The discussion of group rights, while always a part of the human rights discourse, has been gaining importance during the past decade. This discussion, which remains fundamental to a full realization by the international community of its international human rights' goals, requires careful analysis a
Human Privacy In Virtual And Physical Worlds: Multidisciplinary Perspectives
â Scribed by Mary C. Lacity, Lynda Coon
- Publisher
- Palgrave Macmillan
- Year
- 2024
- Tongue
- English
- Leaves
- 283
- Series
- Technology, Work And Globalization
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
This book is premised on the belief that understanding and protecting privacy requires a multidisciplinary approach. The editors of this contributed book believe that privacy is a âwicked problemâ because of its social complexity. In the modern world, political, social, and technological structures increasingly violate human privacy in physical and virtual spaces. Our behaviors are surveilled, captured, and monetizedâoften without our knowledge. Contributors are experts from diverse fields, including anthropology, architecture, data science, engineering, history, information systems, library sciences, medicine, philosophy, and supply chain management, each writing for an explicitly interdisciplinary readership. Privacy as a concept is a moving target across the globe, morphing and transforming historically from one epoch to the next. By moving beyond the limitations of a single disciplinary lens, this book aims at a richer, more comprehensive, and more lasting analysis. This collection is of great interest to students and scholars of diverse backgrounds studying human privacy.
⊠Table of Contents
Acknowledgments
Contents
Notes on Contributors
List of Figures
List of Tables
1 Introduction to Human Privacy in Virtual and Physical Worlds
Defining Privacy
Viewing Privacy from Multiple Disciplines
Foundations of Human Privacy
Technical Views of Privacy
Domain-Specific Views of Privacy
Themes Across Chapters
References
Part I Foundations of Human Privacy
2 Exploring Privacy from a Philosophical Perspective: Conceptual and Normative Dimensions
Introduction
Concepts of Privacy
Normative Dimensions of Privacy
The Value of Privacy
Privacy and Security
Privacy and Transparency
Privacy and Democratic Society
Privacy Rights
Privacy and the Self
Privacy and Commodification
Looking Ahead at Future Challenges
References
3 Whatâs So Special About Private Parts? How Anthropology Questions the PublicâPrivate Dichotomy
Introduction
Public/Private Dichotomies of the Human Body
Public/Private Dichotomies of Spaces
Public/Private Dichotomies of Information
Public/Private Dichotomies Provide Meaning to Symbolic Acts
Private/Public Dichotomies: An Example from Egypt
Privacy Cross-Culturally: The Notion of Solitude
Weaving Dichotomies Together
Traditional/Modern Dichotomies
Invoking Privacy to Define Relationships
Paths Forward
References
Part II Technical Views of Privacy
4 Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measures
Introduction
Brief Introduction to the Internet of Things (IoT)
Overview of Common Attack Vectors
The Dynamic Protections of Privacy in an Organization
Anonymity in Cybersecurity
The Privacy Control Catalog in NIST 800-53, Revision 5
Individualâs Privacy Relating to Cybersecurity (Three Ways to Protect Your Privacy)
Conclusions
References
5 Data Governance, Privacy, and Ethics
Introduction
The Importance of Data Governance, Privacy, and Ethics in Todayâs World
The Impact of Data Breaches on Individuals and Organizations
The Role of Data Governance in Protecting Privacy and Ensuring Ethical Use of Data
The Challenges of Implementing Effective Data Governance Policies
The Ethical Considerations Surrounding the Collection, Storage, and Use of Personal Data
The Legal and Regulatory Frameworks Governing Data Privacy and Ethics
Looking to the Future
References
6 Web2 Versus Web3 Information Privacy: An Information Systems Discipline Perspective
Introduction to Web2 and Web3
Information Systems (IS) Scholarsâ Approach Privacy Research
Privacy Paradox
Privacy Calculus
Privacy Fatigue
Trust
Lack of Choice
Web2 and Web3 Explained
User Access and PII Data Required
Location and Governance of Software and Data
Economic Model
Web2 and Web3 Application Examples
Web Browsing: Chrome vs. Brave
Borrowing and Lending: Traditional Bank vs. Aave
Metaverse: Meta vs. Decentraland
File Storage: Dropbox vs. Filecoin
Conclusion
References
7 Multi-party Computation: Privacy in Coopetition
Introduction
Two-Party Computation
Multi-party ComputationâMean
Multi-party ComputationâStandard Deviation
Multi-party ComputationâMoments of Distributions
Multi-party ComputationâVoting
Multi-party ComputationâMaximum
Limitations and Other Applications
References
8 Zero-Knowledge Proofs and Privacy: A Technical Look at Privacy
Introduction
Simple ZKP Examples
Leaves in a Tree: Verifying a Secret Power
Whereâs Waldo?
Are You Old Enough To Drink?
Proof of Color
Never Write Checks
Cryptographic Solutions
Communicating Secrets
Evolution of Cryptographic Proofs
Technical Foundations of ZKPs
Key Concepts and Terminology
Foundational Characteristics
Protocols, Algorithms, and Methods
ZKP Use Cases
Personal Privacy
Challenges and Limitations
Issues with Computational Costs and Efficiencies
Issues With Trusted Setup
Scalability Issues
Conclusion
References
Part III Domain-Specific View of Privacy
9 An Architectâs View of Privacy
Introduction
Theme 1: Privacy and Comfort in Design
Theme 2: Private moments in public spaces: primary, secondary, and tertiary spaces
Theme 3: Private Moments in Public Spaces: Light
Theme 4: Private Moments in Public Spaces: Sound
Theme 5: Ennobling the Prosaic
10 Healthcare Privacy in an Electronic Data Age
Introduction
Limitations and the Scope of Privacy
A Note on HIPAA
Technology and Data: The Promises and Perils to Privacy
EHRs, PHRs, and Portals
Biobanking and the Specter of Datamining
Conclusion
References
11 Privacy Considerations in Archival Practice and Research
Introduction
Privacy Considerations During Acquisition and Appraisal
Record Creation, Creator Intent, and Donor Responsibility
Third-Party Privacy
Negotiating and Renegotiating Donor Restrictions
Legal and Statutory Restrictions
Ethical Considerations
Choices and Constraints
Archival Privacy: AÂ Research Perspective
Professional Standards
Privacy During Research
Personally Identifiable Information (PII) During Research
Documenting Researcher Activity
Legal Protections for Researcher Activity
The University of Arkansas Special Collections as a Case Study
Conclusion
References
12 Employee and Customer Information Privacy Concerns in Supply Chain Management
Introduction
Overview of Supply Chain Management
Order Fulfillment in Supply Chain Management
Order Fulfillment in Retail Supply Chains
Organizational Uses of Technology in Retail Fulfillment
Customer Data Collected During Order Fulfillment
Employee Data Collected During Order Fulfillment
Privacy Concerns
Employee Privacy in Retail Supply Chain Order Fulfillment
Customer Privacy in Retail Supply Chain Order Fulfillment
Summary
References
Index
⊠Subjects
Business And Management: General, Systems And Data Security, Business Information Systems
đ SIMILAR VOLUMES
<span>This book brings together a collection of multi-disciplinary voices to discuss, debate, and devise a series of ahuman pedagogical proposals that aim to address the challenging ecological, political, social, economic, and aesthetic milieu within which education is situated today. Attending to c
The concept of 'human rights' as a universal goal is at the centre of the international stage. It is now a key part in discourse, treaties and in domestic jurisdictions. However, as this study shows, the debate around this development is actually about human rights law. This text scrutinizes the
This volume is based on different aspects of chemical technology that are associated with research and the development of theories for chemical engineers, helping to bridge the gap between classical analysis and modern, real-life applications. The book provides practical insights into many areas of
<p>The "function" and "notion" of literacy may be considered the keystone, a "filigree" principle underlying the educational, social, and cultural organiza tion of the societies of the twentieth century. It is therefore interesting to try to pinpoint the notion and its implications at the tum of th
<p>This book addresses the impact of migration on the formation and transformation of identity and its continuous negotiations. Its ground is the understanding of identity as a complex social phenomenon resulting from constant negotiations between personal conditions, social relationships, and insti