000 03898nam a2200565 i 4500
001 6267370
003 IEEE
005 20220712204644.0
006 m o d
007 cr |n|||||||||
008 151223s2010 maua ob 001 eng d
020 _a9780262026383
020 _a9780262268127
_qebook
020 _z0262268124
_qelectronic
020 _z9781435677180
_qelectronic
020 _z1435677188
_qelectronic
020 _z0262026384
_qelectronic
035 _a(CaBNVSL)mat06267370
035 _a(IDAMS)0b000064818b4374
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aJC596
_b.B46 2008eb
082 0 4 _a323.44/82
_222
100 1 _aBennett, Colin J.
_q(Colin John),
_d1955-
_922394
245 1 4 _aThe privacy advocates :
_bresisting the spread of surveillance /
_cColin J. Bennett.
264 1 _aCambridge, Massachusetts :
_bMIT Press,
_cc2008.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2010]
300 _a1 PDF (xxiii, 259 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
504 _aIncludes bibliographical references and index.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _aToday, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/23/2015.
650 0 _aHuman rights workers.
_922395
650 0 _aHuman rights movements.
_922396
650 0 _aHuman rights advocacy.
_922397
650 0 _aPrivacy, Right of.
_913192
650 7 _aPOLITICAL SCIENCE
_xPolitical Freedom & Security
_xCivil Rights.
_2bisacsh
_922398
650 7 _aPOLITICAL SCIENCE
_xPolitical Freedom & Security
_xHuman Rights.
_2bisacsh
_922399
655 0 _aElectronic books.
_93294
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_922400
710 2 _aMIT Press,
_epublisher.
_922401
710 2 _aEbrary.
_922402
776 0 8 _iPrint version
_z9780262026383
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267370
942 _cEBK
999 _c73025
_d73025