Why Privacy Isn't Everything

Why Privacy Isn't Everything
Author: Anita L. Allen
Publisher: Rowman & Littlefield
Total Pages: 228
Release: 2003
Genre: Philosophy
ISBN: 9780742514096

Accountability protects public health and safety, facilitates law enforcement, and enhances national security, but it is much more than a bureaucratic concern for corporations, public administrators, and the criminal justice system. In Why Privacy Isn't Everything, Anita L. Allen provides a highly original treatment of neglected issues affecting the intimacies of everyday life, and freshly examines how a preeminent liberal society accommodates the competing demands of vital privacy and vital accountability for personal matters. Thus, 'None of your business ' is at times the wrong thing to say, as much of what appears to be self-regarding conduct has implications for others that should have some bearing on how a person chooses to act. The book addresses such questions as, What does it mean to be accountable for conduct? For what personal matters am I accountable, and to whom? Allen concludes that the sticky webs of accountability that encase ordinary life are flexible enough to accommodate egalitarian moral, legal and social practices that are highly consistent with contemporary feminist reconstructions of liberalism.

Privacy Is Hard and Seven Other Myths

Privacy Is Hard and Seven Other Myths
Author: Jaap-Henk Hoepman
Publisher: MIT Press
Total Pages: 275
Release: 2023-10-03
Genre: Computers
ISBN: 0262547201

An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.

Nothing to Hide

Nothing to Hide
Author: Daniel J. Solove
Publisher: Yale University Press
Total Pages: 271
Release: 2011-05-31
Genre: Law
ISBN: 0300177259

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy"--Jacket.

Information Ethics

Information Ethics
Author: Adam Daniel Moore
Publisher: University of Washington Press
Total Pages: 458
Release: 2012-09-01
Genre: Computers
ISBN: 0295803665

This anthology focuses on the ethical issues surrounding information control in the broadest sense. Anglo-American institutions of intellectual property protect and restrict access to vast amounts of information. Ideas and expressions captured in music, movies, paintings, processes of manufacture, human genetic information, and the like are protected domestically and globally. The ethical issues and tensions surrounding free speech and information control intersect in at least two important respects. First, the commons of thought and expression is threatened by institutions of copyright, patent, and trade secret. While institutions of intellectual property may be necessary for innovation and social progress they may also be detrimental when used by the privileged and economically advantaged to control information access, consumption, and expression. Second, free speech concerns have been allowed to trump privacy interests in all but the most egregious of cases. At the same time, our ability to control access to information about ourselves--what some call "informational privacy"--is rapidly diminishing. Data mining and digital profiling are opening up what most would consider private domains for public consumption and manipulation. Post-9/11, issues of national security have run headlong into individual rights to privacy and free speech concerns. While constitutional guarantees against unwarranted searches and seizures have been relaxed, access to vast amounts of information held by government agencies, libraries, and other information storehouses has been restricted in the name of national security.

Firewalls Don't Stop Dragons

Firewalls Don't Stop Dragons
Author: Carey Parker
Publisher: Apress
Total Pages: 411
Release: 2018-08-24
Genre: Computers
ISBN: 1484238524

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You’ll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don’t really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves—step by step, without judgment, and with as little jargon as possible.

Understanding Privacy

Understanding Privacy
Author: Daniel J. Solove
Publisher: Harvard University Press
Total Pages: 234
Release: 2010-03-30
Genre: Law
ISBN: 0674972031

Privacy is one of the most important concepts of our time, yet it is also one of the most elusive. As rapidly changing technology makes information increasingly available, scholars, activists, and policymakers have struggled to define privacy, with many conceding that the task is virtually impossible. In this concise and lucid book, Daniel J. Solove offers a comprehensive overview of the difficulties involved in discussions of privacy and ultimately provides a provocative resolution. He argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family resemblances. His theory bridges cultural differences and addresses historical changes in views on privacy. Drawing on a broad array of interdisciplinary sources, Solove sets forth a framework for understanding privacy that provides clear, practical guidance for engaging with relevant issues. Understanding Privacy will be an essential introduction to long-standing debates and an invaluable resource for crafting laws and policies about surveillance, data mining, identity theft, state involvement in reproductive and marital decisions, and other pressing contemporary matters concerning privacy.

The Privacy Fallacy

The Privacy Fallacy
Author: Ignacio Cofone
Publisher: Cambridge University Press
Total Pages: 261
Release: 2023-11-30
Genre: Law
ISBN: 1009002546

Our privacy is besieged by tech companies. Companies can do this because our laws are built on outdated ideas that trap lawmakers, regulators, and courts into wrong assumptions about privacy, resulting in ineffective legal remedies to one of the most pressing concerns of our generation. Drawing on behavioral science, sociology, and economics, Ignacio Cofone challenges existing laws and reform proposals and dispels enduring misconceptions about data-driven interactions. This exploration offers readers a holistic view of why current laws and regulations fail to protect us against corporate digital harms, particularly those created by AI. Cofone then proposes a better response: meaningful accountability for the consequences of corporate data practices, which ultimately entails creating a new type of liability that recognizes the value of privacy.

Uneasy Access

Uneasy Access
Author: Anita L. Allen
Publisher: Rowman & Littlefield
Total Pages: 244
Release: 1988
Genre: Law
ISBN: 9780847673285

'Anita L. Allen breaks new ground...A stunning indictment of women's status in contemporary society, her book provides vital original scholarly research and insight.' |s-NEW DIRECTIONS FOR WOMEN

Writing Computer and Information History

Writing Computer and Information History
Author: William Aspray
Publisher: Rowman & Littlefield
Total Pages: 515
Release: 2024-05-14
Genre: Language Arts & Disciplines
ISBN: 153818382X

This is not a book about the history of computing or the history of information. Instead, it is a meta-historical book about the research and writing of these types of history. The formal presentation of historical research in the form of a publication often hides the process by which the topic was selected, boundaries were drawn, evidence was selected, analytic approach was chosen and applied, results were presented, how this work fits into a larger body of scholarship, the implicit goals and biases of the author, and many other similar issues. This process of learning about the various ways to carry out computer history or information history can be enriched by this collection of reflective essays by experienced scholars, discussing the craft that they practice. This is a book that concerns both computer history and information history. The first scholarship in computer history by professionally trained scholars began to appear in the 1970s, so we are approaching a half century of research and publication in this area. The field has generated numerous pieces of exemplary scholarship from various perspectives such as intellectual history of individual technologies, business histories of firms, economic histories of market sectors, externalist histories of funding and professionalization, and so on. However, the field continues to evolve, especially as computing and communication technologies have drawn together in the form of the Internet and social media; and with them a new set of scholars is participating, drawn not only from the history of science and technology, but also from the communication and media studies fields. Powerful theories, approaches, and frameworks are being increasingly drawn more widely from both the humanities and the social sciences to inform the practice of computer history. The scholars in this volume look at what’s happened, what’s happening now, and where historical scholarship in these disciplines is headed.

The Internet in Everything

The Internet in Everything
Author: Laura DeNardis
Publisher: Yale University Press
Total Pages: 286
Release: 2020-01-07
Genre: Social Science
ISBN: 0300233078

A compelling argument that the Internet of things threatens human rights and security "Sobering and important."--Financial Times, "Best Books of 2020: Technology" The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of things--connecting everything from cars to cardiac monitors to home appliances--there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in loss of communication but also potentially in loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach across borders to disrupt real-world systems. Laura DeNardis argues that the diffusion of the Internet into the physical world radically escalates governance concerns around privacy, discrimination, human safety, democracy, and national security, and she offers new cyber-policy solutions. In her discussion, she makes visible the sinews of power already embedded in our technology and explores how hidden technical governance arrangements will become the constitution of our future.