The privacy advocates : (Record no. 73025)

000 -LEADER
fixed length control field 03898nam a2200565 i 4500
001 - CONTROL NUMBER
control field 6267370
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712204644.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151223s2010 maua ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780262026383
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780262268127
-- ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
082 04 - CLASSIFICATION NUMBER
Call Number 323.44/82
100 1# - AUTHOR NAME
Author Bennett, Colin J.
245 14 - TITLE STATEMENT
Title The privacy advocates :
Sub Title resisting the spread of surveillance /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (xxiii, 259 pages) :
520 ## - SUMMARY, ETC.
Summary, etc Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Political Freedom & Security
-- Civil Rights.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Political Freedom & Security
-- Human Rights.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267370
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cambridge, Massachusetts :
-- MIT Press,
-- c2008.
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2010]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Description based on PDF viewed 12/23/2015.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Human rights workers.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Human rights movements.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Human rights advocacy.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Privacy, Right of.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- POLITICAL SCIENCE
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- POLITICAL SCIENCE

No items available.