|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn273057659 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
081118s2008 maua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d N$T
|d OCLCQ
|d TUU
|d OCLCQ
|d TEFOD
|d IEEEE
|d OCLCF
|d NLGGC
|d JSTOR
|d YDXCP
|d E7B
|d C6I
|d TR7RH
|d OCLCQ
|d EBLCP
|d OCLCQ
|d HRM
|d AZK
|d JBG
|d LOA
|d AGLDB
|d PIFAG
|d ZCU
|d X#7
|d MERUC
|d OCLCQ
|d IOG
|d WY@
|d U3W
|d LUE
|d EZ9
|d COO
|d INARC
|d BRL
|d STF
|d VNS
|d WRM
|d OCLCQ
|d VTS
|d NRAMU
|d MERER
|d OCLCQ
|d ICG
|d INT
|d VT2
|d OCLCQ
|d MITPR
|d WYU
|d YOU
|d OCLCQ
|d A6Q
|d DKC
|d AU@
|d OCLCQ
|d M8D
|d OCLCQ
|d UKCRE
|d MM9
|d OCLCO
|d OCLCQ
|d ANO
|d OCLCQ
|d SFB
|d OCLCO
|d OCLCQ
|d OCLCL
|
019 |
|
|
|a 646764024
|a 961694935
|a 962729394
|a 966095633
|a 991911300
|a 991957299
|a 1036803849
|a 1037531902
|a 1037932794
|a 1038652519
|a 1045478309
|a 1055382901
|a 1065688226
|a 1081207510
|a 1083551151
|a 1087237150
|a 1153462512
|
020 |
|
|
|a 9780262268127
|q (electronic bk.)
|
020 |
|
|
|a 0262268124
|q (electronic bk.)
|
020 |
|
|
|a 9781435677180
|q (electronic bk.)
|
020 |
|
|
|a 1435677188
|q (electronic bk.)
|
020 |
|
|
|z 9780262026383
|
020 |
|
|
|z 0262026384
|
029 |
1 |
|
|a AU@
|b 000051284601
|
029 |
1 |
|
|a AU@
|b 000051404580
|
029 |
1 |
|
|a DEBBG
|b BV042508966
|
029 |
1 |
|
|a DEBBG
|b BV043044478
|
029 |
1 |
|
|a DEBBG
|b BV044105329
|
029 |
1 |
|
|a DEBSZ
|b 422088846
|
029 |
1 |
|
|a GBVCP
|b 802713521
|
029 |
1 |
|
|a NZ1
|b 15321528
|
035 |
|
|
|a (OCoLC)273057659
|z (OCoLC)646764024
|z (OCoLC)961694935
|z (OCoLC)962729394
|z (OCoLC)966095633
|z (OCoLC)991911300
|z (OCoLC)991957299
|z (OCoLC)1036803849
|z (OCoLC)1037531902
|z (OCoLC)1037932794
|z (OCoLC)1038652519
|z (OCoLC)1045478309
|z (OCoLC)1055382901
|z (OCoLC)1065688226
|z (OCoLC)1081207510
|z (OCoLC)1083551151
|z (OCoLC)1087237150
|z (OCoLC)1153462512
|
037 |
|
|
|a 22573/ctt59ptfc
|b JSTOR
|
037 |
|
|
|a 7855
|b MIT Press
|
037 |
|
|
|a 9780262268127
|b MIT Press
|
050 |
|
4 |
|a JC596
|b .B46 2008eb
|
072 |
|
7 |
|a POL
|x 004000
|2 bisacsh
|
072 |
|
7 |
|a POL
|x 035010
|2 bisacsh
|
072 |
|
7 |
|a POL004000
|2 bisacsh
|
072 |
|
7 |
|a COM043050
|2 bisacsh
|
082 |
0 |
4 |
|a 323.44/82
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bennett, Colin J.
|q (Colin John),
|d 1955-
|
245 |
1 |
4 |
|a The privacy advocates :
|b resisting the spread of surveillance /
|c Colin J. Bennett.
|
260 |
|
|
|a Cambridge, MA :
|b MIT Press,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xxiii, 259 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Introduction --
|t List of privacy advocacy organizations --
|g 1.
|t Framing the problem --
|g 2.
|t The groups --
|g 3.
|t The actors --
|g 4.
|t The strategies --
|g 5.
|t Cases and conflicts --
|g 6.
|t The networks --
|g 7.
|t Movements and futures --
|t Appendix 1 : List of interviewees --
|t Appendix 2 : Standard interview questions --
|t Notes --
|t Bibliography --
|t Index.
|
520 |
3 |
|
|a "Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement."
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Privacy, Right of.
|
650 |
|
0 |
|a Human rights advocacy.
|
650 |
|
0 |
|a Human rights movements.
|
650 |
|
0 |
|a Human rights workers.
|
650 |
|
6 |
|a Défense des droits de l'homme.
|
650 |
|
6 |
|a Mouvements des droits de l'homme.
|
650 |
|
6 |
|a Défenseurs des droits de l'homme.
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Political Freedom & Security
|x Civil Rights.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Political Freedom & Security
|x Human Rights.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Civil Rights.
|2 bisacsh
|
650 |
|
7 |
|a Human rights advocacy
|2 fast
|
650 |
|
7 |
|a Human rights movements
|2 fast
|
650 |
|
7 |
|a Human rights workers
|2 fast
|
650 |
|
7 |
|a Privacy, Right of
|2 fast
|
653 |
|
|
|a INFORMATION SCIENCE/Technology & Policy
|
655 |
|
0 |
|a Electronic books.
|
758 |
|
|
|i has work:
|a The privacy advocates (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGmd69GGQ8kxppDGCtr9wy
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Bennett, Colin J. (Colin John), 1955-
|t Privacy advocates.
|d Cambridge, MA : MIT Press, ©2008
|z 0262026384
|z 9780262026383
|w (DLC) 2008013819
|w (OCoLC)216938343
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3338938
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL3338938
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 237752
|
938 |
|
|
|a IEEE
|b IEEE
|n 6267370
|
938 |
|
|
|a Internet Archive
|b INAR
|n privacyadvocates00benn
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3285273
|
994 |
|
|
|a 92
|b IZTAP
|