Muutke küpsiste eelistusi

Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment [Kõva köide]

  • Formaat: Hardback, 280 pages, kõrgus x laius: 234x156 mm, kaal: 548 g, 8 Tables, black and white; 15 Line drawings, black and white; 1 Halftones, black and white; 16 Illustrations, black and white
  • Sari: Routledge New Security Studies
  • Ilmumisaeg: 03-May-2019
  • Kirjastus: Routledge
  • ISBN-10: 1138323535
  • ISBN-13: 9781138323537
  • Formaat: Hardback, 280 pages, kõrgus x laius: 234x156 mm, kaal: 548 g, 8 Tables, black and white; 15 Line drawings, black and white; 1 Halftones, black and white; 16 Illustrations, black and white
  • Sari: Routledge New Security Studies
  • Ilmumisaeg: 03-May-2019
  • Kirjastus: Routledge
  • ISBN-10: 1138323535
  • ISBN-13: 9781138323537
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.

Privacy is among the most endangered "species" in our networked society: personal information is processed for various purposes beyond our control. Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities inherent to digital technology reinforce this dilemma and benefit surveillance practices, thereby complicating the detection of privacy risks and the creation of appropriate safeguards. Easing this problem requires a novel approach to privacy impact assessment (PIA), and this book proposes an alternative PIA framework which, at its core, comprises a basic typology of (personally and technically) identifiable information. This approach contributes to the theoretical and practical understanding of privacy impacts and thus, to the development of more effective protection standards.

This book will be of much interest to students and scholars of critical security studies, surveillance studies, computer and information science, science and technology studies, and politics.

Arvustused

'This latest volume in the Routledge New Security Studies series addresses the many facets of securing user privacy and individual identity in todays networks. Strauss (Austrian Academy of Sciences) leads readers through his critique of the current state of privacy in the digital age, then presents the means available for bringing the situation under control. ... Each chapter is independently annotated with notes and list of references. The index is expertly crafted. Summing Up: Recommended. Upper-division undergraduates through faculty and professionals.'--J. Beidler, University of Scranton, CHOICE

List of figures
ix
List of tables
x
Acknowledgements xi
List of abbreviations
xii
1 Introduction: is privacy suffering from a digital disease?
1(14)
Digital identification in a networked society
3(3)
Privacy versus (digital) identification?
6(2)
Setting the scene---what is this book about?
8(7)
2 A systemic perspective on privacy and identification
15(15)
What's in a system?
15(3)
Self-organization and metasystem transition
18(4)
Why technology makes a difference
22(8)
3 The interplay between identity, identification and privacy
30(51)
What is identity?
30(4)
What is identification?
34(7)
Anonymity, pseudonymity and identifiability
41(4)
The societal role and meaning of privacy
45(13)
General privacy controversies
58(23)
4 Identification practices and the digital transformation of society
81(45)
The evolution of ICTs in a nutshell
82(5)
The emergence of (digital) identity management
87(10)
Social media and how our online identities are networked
97(13)
Transition paths of digital identification
110(16)
5 The privacy control dilemma of digital identification
126(62)
Surveillance, identification and control
129(10)
Panopticism and the asymmetric use of identity information
139(13)
Citizens' perceptions on privacy, security and surveillance
152(9)
Reducing identifiability by default as core challenge
161(27)
6 How to regain control? Assessing privacy by design and privacy impact assessment
188(43)
Prospects and perils of privacy by design
188(10)
The limits of user control
198(10)
Assessing privacy impact assessment
208(8)
Privacy types and privacy-affecting activities
216(15)
7 Toward an identifiability-based framework for privacy impact assessment
231(31)
Detecting and assessing privacy impacts
232(6)
A typology of identifiable information
238(12)
How to carry out an identifiability-based PIA process
250(12)
8 Is effective treatment of privacy possible? Summary and concluding remarks
262(14)
Privacy: a permanent "versus them "? Exaggerated conflicts and underestimated complementarities with other concepts
263(2)
Networked identities on the rise
265(2)
The control dilemma of privacy: shaped by securitization, economization and increasing information asymmetries
267(3)
Revitalizing privacy as public value instead of privatization
270(2)
Taming identifiability with privacy impact assessment and a general typology of identifiable information
272(4)
Index 276
Stefan Strauß is Senior Researcher at the Institute of Technology Assessment at the Austrian Academy of Sciences in Vienna, Austria.