / Ubiquitous computing and spatial privacy / Core privacy : a problem for predictive data mining / Privacy versus national security : classifying the trade-off / Privacy's second home : building a new home for privacy under section 15 of the charter / "What have you done for me lately?" Reflections on redeeming privacy for battered women / Genetic technologies and medicine : privacy, identity, and informed consent / Reclaiming the social value of privacy / A conceptual analysis of identity / Identity : difference and categorization / Identity cards and identity romanticism / What's in a name? Who benefits from the publication ban in sexual assault trials? / Life in a fish bowl : feminist interrogations of webcamming / Ubiquitous computing, spatiality, and the construction of identity : directions for policy response / Dignity and selective self-presentation / The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification / Using biometrics to revisualize the Canada-U.S. border / Soul train : the new surveillance in popular music / Exit node repudiation for anonymity networks / TrackMeNot : resisting surveillance in web search / Anonymity and the law in the United States / Anonymity and the law in Canada / Anonymity and the law int he United Kingdom / Anonymity and the law in the Netherlands / Anonymity and the law in Italy / |
title_auth | Lessons from the identity trail : anonymity, privacy, and identity in a networked society / |
title_exact_search | Lessons from the identity trail : anonymity, privacy, and identity in a networked society / |
title_full | Lessons from the identity trail : anonymity, privacy, and identity in a networked society / edited by Ian Kerr, Valerie Steeves, and Carole Lucock. |
title_fullStr | Lessons from the identity trail : anonymity, privacy, and identity in a networked society / edited by Ian Kerr, Valerie Steeves, and Carole Lucock. |
title_full_unstemmed | Lessons from the identity trail : anonymity, privacy, and identity in a networked society / edited by Ian Kerr, Valerie Steeves, and Carole Lucock. |
title_short | Lessons from the identity trail : |
title_sort | lessons from the identity trail anonymity privacy and identity in a networked society |
title_sub | anonymity, privacy, and identity in a networked society / |
topic | Data protection Law and legislation. http://id.loc.gov/authorities/subjects/sh93000189 Identity (Philosophical concept) http://id.loc.gov/authorities/subjects/sh85064150 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer security Law and legislation. http://id.loc.gov/authorities/subjects/sh2002005084 Freedom of information. http://id.loc.gov/authorities/subjects/sh85051702 Access to Information https://id.nlm.nih.gov/mesh/D022126 Identité. Liberté d'information. identity. aat LAW Privacy. bisacsh Computer security Law and legislation fast Data protection Law and legislation fast Freedom of information fast Identity (Philosophical concept) fast Privacy, Right of fast Datenschutz gnd Privatsphäre gnd http://d-nb.info/gnd/4123980-5 Identität gnd http://d-nb.info/gnd/4026482-8 Anonymität gnd http://d-nb.info/gnd/4471050-1 Computersicherheit gnd Internet gnd http://d-nb.info/gnd/4308416-3 Data protection Law and legislation. nli Identity (Philosophical concept) nli Privacy, Right of. nli Computer security Law and legislation. nli Freedom of information. nli |
topic_facet | Data protection Law and legislation. Identity (Philosophical concept) Privacy, Right of. Computer security Law and legislation. Freedom of information. Access to Information Identité. Liberté d'information. identity. LAW Privacy. Computer security Law and legislation Data protection Law and legislation Freedom of information Privacy, Right of Datenschutz Privatsphäre Identität Anonymität Computersicherheit Internet Aufsatzsammlung. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=369098 |
work_keys_str_mv | AT kerrian lessonsfromtheidentitytrailanonymityprivacyandidentityinanetworkedsociety AT steevesvaleriem lessonsfromtheidentitytrailanonymityprivacyandidentityinanetworkedsociety AT lucockcarole lessonsfromtheidentitytrailanonymityprivacyandidentityinanetworkedsociety |