ebook img

Privacy In The Information Society PDF

575 Pages·2016·43.706 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Privacy In The Information Society

Privacy in the Information Society The Library of Essays on Law and Privacy Series Editor: Philip Leith Titles in the Series: The Individual and Privacy Volume I Joseph A. Cannataci Privacy in the Information Society Volume II Philip Leith Security and Privacy Volume III Joseph Savirimuthu Privacy in the Information Society Volume II Edited by Philip Leith Queens University ofB elfast, UK First published 2015 by Ashgate Publishing Published 2016 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN 711 Third Avenue, New York, NY 10017, USA Routledge is an imprint oft he Taylor & Francis Group, an informa business Copyright © 2015 Philip Leith. For copyright of individual articles please refer to the Acknowledgements. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Wherever possible, these reprints are made from a copy of the original printing, but these can themselves be of very variable quality. Whilst the publisher has made every effort to ensure the quality of the reprint, some variability may inevitably remain. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library. Library of Congress Control Number: 2014946839 ISBN 9781409441281 (hbk) Contents Acknowledgements ix Series Preface xiii Introduction XV PART I PRIVACY GENERALLY Ellen A. Rose (2006), 'An Examination of the Concern for Information Privacy in the New Zealand Regulatory Context', Information and Management, 43, pp. 322-35. 3 2 RichardS. Murphy (1996), 'Property Rights in Personal Information: An Economic Defense of Privacy', Georgetown Law Journal, 84, pp. 2381-417. 17 3 Godwin J. Udo (2001), 'Privacy and Security Concerns as Major Barriers for e-Commerce: A Survey Study', Information Management & Computer Security, 9, pp. 165-74. 55 4 Marc Langheinrich (2001), 'Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems', Lecture Notes in Computer Science, 2201, pp. 273-91. 65 5 Christopher Soghoian (2007), 'The Problem of Anonymous Vanity Searches', liS: A Journal ofL aw and Policy for the Information Society, 3, pp. 297-316. 85 PART II DATA PROTECTION AND COMMERCE 6 Lucas Bergkamp (2002), 'EU Data Protection Policy. The Privacy Fallacy: Adverse Effects of Europe's Data Protection Policy in an Information-Driven Economy', Computer Law and Security Report, 18, pp. 31-47. 107 7 Ellen R. Foxman and Paula Kilcoyne (1993), 'Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues', Journal ofP ublic Policy & Marketing, 12, pp. 106-19. 125 8 Roger Brownsword (2009), 'Consent in Data Protection Law: Privacy, Fair Processing and Confidentiality', in Serge Gutwirth ( ed.), Reinventing Data Protection?, Dordrecht: Springer, pp. 83-110. 139 9 Rebecca Wong (2012), 'The Data Protection Directive 95/46/EC: Idealisms and Realisms', International Review ofL aw, Computers & Technology, 26, pp. 229-44. 167 10 Joanna Penn (2012), 'Behavioral Advertising: The Cryptic Hunter and Gatherer of the Internet', Federal Communications Law Journal, 64, pp. 599-616. 183 11 Stephen E. Fienberg (2006), 'Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation', Statistical Science, 21, pp. 143-54. 201 vi Privacy in the Information Society 12 Damon Greer (2011), 'Safe Harbor-A Framework That Works', International Data Privacy Law, 1, pp. 143--48. 213 13 Gehan Gunasekara (2007), 'The "Final" Privacy Frontier? Regulating Trans-Border Data Flows', International Journal of Law and Information Technology, 15, pp. 362-94. 219 14 Molly Jennings (2012), 'To Track or Not to Track: Recent Legislative Proposals to Protect Consumer Privacy', Harvard Journal on Legislation, 49, pp. 193-206. 253 PART III BIOMETRICS 15 John D. Woodward (1997), 'Biometrics: Privacy's Foe or Privacy's Friend?', Proceedings of the Institute of Electrical and Electronic Engineers, 85, pp. 1480-92. 269 16 Marek Rejman-Greene (2005), 'Privacy Issues in the Application of Biometrics: A European Perspective', in James L. Wayman, Ani I K. Jain, Davide Maltoni and Dario Maio (eds), Biometric Systems: Technology, Design and Performance Evaluation, New York: Springer, pp. 335-59. 283 17 Irma van der Ploeg (2003), 'Biometrics and Privacy: A Note on the Politics of Theorizing Technology', Information, Communication & Society, 6, pp. 85-104. 309 18 Colin Soutar (2011 ), 'Biometric Technologies in Support of Identity and Privacy Assurance', Biometric Technology Today, 10, pp. 5-9. 329 19 Jan Grijpink (2001), 'Privacy Law: Biometrics and Privacy', Computer Law & Security Review, 17, pp. 154-60. 335 PART IV THE CLOUD 20 Vassilka Tchifilionova (20 11 ), 'Security and Privacy Implications of Cloud Computing-Lost in the Cloud', Lecture Notes in Computer Science, 6555, pp. 149-58. 345 21 Dan Svantesson and Roger Clarke (2010), 'Privacy and Consumer Risks in Cloud Computing', Computer Law & Security Review, 26, pp. 391-97. 355 22 M. Taylor, J. Haggerty, D. Gresty and R. Hegarty (2010), 'Digital Evidence in Cloud Computing Systems', Computer Law & Security Review, 26, pp. 304-8. 363 23 Paul Lanois (2010), 'Caught in the Clouds: The Web 2.0, Cloud Computing, and Privacy?', Northwestern Journal of Technology and Intellectual Property, 9, pp. 29--49. 369 PART V GEO-LOCATION 24 Lindsey A. Strachan (2011), 'Re-Mapping Privacy Law: How the Google Maps Scandal Requires Tort Law Reform', Richmond Journal ofL aw and Technology, 17,pp. 1-30. 393 25 Dan Jerker B. Svantesson (2007), 'E-Commerce Tax: How the Taxman Brought Geography to the "Borderless" Internet', Revenue Law Journal, 17, pp. 1-9. 423 Privacy in the Information Society vii 26 Brent Hecht, Lichan Hong, Bongwon Suh and Ed H. Chi (2011), 'Tweets from Justin Bieber's Heart: The Dynamics ofthe "Location" Field in User Profiles', Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 237--46. 433 PART VI SOCIAL NETWORKS 27 Amanda Lenhart and Mary Madden (2007), 'Teens, Privacy & Online Social Networks: How Teens Manage Their Online Identities and Personal Information in the Age of MySpace', Pew Internet & American Life Project, pp. i-vii. 445 28 Patricia G. Lange (2007), 'Publicly Private and Privately Public: Social Networking on YouTube', Journal of Computer-Mediated Communication, 13, pp.361-80. 453 29 Leigh A. Clark and Sherry J. Roberts (2010), 'Employer's Use of Social Networking Sites: A Socially Irresponsible Practice', Journal of Business Ethics, 95, pp. 507-25. 473 30 Bruce L. Mann (2008), 'Social Networking Websites-A Concatenation of Impersonation, Denigration, Sexual Aggressive Solicitation, Cyber-Bullying or Happy Slapping Videos', International Journal of Law and Information Technology, 17, pp. 252-67. 493 PART VII HEALTH CARE 31 Simon Chapman, Kim McLeod, Melanie Wakefield and Simon Holding (2005), 'Impact ofNews of Celebrity Illness on Breast Cancer Screening: Kylie Minogue's Breast Cancer Diagnosis', Medical Journal ofA ustralia, 183, pp. 247-50. 511 32 Thomas C. Rindfleisch (1997), 'Privacy, Information Technology, and Health Care', Communications of the ACM, 40, pp. 93-100. 515 33 Jon F. Merz, Glenn E. McGee and Pamela Sankar (2004), '"Iceland Inc."?: On the Ethics of Commercial Population Genomics', Social Science & Medicine, 58, pp. 1201-9. 523 34 Gerard Rushton, Marc P. Armstrong, Josephine Gittler, Barry R. Greene, Claire E. Pavlik, Michele M. West and Dale L. Zimmerman (2006), 'Geocoding in Cancer Research: A Review', American Journal ofP reventive Medicine, 30, pp. S16-S24. 533 Name Index 543 Acknowledgements Ashgate would like to thank the researchers and the contributing authors who provided copies, along with the following for their permission to reprint copyright material. Association for Computing Machinery, Inc. for the essays: Brent Hecht, Lichan Hong, Bongwon Suh and Ed H. Chi (2011), 'Tweets from Justin Bieber's Heart: The Dynamics of the "Location" Field in User Profiles', Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 237-46. Copyright© 2011 ACM; Thomas C. Rindfleisch (1997), 'Privacy, Information Technology, and Health Care', Communications of the ACM, 40, pp. 93-l 00. Copyright © 1997 ACM. Australian Medical Publishing Company for the essay: Simon Chapman, Kim McLeod, Melanie Wakefield and Simon Holding (2005), 'Impact ofNews of Celebrity Illness on Breast Cancer Screening: Kylie Minogue's Breast Cancer Diagnosis', Medical Journal ofA ustralia, 183, pp. 247-50. Copyright © 2005 The Medical Journal of Australia. Reproduced with permission. Bond University and the Revenue Law Journal for the essay: Dan Jerker B. Svantesson (2007), 'E-Commerce Tax: How the Taxman Brought Geography to the "Borderless" Internet', Revenue Law Journal, 17, pp. l-9. Elsevier for the essays: Ellen A. Rose (2006), 'An Examination of the Concern for Information Privacy in the New Zealand Regulatory Context', Information and Management, 43, pp. 322- 35. Copyright© 2006 Elsevier B.V. All rights reserved; Lucas Bergkamp (2002), 'EU Data Protection Policy. The Privacy Fallacy: Adverse Effects of Europe's Data Protection Policy in an Information-Driven Economy', Computer Law and Security Report, 18, pp. 31-47. Copyright© 2002 Elsevier Science Ltd. All rights reserved; Colin Soutar (2011), 'Biometric Technologies in Support of Identity and Privacy Assurance', Biometric Technology Today, 10, pp. 5-9; Jan Grijpink (200 1) , 'Privacy Law: Biometrics and Privacy', Computer Law & Security Review, 17, pp. 154-60. Copyright © 200 I Elsevier Science Ltd. All rights reserved; Dan Svantesson and Roger Clarke (2010), 'Privacy and Consumer Risks in Cloud Computing', Computer Law & Security Review, 26, pp. 391-97. Copyright© 2010 Svantesson and Clarke. Published by Elsevier Ltd. All rights reserved; M. Taylor, J. Haggerty, D. Gresty and R. Hegarty (20 I 0), 'Digital Evidence in Cloud Computing Systems', Computer Law & Security Review, 26, pp. 304-8. Copyright© 2010 M. Taylor, J. Haggerty, D. Gresty and R. Hegarty. Published by Elsevier Ltd. All rights reserved; Jon F. Merz, Glenn E. McGee and Pamela Sankar (2004), '"Iceland Inc."?: On the Ethics of Commercial Population Genomics', Social Science & Medicine, 58, pp 1201-9. Copyright © 2003 Elsevier Ltd. All rights reserved; Gerard Rushton, Marc P. Armstrong, Josephine Gittler, Barry R. Greene, Claire E. Pavlik, Michele M. West and Dale L. Zimmerman (2006), 'Geocoding in Cancer Research:

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.