It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 05502cam 2200457 i 4500
001 9925310101801661
005 20171111043358.4
007 ta
008 160830s2016 nyu b 001 0 eng
010 $a 2016030615
019 $a959594681$a959596593$a959660935
020 $a9781433124952 (hardcover : alk. paper)
020 $a1433124955 (hardcover : alk. paper)
020 $a9781433124945 (pbk. : alk. paper)
020 $a1433124947 (pbk. : alk. paper)
020 $z9781453918241 (e-book)
024 8 $a40026877887
035 $a99976415054
035 $a(OCoLC)957696440$z(OCoLC)959594681$z(OCoLC)959596593$z(OCoLC)959660935
035 $a(OCoLC)ocn957696440
040 $aDLC$beng$erda$cDLC$dOCLCF$dBTCTA$dYDX$dYUS$dCHVBK$dOVY$dERASA$dU3G
042 $apcc
043 $an-us---
050 00 $aJC596.2.U6$bL35 2016
082 00 $a323.44/820973$223
100 1 $aLamoureux, Edward Lee,$eauthor.
245 10 $aPrivacy, surveillance, and the new media you /$cEdward Lee Lamoureux.
264 1 $aNew York :$bPeter Lang,$c[2016]
300 $axl, 247 pages ;$c23 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aDigital formations ;$vvol. 96
504 $aIncludes bibliographical references and index.
520 $a"Very little in the American way of life functions adequately under surveillance. Democracy itself may be at mortal risk due to the loss of privacy and the increase in surveillance. Examining challenges in a wide range of contexts, this book investigates and critically examines our systems of data management, including the ways that data are collected, exchanged, analyzed, and re-purposed. The volume calls for re-establishing personal privacy as a societal norm and priority, requiring action on the part of everyone at personal, societal, business, and governmental levels. Because new media products and services are professionally designed and implemented to be frictionless and highly rewarding, change is difficult and solutions are not easy. This volume provides insight into challenges and recommended solutions."$c--Amazon.
505 00 $aMachine generated contents note:$gch. 1$tThe Harms --$tLoss of Control over Personal Data --$tHacking as Lawlessness --$tLeaks and Sponges: We Were Not Supposed to Collect It or Lose It --$tCosts and Harms of Data Breaches --$tUndermining Constitutional Protections --$tEncroaching on First Amendment Protections --$tEncroaching on Third Amendment Protections --$tEncroaching on Fourth Amendment Protections --$tEncroaching on Fifth Amendment Protections --$tEncroaching on Fourteenth Amendment Protections --$tArticle III: No Harm No Foul? Perhaps Not So Much --$tPersonal Data and the Value Equation --$gch. 2$tCenterings --$tTheoretical Orientations --$tInterrogating New Media --$tThe Framework of Contextual Integrity --$tIdentifying Loci of Control --$tIdeological Powers in Platforms --$gch. 3$tFIP 1: No Secret Data Collection --$tWhen Is a Contract Just Barely, or Not, a Contract? --$tData Anonymity via Aggregation as Oxymoron --$tEven the Most Private Datum Isn't --$tKnowing about the Unknowable --$tQuick Reminder: The Constitution Is Supposed to Protect Our Privacy --$gch. 4$tFIPs 2 and 4: Discovery and Repair --$tYou Can't Fix It If You Don't Know About -- And Can't Access -- It --$tOnline Privacy and the European Union --$tThe Right to Be Forgotten --$tOwnership of Social Media Accounts in the Enterprise: "Unhand My Stuff!" --$tToward Chapter 5 and the Third FIP --$gch. 5$tFIP 3: One Use Should Not Bind Them All --$tData Collection and Security: Commercial Entities Sharing with the Government --$tBattles over Encryption and Cryptography --$tEncryption and Export Controls --$tThe Snowden Revelations --$tData Collection and Insecurity: The Government Sharing with Commercial Entities --$tCrossing Government and Commercial Streams within the Data Marketplace --$tWe Claim to Know Better but Do Not Act Like It --$gch. 6$tFIP 5: If You Don't Protect It, You Should Not Have It --$tImproved Data Reliability via the Marketplace --$tBig Data Can Aid Problem Solving --$tRecommendations Can Help --$tImproved Targeting Can Be Good for Both Sides --$tThe Usability and Functionality Lies --$tUnreliability via the Marketplace --$tData Abuse via the Marketplace --$tYou Can Touch This Because I Can't Protect It --$gch. 7$tRecommendations --$tAction Proposals for Government --$tExecutive Leadership --$tFederal Agencies --$tCongressional Legislation --$tCongressional Legislative Action on Commercial Activities --$tCongressional Legislative Action on Intelligence Activities --$tIntelligence Community and Law Enforcement --$tJudges and Courts --$tState-Level Actions --$tStates and the FIPs: Constraint of Government Agencies and Law Enforcement from Predatory Practices --$tState-Based Actions in the Commercial Privacy Environment --$tAction Proposals for Commercial Entities --$tIndustry Leadership --$tExecutive Leadership --$tWorker Behaviors --$tProtocol Changes --$tPrivacy Policies and Terms of Service --$tFlip the Defaults --$tOffer Multiple Versions --$tReconsider Data as Revenue Streams --$tReengineer Data Anonymity --$tNonprofits: Great Responsibilities --$tWE, the People.
650 0 $aPrivacy, Right of$zUnited States.
650 0 $aElectronic surveillance$zUnited States.
830 0 $aDigital formations ;$vv. 96.
947 $hCIRCSTACKS$r31786103115066
980 $a99976415054