Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Privacy and Technologies of Identity (eBook)

A Cross-Disciplinary Conversation
eBook Download: PDF
2005 | 2006
XVI, 384 Seiten
Springer US (Verlag)
978-0-387-28222-0 (ISBN)

Lese- und Medienproben

Privacy and Technologies of Identity -
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the 'basics' of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy.

This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.


Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "e;basics"e; of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy.This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.

Contents 5
Contributing Authors 9
Preface 13
Acknowledgments 15
I Introductory Issues in Privacy and Technology 17
Chapter 1 THE DIGITAL PERSON AND THE FUTURE OF PRIVACY 18
Chapter 2 PRIVACY AND RATIONALITY 30
Chapter 3 SOCIAL NORMS, SELF CONTROL, AND PRIVACY IN THE ONLINE WORLD 46
II Privacy Implications of RFID and Location Tracking 70
Chapter 4 RFID PRIVACY 72
Chapter 5 GEOLOCATION AND LOCATIONAL PRIVACY 90
Chapter 6 PRIVACY INALIENABILITY AND PERSONAL DATA CHIPS 108
Ill Privacy Implieations of Biometrie Teehnologies 130
Chapter 7 BIOMETRICS 132
Chapter 8 BIOMETRICS: APPLICATIONS, CHALLENGES AND THE FUTURE 150
Chapter 9 CONSTRUCTING POLICY 166
Chapter 10 FINDING WALDO 188
IV Privacy Implications of Data Mining and Targeted Marketing 205
Chapter 11 DATA MINING AND PRIVACY: AN OVERVIEW 206
Chapter 12 ONLINE PRIVACY, TAILORING, AND PERSUASION 224
Chapter 13 DATA MINING AND ATTENTION CONSUMPTION 240
Chapter 14 IS PRIVACY REGULATION THE ENVIRONMENTAL LAW OF THE INFORMATION AGE? 254
Chapter 15 DOCUMENT SANITIZATION IN THE AGE OF DATA MINING 270
Chapter 16 NYMITY, P2P & ISPs
Chapter 17 FOURTH AMENDMENT LIMITS ON NATIONAL IDENTITY CARDS 310
Chapter 18 PRIVACY ISSUES IN AN ELECTRONIC VOTING MACHINE 328
Chapter 19 HIDDEN- WEB PRIVACY PRESERVATION SURFING ( HI- WEPPS) MODEL 350
Chapter 20 GLOBAL DISCLOSURE RISK FOR MICRODATA WITH CONTINUOUS ATTRIBUTES 364
References 380
Index 396

Erscheint lt. Verlag 12.12.2005
Zusatzinfo XVI, 384 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Web / Internet
Sozialwissenschaften Politik / Verwaltung
Technik Elektrotechnik / Energietechnik
Schlagworte anonymity • Behavioral Economics • Biometric • Communication • Data Mining • Electronic Commerce • Identity • Information • Information Security • metrics • privacy • Radio-Frequency Identification (RFID) • RFID
ISBN-10 0-387-28222-X / 038728222X
ISBN-13 978-0-387-28222-0 / 9780387282220
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 21,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95