Return to home page
Searching: Muskingum library catalog

LEADER 00000cam  2200697Mi 4500 
001    42328587 
003    OCoLC 
005    20170922024213.7 
006    m     o  d         
007    cr cn||||||||| 
008    970225s1997    maua    ob    001 0 eng d 
019    52173626|a58653776|a62108877|a183262964|a213929167
       |a473714152|a559704725|a606013784|a646708936|a722115923
       |a740940477|a871879837|a888647894|a961603944|a961616153
       |a962570352|a962727255|a963346480|a966215058|a988475005
       |a991994138 
020    0585003262|q(electronic bk.) 
020    9780585003269|q(electronic bk.) 
020    9780262011624|q(alk. paper) 
020    026201162X|q(alk. paper) 
020    0262511010 
020    9780262511018 
020    9780262266888 
020    0262266881 
020    |z026201162X 
024 3  9780262266888 
035    (OCoLC)42328587|z(OCoLC)52173626|z(OCoLC)58653776
       |z(OCoLC)62108877|z(OCoLC)183262964|z(OCoLC)213929167
       |z(OCoLC)473714152|z(OCoLC)559704725|z(OCoLC)606013784
       |z(OCoLC)646708936|z(OCoLC)722115923|z(OCoLC)740940477
       |z(OCoLC)871879837|z(OCoLC)888647894|z(OCoLC)961603944
       |z(OCoLC)961616153|z(OCoLC)962570352|z(OCoLC)962727255
       |z(OCoLC)963346480|z(OCoLC)966215058|z(OCoLC)988475005
       |z(OCoLC)991994138 
037    |b00015994 
040    N$T|beng|epn|erda|cN$T|dOCL|dOCLCQ|dDST|dYDXCP|dOCLCQ|dTUU
       |dOCLCQ|dTNF|dOCLCQ|dZCU|dOCLCF|dOCLCQ|dCOO|dB24X7|dOCLCO
       |dDKDLA|dMERUC|dCCO|dE7B|dCSU|dOCLCQ|dCUS|dOCLCQ|dQCL|dNLE
       |dCUT|dZXC|dOCLCQ|dAZK|dOCLCQ|dLOA|dMYG|dMOR|dPIFBR|dLIV
       |dOCLCQ|dSAV|dOCLCQ 
049    MAIN 
050  4 QA76.9.A25|bT43 1997eb 
072  7 POL|x035010|2bisacsh 
072  7 POL|x004000|2bisacsh 
082 04 323.44/83|221 
245 00 Technology and privacy :|bthe new landscape /|cedited by 
       Philip E. Agre and Marc Rotenberg. 
264  1 Cambridge, Mass. :|bMIT Press,|c[1997] 
264  4 |c©1997 
300    1 online resource (vi, 325 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc|0http://rdaregistry.info/termList/
       RDAColourContent/1003 
347    text file|2rdaft|0http://rdaregistry.info/termList/
       fileType/1002 
504    Includes bibliographical references and indexes. 
505 0  Beyond the mirror world: privacy and the representational 
       practices of computing / Philip E. Agre -- Design for 
       privacy in multimedia computing and communication 
       environments / Victoria Bellotti -- Convergence revisited:
       toward a global policy for the protection of personal 
       data? / Colin J. Bennett -- Privacy-enhancing technologies
       : typology, critique, vision / Herbert Burkert -- Re-
       engineering the right to privacy: how privacy has been 
       transformed from a right to a commodity / Simon G. Davies 
       -- Controlling surveillance: can privacy protection be 
       made effective? / David H. Flaherty --Does privacy law 
       work? / Robert Gellman -- Generational development of data
       protection in Europe / Viktor Mayer-Schönberger -- 
       Cryptography, secrets, and the structuring of trust / 
       David J. Phillips -- Interactivity as though privacy 
       mattered / Rohan Samarajiva. 
520 8  Annotation Privacy is the capacity to negotiate social 
       relationships by controlling access to personal 
       information. As laws, policies, and technological design 
       increasingly structure people's relationships with social 
       institutions, individual privacy faces new threats and new
       opportunities. Over the last several years, the realm of 
       technology and privacy has been transformed, creating a 
       landscape that is both dangerous and encouraging. 
       Significant changes include large increases in 
       communications bandwidths; the widespread adoption of 
       computer networking and public-key cryptography; 
       mathematical innovations that promise a vast family of 
       protocols for protecting identity in complex transactions;
       new digital media that support a wide range of social 
       relationships; a new generation of technologically 
       sophisticated privacy activists; a massive body of 
       practical experience in the development and application of
       data-protection laws; and the rapid globalization of 
       manufacturing, culture, and policy making. The essays in 
       this book provide a new conceptual framework for the 
       analysis and debate of privacy policy and for the design 
       and development of information systems. The authors are 
       international experts in the technical, economic, and 
       political aspects of privacy; the book's strength is its 
       synthesis of the three. The book provides equally strong 
       analyses of privacy issues in the United States, Canada, 
       and Europe. Contributors:Philip E. Agre, Victoria Bellotti,
       Colin J. Bennett, Herbert Burkert, Simon G. Davies, David 
       H. Flaherty, Robert Gellman, Viktor Mayer-Schonberger, 
       David J. Phillips, Rohan Samarajiva. 
588 0  Print version record. 
650  0 Computer security.|0http://id.loc.gov/authorities/subjects
       /sh90001862 
650  0 Data protection.|0http://id.loc.gov/authorities/subjects/
       sh85035859 
650  0 Privacy, Right of.|0http://id.loc.gov/authorities/subjects
       /sh85107029 
655  4 Electronic books. 
655  4 Online resources. 
700 1  Agre, Philip.|0http://id.loc.gov/authorities/names/
       n88661290 
700 1  Rotenberg, Marc.|0http://id.loc.gov/authorities/names/
       n97019669 
776 08 |iPrint version:|tTechnology and privacy.|dCambridge, 
       Mass. : MIT Press, ©1997|z026201162X|w(DLC)   97007989
       |w(OCoLC)36485899 
956 40 |uhttp://proxy.opal-libraries.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=412|zView online 
970 01 |tPreface 
970 01 |tIntroduction|p1 
970 11 |l1|tBeyond the Mirror World: Privacy and the 
       Representational Practices of Computing|cPhilip E. Agre
       |fAgre, Philip.|p29 
970 11 |l2|tDesign for Privacy in Multimedia Computing and 
       Communications Environments|cVictoria Bellotti|fBellotti, 
       Victoria|p63 
970 11 |l3|tConvergence Revisited: Toward a Global Policy for the
       Protection of Personal Data?|cColin J. Bennett|fBennett, 
       Colin J. (Colin John), 1955-|p99 
970 11 |l4|tPrivacy-Enhancing Technologies: Typology, Critique, 
       Vision|cHerbert Burkert|fBurkert, Herbert.|p125 
970 11 |l5|tRe-Engineering the Right to Privacy: How Privacy Has 
       Been Transformed from a Right to a Commodity|cSimon G. 
       Davies|fDavies, Simon, 1956-|p143 
970 11 |l6|tControlling Surveillance: Can Privacy Protection Be 
       Made Effective?|cDavid H. Flaherty|fFlaherty, David H.
       |p167 
970 11 |l7|tDoes Privacy Law Work?|cRobert Gellman|fGellman, 
       Robert|p193 
970 11 |l8|tGenerational Development of Data Protection in Europe
       |cViktor Mayer-Schonberger|fMayer-Schönberger, Viktor.
       |p219 
970 11 |l9|tCryptography, Secrets, and the Structuring of Trust
       |cDavid J. Phillips|fPhillips, David J.|p243 
970 11 |l10|tInteractivity As Though Privacy Mattered|cRohan 
       Samarajiva|fSamarajiva, Rohan.|p277 
970 01 |tList of Contributors|p311 
970 01 |tIndex|p313 
971    |d19980821 
990    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America|c2017-09-22|yMaster record 
       variable field(s) change: 650|5OHN 
990    ProQuest ebrary|bebrary Academic Complete|c2017-08-11
       |yRemoved from collection ebrary.ebooks|5MTU 
990    ProQuest ebrary|bebrary Academic Complete|c2017-04-20|5MTU
990    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America|c2016-12-09|yMaster record 
       encoding level change 
990    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America|c2016-04-08|yMaster record 
       variable field(s) change: 245