You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
“Places of risk” and “sites of modernity” refer not merely to physical locations, but also objects and institutions that stand at the center of contemporary debates on security and risk. These are social and political domains where energy and infrastructure are produced, where domestic security is pursued and maintained, and where citizens encounter the state in its punitive or monitory roles. Taking a wide view of the period from the 1970s to today, this volume brings together innovative, interdisciplinary case studies of sites of modernity that promise to provide security and safety, yet at the same time are deemed responsible for creating new risks. With a particular contemporary interest in the technocratic changes of security and risk control the contributors to Sites of Modernity — Places of Risk position the 1970s as a turning point in the path from industrial to post-industrial modernity.
This book celebrates the 40th anniversary of the creation of the CRID and the 10th anniversary of its successor, the CRIDS. It gathers twenty-one very high quality contributions on extremely interesting and topical aspects of data protection. The authors come from Europe as well as from the United States of America and Canada. Their contributions have been grouped as follows: 1° ICT Governance; 2° Commodification & Competition; 3° Secret surveillance; 4° Whistleblowing; 5° Social Medias, Web Archiving & Journalism; 6° Automated individual decision-making; 7° Data Security; 8° Privacy by design; 9° Health, AI, Scientific Research & Post-Mortem Privacy. This book is intended for all academics, researchers, students and practitioners who have an interest in privacy and data protection.
DIVOn the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?/divDIV /divDIVIn this accessible book, cyber-law expert Anupam Chander provides the first thorough discussion of the law that relates to global Internet commerce. Addressing up-to-the-minute examples, such as Google’s struggles with China, the Pirate Bay’s skirmishes with Hollywood, and the outsourcing of services to India, the author insightfully analyzes the difficulties of regulating Internet trade. Chander then lays out a framework for future policies, showing how countries can dismantle barriers while still protecting consumer interests./div
In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation. During this era of cultural change and political polarization, the expansion, bureaucratization, and computerization of population surveillance disrupted the norms that had governed the exchange and use of personal information in earlier decades and gave rise to a set of distinctly postindustrial social conflicts centered on the use of personal information as a means of social governance in the welfare state. Combining vast archival research with a groundbreaking theoretical analysis, this book gives a definitive account of the politics of personal information in West Germany at the dawn of the information society.
In this topically relevant book on modern ethical issues, Dorff focuses on personal ethics, Judaism's distinctive way of understanding human nature, our role in life, and what we should strive to be, both as individuals and as members of a community. Dorff addresses specific moral issues that affect our personal lives: privacy, particularly at work as it is affected by the Internet and other modern technologies; sex in and outside of marriage; family matters, such as adoption, surrogate motherhood, stepfamilies, divorce, parenting, and family violence; homosexuality; justice, mercy, and forgiveness; and charitable acts and social action.
This book constitutes the thoroughly refereed post-conference proceedings of the Third Annual Privacy Forum, APF 2015, held in Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume were carefully reviewed and selected from 24 submissions. The topics focus on privacy by design (PbD), i.e. the attempt to combine technical and organizational measures to ensure the basic rights of the individual. The papers are organized in three sessions: measuring privacy; rules and principles; legal and economic perspectives on privacy.
Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." –V. Reding, Commissioner, Responsible for Information Society and Media (EU)
This book examines the ability of citizens across ten European countries to exercise their democratic rights to access their personal data. It presents a socio-legal research project, with the researchers acting as citizens, or data subjects, and using ethnographic data collection methods. The research presented here evidences a myriad of strategies and discourses employed by a range of public and private sector organizations as they obstruct and restrict citizens' attempts to exercise their informational rights. The book also provides an up-to-date legal analysis of legal frameworks across Europe concerning access rights and makes several policy recommendations in the area of informational ...
Since its launch in 1995, the majority of personal data held in the Schengen Information System (SIS) concerns third-country nationals to be refused entry to the Schengen territory. This study reveals why the use of the SIS (and the second generation SIS or SIS II) entails a risk to the protection of human rights such as the right to privacy and the right to data protection, but also the freedom of movement of persons and the principle of non-discrimination. This study describes the implementation of the SIS in respectively France, Germany, and the Netherlands and the available legal remedies in both data protection and immigration law. On the basis of three general principles of European law, minimum standards are developed for effective remedies for individuals registered in the SIS, but also other databases such as Eurodac or the Visa Information System.
Will the European Union soon have a policing agency similar to the US Federal Bureau of Investigation? John Occhipinti traces the evolution of the European Police Office (Europol), bringing to life themes key to the study of European integration such as: the tension between supranationalism and intergovernmentalism; concerns over the democratic deficit in the EU; and the impact of enlargement.