The Resource Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock
Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock
Resource Information
The item Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes
- Language
- eng
- Extent
- 1 online resource (xxxi, 554 pages)
- Contents
-
- Ubiquitous computing and spatial privacy
- Anne Uteck
- Core privacy : a problem for predictive data mining
- Jason Millar
- Privacy versus national security : classifying the trade-off
- Jennifer Chandler
- Privacy's second home : building a new home for privacy under section 15 of the charter
- Daphne Gilbert
- "What have you done for me lately?" Reflections on redeeming privacy for battered women
- Jena McGill
- Soft surveillance, hard consent : the law and psychology of engineering consent
- Genetic technologies and medicine : privacy, identity, and informed consent
- Marsha Hanen
- Reclaiming the social value of privacy
- Valerie Steeves
- A conceptual analysis of identity
- Steven Davis
- Identity : difference and categorization
- Charles D. Raab
- Identity cards and identity romanticism
- A. Michael Froomkin
- Ian Kerr, Jennifer Barrigar, Jacquelyn Burkell, and Katie Black
- What's in a name? Who benefits from the publication ban in sexual assault trials?
- Jane Doe
- Life in a fish bowl : feminist interrogations of webcamming
- Jane Bailey
- Ubiquitous computing, spatiality, and the construction of identity : directions for policy response
- David J. Phillips
- Dignity and selective self-presentation
- David Matheson
- The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification
- Ian Kerr
- Approaches to consent in Canadian data protection law
- Using biometrics to revisualize the Canada-U.S. border
- Shoshana Magnet
- Soul train : the new surveillance in popular music
- Gary T. Marx
- Exit node repudiation for anonymity networks
- Jeremy Clark, Philippe Gauvin, and Carlisle Adams
- TrackMeNot : resisting surveillance in web search
- Daniel C. Howe and Helen Nissenbaum
- Anonymity and the law in the United States
- A. Michael Froomkin
- Philippa Lawson and Mary O'Donoghue
- Anonymity and the law in Canada
- Carole Lucock and Katie Black
- Anonymity and the law int he United Kingdom
- Ian Lloyd
- Anonymity and the law in the Netherlands
- Simone van der Hof, Bert-Jaap Koops, and Ronald Leenes
- Anonymity and the law in Italy
- Giusella Finocchiaro
- Learning from data protection law at the nexus of copyright and privacy
- Alex Cameron
- A heuristics approach to understanding privacy-protecting behaviors in digital social environments
- Robert Carey and Jacquelyn Burkell
- Isbn
- 9786613130044
- Label
- Lessons from the identity trail : anonymity, privacy, and identity in a networked society
- Title
- Lessons from the identity trail
- Title remainder
- anonymity, privacy, and identity in a networked society
- Statement of responsibility
- edited by Ian Kerr, Valerie Steeves, and Carole Lucock
- Subject
-
- Privatsphäre
- Anonymität
- Computer security -- Law and legislation
- Computer security -- Law and legislation
- Computersicherheit
- Data protection -- Law and legislation
- Data protection -- Law and legislation
- Datenschutz
- Electronic book
- Electronic books
- Electronic books
- Freedom of information
- Freedom of information
- Identity (Philosophical concept)
- Identity (Philosophical concept)
- Identität
- Internet
- Internet
- LAW -- Privacy
- Privacy, Right of
- Privacy, Right of
- Language
- eng
- Summary
- During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these newand emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in anenvironment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recentresearch outcomes
- Action
- digitized
- Cataloging source
- N$T
- Dewey number
- 342.08/58
- Illustrations
- illustrations
- Index
- index present
- Language note
- English
- LC call number
- K3264.C65
- LC item number
- L47 2009eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
- 1959-
- http://library.link/vocab/relatedWorkOrContributorName
-
- Kerr, Ian
- Steeves, Valerie M.
- Lucock, Carole
- http://library.link/vocab/subjectName
-
- Data protection
- Identity (Philosophical concept)
- Privacy, Right of
- Computer security
- Freedom of information
- LAW
- Computer security
- Data protection
- Freedom of information
- Identity (Philosophical concept)
- Privacy, Right of
- Datenschutz
- Privatsphäre
- Identität
- Anonymität
- Computersicherheit
- Internet
- Label
- Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Ubiquitous computing and spatial privacy
- Anne Uteck
- Core privacy : a problem for predictive data mining
- Jason Millar
- Privacy versus national security : classifying the trade-off
- Jennifer Chandler
- Privacy's second home : building a new home for privacy under section 15 of the charter
- Daphne Gilbert
- "What have you done for me lately?" Reflections on redeeming privacy for battered women
- Jena McGill
- Soft surveillance, hard consent : the law and psychology of engineering consent
- Genetic technologies and medicine : privacy, identity, and informed consent
- Marsha Hanen
- Reclaiming the social value of privacy
- Valerie Steeves
- A conceptual analysis of identity
- Steven Davis
- Identity : difference and categorization
- Charles D. Raab
- Identity cards and identity romanticism
- A. Michael Froomkin
- Ian Kerr, Jennifer Barrigar, Jacquelyn Burkell, and Katie Black
- What's in a name? Who benefits from the publication ban in sexual assault trials?
- Jane Doe
- Life in a fish bowl : feminist interrogations of webcamming
- Jane Bailey
- Ubiquitous computing, spatiality, and the construction of identity : directions for policy response
- David J. Phillips
- Dignity and selective self-presentation
- David Matheson
- The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification
- Ian Kerr
- Approaches to consent in Canadian data protection law
- Using biometrics to revisualize the Canada-U.S. border
- Shoshana Magnet
- Soul train : the new surveillance in popular music
- Gary T. Marx
- Exit node repudiation for anonymity networks
- Jeremy Clark, Philippe Gauvin, and Carlisle Adams
- TrackMeNot : resisting surveillance in web search
- Daniel C. Howe and Helen Nissenbaum
- Anonymity and the law in the United States
- A. Michael Froomkin
- Philippa Lawson and Mary O'Donoghue
- Anonymity and the law in Canada
- Carole Lucock and Katie Black
- Anonymity and the law int he United Kingdom
- Ian Lloyd
- Anonymity and the law in the Netherlands
- Simone van der Hof, Bert-Jaap Koops, and Ronald Leenes
- Anonymity and the law in Italy
- Giusella Finocchiaro
- Learning from data protection law at the nexus of copyright and privacy
- Alex Cameron
- A heuristics approach to understanding privacy-protecting behaviors in digital social environments
- Robert Carey and Jacquelyn Burkell
- Control code
- 729246265
- Dimensions
- unknown
- Extent
- 1 online resource (xxxi, 554 pages)
- File format
- unknown
- Form of item
- online
- Isbn
- 9786613130044
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Reproduction note
- Electronic reproduction.
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)729246265
- System details
- Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
- Label
- Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Ubiquitous computing and spatial privacy
- Anne Uteck
- Core privacy : a problem for predictive data mining
- Jason Millar
- Privacy versus national security : classifying the trade-off
- Jennifer Chandler
- Privacy's second home : building a new home for privacy under section 15 of the charter
- Daphne Gilbert
- "What have you done for me lately?" Reflections on redeeming privacy for battered women
- Jena McGill
- Soft surveillance, hard consent : the law and psychology of engineering consent
- Genetic technologies and medicine : privacy, identity, and informed consent
- Marsha Hanen
- Reclaiming the social value of privacy
- Valerie Steeves
- A conceptual analysis of identity
- Steven Davis
- Identity : difference and categorization
- Charles D. Raab
- Identity cards and identity romanticism
- A. Michael Froomkin
- Ian Kerr, Jennifer Barrigar, Jacquelyn Burkell, and Katie Black
- What's in a name? Who benefits from the publication ban in sexual assault trials?
- Jane Doe
- Life in a fish bowl : feminist interrogations of webcamming
- Jane Bailey
- Ubiquitous computing, spatiality, and the construction of identity : directions for policy response
- David J. Phillips
- Dignity and selective self-presentation
- David Matheson
- The Internet of people? Reflections on the future regulation of human-implantable radio frequency identification
- Ian Kerr
- Approaches to consent in Canadian data protection law
- Using biometrics to revisualize the Canada-U.S. border
- Shoshana Magnet
- Soul train : the new surveillance in popular music
- Gary T. Marx
- Exit node repudiation for anonymity networks
- Jeremy Clark, Philippe Gauvin, and Carlisle Adams
- TrackMeNot : resisting surveillance in web search
- Daniel C. Howe and Helen Nissenbaum
- Anonymity and the law in the United States
- A. Michael Froomkin
- Philippa Lawson and Mary O'Donoghue
- Anonymity and the law in Canada
- Carole Lucock and Katie Black
- Anonymity and the law int he United Kingdom
- Ian Lloyd
- Anonymity and the law in the Netherlands
- Simone van der Hof, Bert-Jaap Koops, and Ronald Leenes
- Anonymity and the law in Italy
- Giusella Finocchiaro
- Learning from data protection law at the nexus of copyright and privacy
- Alex Cameron
- A heuristics approach to understanding privacy-protecting behaviors in digital social environments
- Robert Carey and Jacquelyn Burkell
- Control code
- 729246265
- Dimensions
- unknown
- Extent
- 1 online resource (xxxi, 554 pages)
- File format
- unknown
- Form of item
- online
- Isbn
- 9786613130044
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Reproduction note
- Electronic reproduction.
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)729246265
- System details
- Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Subject
- Privatsphäre
- Anonymität
- Computer security -- Law and legislation
- Computer security -- Law and legislation
- Computersicherheit
- Data protection -- Law and legislation
- Data protection -- Law and legislation
- Datenschutz
- Electronic book
- Electronic books
- Electronic books
- Freedom of information
- Freedom of information
- Identity (Philosophical concept)
- Identity (Philosophical concept)
- Identität
- Internet
- Internet
- LAW -- Privacy
- Privacy, Right of
- Privacy, Right of
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Lessons-from-the-identity-trail--anonymity/tiA3YfaNHzw/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Lessons-from-the-identity-trail--anonymity/tiA3YfaNHzw/">Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Lessons-from-the-identity-trail--anonymity/tiA3YfaNHzw/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Lessons-from-the-identity-trail--anonymity/tiA3YfaNHzw/">Lessons from the identity trail : anonymity, privacy, and identity in a networked society, edited by Ian Kerr, Valerie Steeves, and Carole Lucock</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>