Censorship, Surveillance, and Privacy最新文献

筛选
英文 中文
Privacy, Security, and Liberty 隐私、安全和自由
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.ch012
M. Büscher, Sung-Yueh Perng, Michael Liegl
{"title":"Privacy, Security, and Liberty","authors":"M. Büscher, Sung-Yueh Perng, Michael Liegl","doi":"10.4018/978-1-5225-7113-1.ch012","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch012","url":null,"abstract":"This paper explores issues of privacy, security and liberty arising in relation to information and communication technologies (ICT) for crisis response and management. Privacy, security and liberty are concepts that have undergone significant changes over time. The authors show how ICT related transformations of socio-technical practices involved in their enactment create challenges, opportunities and dangers in the context of crisis response. While opportunities include development of more informed, efficient and agile emergency management, dangers include increased surveillance, social sorting, and an erosion of privacy, civil liberties and virtues of humanity. The authors explore causes and mechanisms that underpin these dynamics and measures developed to address them. Against this backdrop, they discuss ‘design for privacy' as a socio-technical design approach that empowers people. The aim is to motivate, and explore avenues for, socio-technical innovation that supports information processing and respect for privacy in crisis response and management.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Is It Privacy or Is It Access Control? 是隐私还是访问控制?
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-4666-6158-5.CH004
Sylvia L. Osborn
{"title":"Is It Privacy or Is It Access Control?","authors":"Sylvia L. Osborn","doi":"10.4018/978-1-4666-6158-5.CH004","DOIUrl":"https://doi.org/10.4018/978-1-4666-6158-5.CH004","url":null,"abstract":"With the widespread use of online systems, there is an increasing focus on maintaining the privacy of individuals and information about them. This is often referred to as a need for privacy protection. The author briefly examines definitions of privacy in this context, roughly delineating between keeping facts private and statistical privacy that deals with what can be inferred from data sets. Many of the mechanisms used to implement what is commonly thought of as access control are the same ones used to protect privacy. This chapter explores when this is not the case and, in general, the interplay between privacy and access control on the one hand and, on the other hand, the separation of these models from mechanisms for their implementation.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126572566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Persuasion and Propaganda in War and Terrorism 战争与恐怖主义中的说服与宣传
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-0156-5.CH002
Thomas M. Steinfatt, Dana M. Janbek
{"title":"Persuasion and Propaganda in War and Terrorism","authors":"Thomas M. Steinfatt, Dana M. Janbek","doi":"10.4018/978-1-5225-0156-5.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-0156-5.CH002","url":null,"abstract":"This chapter focuses on the use of propaganda during times of war, prejudice, and political unrest. Part one distinguishes between persuasion and one of its forms, propaganda. The meaning-in-use of the term ‘propaganda' is essential to understanding its use over time. Part two presents relevant examples of propaganda from the past several centuries in the United States and Europe. These examples include episodes from World War I and II, among others. Propaganda is not a new tool of persuasion, and learning about its use in the past provides a comparison that helps in understanding its use in the present and future. Part three looks at recent examples of how propaganda occurs in actual use in online terrorist mediums by Al-Qaeda and by the Islamic State in Iraq and Syria (ISIS).","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134111447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithms vs. Hive Minds 算法vs.蜂群思维
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.ch008
R. Searle
{"title":"Algorithms vs. Hive Minds","authors":"R. Searle","doi":"10.4018/978-1-5225-7113-1.ch008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch008","url":null,"abstract":"From the time of its emergence onto the public scene, the internet has been understood in light of both its dystopian potential for total surveillance and control and its utopian possibilities to enable enhanced forms of freedom. The reality has proven far more complicated with the internet having both helped to weaken institutions and strengthened new forms of authoritarian populism. This chapter argues that these two potentials are deeply interconnected and that the long-term sustainability of democracy requires that we understand and address the connections between our fears and hopes regarding the internet's future.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131843758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Privacy Preservation Technique Using Neural Networks 基于神经网络的混合隐私保护技术
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.CH025
R. Vidyabanu, N. Nagaveni
{"title":"Hybrid Privacy Preservation Technique Using Neural Networks","authors":"R. Vidyabanu, N. Nagaveni","doi":"10.4018/978-1-5225-7113-1.CH025","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH025","url":null,"abstract":"A novel Artificial Neural Network (ANN) dimension expansion-based framework that addresses the demand for privacy preservation of low dimensional data in clustering analysis is discussed. A hybrid approach that combines ANN with Linear Discriminant Analysis (LDA) is proposed to preserve the privacy of data in mining. This chapter describes a feasible technique for privacy preserving clustering with the objective of providing superior level of privacy protection without compromising the data utility and mining outcome. The suitability of these techniques for mining has been evaluated by performing clustering on transformed data and the performance of the proposed method is measured in terms of misclassification and privacy level percentage. The methods are further validated by comparing the results with traditional Geometrical Data Transformation Methods (GDTMs). The results arrived at are significant and promising.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132266981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Technology and the Law 信息技术与法律
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.ch064
Samreth Mammoun
{"title":"Information Technology and the Law","authors":"Samreth Mammoun","doi":"10.4018/978-1-5225-7113-1.ch064","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch064","url":null,"abstract":"In today's globalized society, it is impossible for any country to be isolated and remain disconnected from the information chain. The purpose of this chapter is to highlight the growth of information technology and related laws in Cambodia. Additionally, this chapter gives readers an overview of laws related to information technology, explores how information technologies are transforming Cambodian society, and how the Cambodia government interacts with these technologies. This chapter recommends two main actions that Cambodia can implement to enhance freedom of information: honor the guarantee of freedom of expression by ensuring that Internet filters are not introduced and censorship of critical Websites is not allowed and create a clear legal framework that protects and promotes freedom of expression on the Internet. Limitations on Internet content should only be introduced in accordance with international human rights standards.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127354006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Models of Privacy and Security Issues on Mobile Applications 移动应用程序的隐私和安全问题模型
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-2469-4.CH006
Lili Nemec Zlatolas, Tatjana Welzer-Družovec, M. Heričko, Marko Hölbl
{"title":"Models of Privacy and Security Issues on Mobile Applications","authors":"Lili Nemec Zlatolas, Tatjana Welzer-Družovec, M. Heričko, Marko Hölbl","doi":"10.4018/978-1-5225-2469-4.CH006","DOIUrl":"https://doi.org/10.4018/978-1-5225-2469-4.CH006","url":null,"abstract":"The development of smart phones and other smart devices has led to the development of mobile applications, which are in use frequently by the users. It is also anticipated that the number of mobile applications will grow rapidly in the next years. This topic has, therefore, been researched highly in the past years. Mobile applications gather user data and that is why privacy and security in mobile applications is a very important research topic. In this chapter we give an overview of the current research on privacy and security issues of mobile applications.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Do Privacy Concerns Affect Information Seeking via Smartphones? 隐私问题会影响通过智能手机获取信息吗?
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.ch057
Mohamed Abdelhamid, S. Venkatesan, Joana Gaia, R. Sharman
{"title":"Do Privacy Concerns Affect Information Seeking via Smartphones?","authors":"Mohamed Abdelhamid, S. Venkatesan, Joana Gaia, R. Sharman","doi":"10.4018/978-1-5225-7113-1.ch057","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch057","url":null,"abstract":"The innovation and evolution of technologies in smartphone industry has enabled users to efficiently achieve many tasks including utilizing search engines for instant information retrieval anytime and anywhere. Nonetheless, some users choose not to use these smartphone features including search engines to seek information. This study explores the factors that impact the likelihood of information seeking via smartphones. Privacy concern was found to be one of the main factors influencing the likelihood of seeking information. Android users were more likely to seek information compared to iPhone users, possibly due to the differences in the features of the operating systems of these phones. Motivation to seek information captured by technology ownership increases the likelihood of information seeking. The diversity of social network connections also plays a significant in information seeking behavior of the users.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Borders of Corruption 腐败的边界
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.CH103
Rebecca R. Fiske
{"title":"The Borders of Corruption","authors":"Rebecca R. Fiske","doi":"10.4018/978-1-5225-7113-1.CH103","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH103","url":null,"abstract":"The U.S. has been in a state of exception now for many years, and there appears to be no end in sight. There exists an entire generation who has know life under only this form of government, one that, as Giorgio Agamben explains, takes “a position at the limit between politics and law…an ambiguous, uncertain, borderline fringe, at the intersection of the legal and the political.” In the name of security, the characteristic limiting of constitutional rights, the sanctioning of torture, and the proliferating of NSA surveillance are fast becoming the norm. Recently, much has been written concerning the bio-political consequences of an endless state of exception in which the executive power trumps the judiciary, and a new legal order emerges. This chapter will consider the relationship between corruption and the permanent state of exception.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133781824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gender, Translation, and Censorship 性别、翻译和审查制度
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.CH093
Gora Zaragoza
{"title":"Gender, Translation, and Censorship","authors":"Gora Zaragoza","doi":"10.4018/978-1-5225-7113-1.CH093","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH093","url":null,"abstract":"After the “cultural turn” in the 1980s, translation was redefined as a cultural transfer rather than a linguistic transposition. Key translation concepts were revised, including equivalence, correction, and fidelity. Feminist approaches to translation emerged, for example, the recovery of texts lost in patriarchy. Following the death of Franco and the transition to democracy, Spain initiated a cultural expansion. The advent of the Franco regime after the civil war (1936-1939) resulted in years of cultural involution and the abolition of rights for women attained during the Spanish Second Republic (1931-1939). Severe censoring prevented the publication of literature—both native and foreign (through translation)—that contradicted the principles of the dictatorship. This chapter will examine the link between gender, translation, and censorship, materialised in Radclyffe Hall's The Well of Loneliness (1928), the first English novel to tackle lesbianism and transgenderism, an example of translation in cultural evolution.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115838594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信