{"title":"Privacy, Security, and Liberty","authors":"M. Büscher, Sung-Yueh Perng, Michael Liegl","doi":"10.4018/978-1-5225-7113-1.ch012","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch012","url":null,"abstract":"This paper explores issues of privacy, security and liberty arising in relation to information and communication technologies (ICT) for crisis response and management. Privacy, security and liberty are concepts that have undergone significant changes over time. The authors show how ICT related transformations of socio-technical practices involved in their enactment create challenges, opportunities and dangers in the context of crisis response. While opportunities include development of more informed, efficient and agile emergency management, dangers include increased surveillance, social sorting, and an erosion of privacy, civil liberties and virtues of humanity. The authors explore causes and mechanisms that underpin these dynamics and measures developed to address them. Against this backdrop, they discuss ‘design for privacy' as a socio-technical design approach that empowers people. The aim is to motivate, and explore avenues for, socio-technical innovation that supports information processing and respect for privacy in crisis response and management.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Is It Privacy or Is It Access Control?","authors":"Sylvia L. Osborn","doi":"10.4018/978-1-4666-6158-5.CH004","DOIUrl":"https://doi.org/10.4018/978-1-4666-6158-5.CH004","url":null,"abstract":"With the widespread use of online systems, there is an increasing focus on maintaining the privacy of individuals and information about them. This is often referred to as a need for privacy protection. The author briefly examines definitions of privacy in this context, roughly delineating between keeping facts private and statistical privacy that deals with what can be inferred from data sets. Many of the mechanisms used to implement what is commonly thought of as access control are the same ones used to protect privacy. This chapter explores when this is not the case and, in general, the interplay between privacy and access control on the one hand and, on the other hand, the separation of these models from mechanisms for their implementation.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126572566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Persuasion and Propaganda in War and Terrorism","authors":"Thomas M. Steinfatt, Dana M. Janbek","doi":"10.4018/978-1-5225-0156-5.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-0156-5.CH002","url":null,"abstract":"This chapter focuses on the use of propaganda during times of war, prejudice, and political unrest. Part one distinguishes between persuasion and one of its forms, propaganda. The meaning-in-use of the term ‘propaganda' is essential to understanding its use over time. Part two presents relevant examples of propaganda from the past several centuries in the United States and Europe. These examples include episodes from World War I and II, among others. Propaganda is not a new tool of persuasion, and learning about its use in the past provides a comparison that helps in understanding its use in the present and future. Part three looks at recent examples of how propaganda occurs in actual use in online terrorist mediums by Al-Qaeda and by the Islamic State in Iraq and Syria (ISIS).","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134111447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithms vs. Hive Minds","authors":"R. Searle","doi":"10.4018/978-1-5225-7113-1.ch008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch008","url":null,"abstract":"From the time of its emergence onto the public scene, the internet has been understood in light of both its dystopian potential for total surveillance and control and its utopian possibilities to enable enhanced forms of freedom. The reality has proven far more complicated with the internet having both helped to weaken institutions and strengthened new forms of authoritarian populism. This chapter argues that these two potentials are deeply interconnected and that the long-term sustainability of democracy requires that we understand and address the connections between our fears and hopes regarding the internet's future.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131843758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Privacy Preservation Technique Using Neural Networks","authors":"R. Vidyabanu, N. Nagaveni","doi":"10.4018/978-1-5225-7113-1.CH025","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH025","url":null,"abstract":"A novel Artificial Neural Network (ANN) dimension expansion-based framework that addresses the demand for privacy preservation of low dimensional data in clustering analysis is discussed. A hybrid approach that combines ANN with Linear Discriminant Analysis (LDA) is proposed to preserve the privacy of data in mining. This chapter describes a feasible technique for privacy preserving clustering with the objective of providing superior level of privacy protection without compromising the data utility and mining outcome. The suitability of these techniques for mining has been evaluated by performing clustering on transformed data and the performance of the proposed method is measured in terms of misclassification and privacy level percentage. The methods are further validated by comparing the results with traditional Geometrical Data Transformation Methods (GDTMs). The results arrived at are significant and promising.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132266981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Technology and the Law","authors":"Samreth Mammoun","doi":"10.4018/978-1-5225-7113-1.ch064","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch064","url":null,"abstract":"In today's globalized society, it is impossible for any country to be isolated and remain disconnected from the information chain. The purpose of this chapter is to highlight the growth of information technology and related laws in Cambodia. Additionally, this chapter gives readers an overview of laws related to information technology, explores how information technologies are transforming Cambodian society, and how the Cambodia government interacts with these technologies. This chapter recommends two main actions that Cambodia can implement to enhance freedom of information: honor the guarantee of freedom of expression by ensuring that Internet filters are not introduced and censorship of critical Websites is not allowed and create a clear legal framework that protects and promotes freedom of expression on the Internet. Limitations on Internet content should only be introduced in accordance with international human rights standards.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127354006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lili Nemec Zlatolas, Tatjana Welzer-Družovec, M. Heričko, Marko Hölbl
{"title":"Models of Privacy and Security Issues on Mobile Applications","authors":"Lili Nemec Zlatolas, Tatjana Welzer-Družovec, M. Heričko, Marko Hölbl","doi":"10.4018/978-1-5225-2469-4.CH006","DOIUrl":"https://doi.org/10.4018/978-1-5225-2469-4.CH006","url":null,"abstract":"The development of smart phones and other smart devices has led to the development of mobile applications, which are in use frequently by the users. It is also anticipated that the number of mobile applications will grow rapidly in the next years. This topic has, therefore, been researched highly in the past years. Mobile applications gather user data and that is why privacy and security in mobile applications is a very important research topic. In this chapter we give an overview of the current research on privacy and security issues of mobile applications.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Abdelhamid, S. Venkatesan, Joana Gaia, R. Sharman
{"title":"Do Privacy Concerns Affect Information Seeking via Smartphones?","authors":"Mohamed Abdelhamid, S. Venkatesan, Joana Gaia, R. Sharman","doi":"10.4018/978-1-5225-7113-1.ch057","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch057","url":null,"abstract":"The innovation and evolution of technologies in smartphone industry has enabled users to efficiently achieve many tasks including utilizing search engines for instant information retrieval anytime and anywhere. Nonetheless, some users choose not to use these smartphone features including search engines to seek information. This study explores the factors that impact the likelihood of information seeking via smartphones. Privacy concern was found to be one of the main factors influencing the likelihood of seeking information. Android users were more likely to seek information compared to iPhone users, possibly due to the differences in the features of the operating systems of these phones. Motivation to seek information captured by technology ownership increases the likelihood of information seeking. The diversity of social network connections also plays a significant in information seeking behavior of the users.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Borders of Corruption","authors":"Rebecca R. Fiske","doi":"10.4018/978-1-5225-7113-1.CH103","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH103","url":null,"abstract":"The U.S. has been in a state of exception now for many years, and there appears to be no end in sight. There exists an entire generation who has know life under only this form of government, one that, as Giorgio Agamben explains, takes “a position at the limit between politics and law…an ambiguous, uncertain, borderline fringe, at the intersection of the legal and the political.” In the name of security, the characteristic limiting of constitutional rights, the sanctioning of torture, and the proliferating of NSA surveillance are fast becoming the norm. Recently, much has been written concerning the bio-political consequences of an endless state of exception in which the executive power trumps the judiciary, and a new legal order emerges. This chapter will consider the relationship between corruption and the permanent state of exception.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133781824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gender, Translation, and Censorship","authors":"Gora Zaragoza","doi":"10.4018/978-1-5225-7113-1.CH093","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH093","url":null,"abstract":"After the “cultural turn” in the 1980s, translation was redefined as a cultural transfer rather than a linguistic transposition. Key translation concepts were revised, including equivalence, correction, and fidelity. Feminist approaches to translation emerged, for example, the recovery of texts lost in patriarchy. Following the death of Franco and the transition to democracy, Spain initiated a cultural expansion. The advent of the Franco regime after the civil war (1936-1939) resulted in years of cultural involution and the abolition of rights for women attained during the Spanish Second Republic (1931-1939). Severe censoring prevented the publication of literature—both native and foreign (through translation)—that contradicted the principles of the dictatorship. This chapter will examine the link between gender, translation, and censorship, materialised in Radclyffe Hall's The Well of Loneliness (1928), the first English novel to tackle lesbianism and transgenderism, an example of translation in cultural evolution.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115838594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}