Privacy and Technologies of Identity: A Cross-Disciplinary Conversation

Front Cover
Katherine J. Strandburg, Daniela Stan Raicu
Springer Science & Business Media, Dec 12, 2005 - Computers - 384 pages
0 Reviews

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy.

This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A Survey
15
Social Norms Self Control and Privacy in the Online World 31
30
Privacy Implications of RFID and Location Tracking
55
The Inside Story
75
Privacy Inalienability and Personal Data Chips 93
92
Privacy Implications of Biometric Technologies
115
Applications Challenges and the Future
135
The Unsettled Question of Biometric
151
Data Mining and Attention Consumption
225
Is Privacy Regulation the Environmental Law of the Information
239
Document Sanitization in the Age of Data Mining 255
254
Nymity P2P ISPs
270
Fourth Amendment Limits on National Identity Cards
295
Privacy Issues in an Electronic Voting Machine
313
HiddenWeb Privacy Preservation Surfing HiWePPS Model
335
Global Disclosure Risk for Microdata with Continuous Attributes
349

Face Recognition Software and Concerns
173
An Overview 191
190
Online Privacy Tailoring and Persuasion
209
References 365
364
Index
380
Copyright

Other editions - View all

Common terms and phrases