Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
342.7 --- Grondwettelijke rechten en vrijheden. Fundamentele rechten --- 342.7 Grondwettelijke rechten en vrijheden. Fundamentele rechten --- Privacy, Right of --- Publicity (Law) --- Law --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Criminal provisions --- Law and legislation --- E-books
Choose an application
In Digital Freedom, N. D. Batra explores the tension between the boundlessness of the Internet and the boundaries of the marketplace, as well as the resulting impact on human expression, privacy, and social controls. Batra's thought-provoking book looks at these issues_including surveillance, intellectual property, and copyright_from the perspective of an evolutionary, self-organizing social system. This system both creates and assimilates innovations and, in the process, undergoes reorganization and renewal. Above all, Digital Freedom is an exploration of and meditation on the question: How m
Internet --- Liberty. --- Privacy, Right of. --- Liberté --- Droit à la vie privée --- Social aspects. --- Aspect social --- Liberté --- Droit à la vie privée --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil liberty --- Emancipation --- Freedom --- Liberation --- Personal liberty --- Law and legislation --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Democracy --- Natural law --- Political science --- Equality --- Libertarianism --- Social control
Choose an application
The non-interference perspective is common when theorizing about the protection of the private life of individuals and their families. However, this accepted way of looking at things, leads our thoughts astray. It fails to do justice to the interests both in being left in peace but at the same time participating in a community together with other people. New methods of communications interception, video and even satellite surveillance allow insight and an entry into personal matters, but they can also be used to satisfy people's need for protection, safety and security in public places. A theory about the respect for the individual's right to a private sphere and its protection ought therefore to incorporate both these interests. In The Private Sphere it is suggested that an emotional territory, which forms the individual's own sphere of action and experience, has developed in the course of evolution in pace with the individual's conditions of life, brought about by challenges in the natural and social environment. The starting point is the insight that the behaviour of human beings with respect to their privacy reflects in a fundamental way patterns of behaviour among social animals. The emotional territory allows a readiness to act along different lines and to maintain a multiplicity of different social relations.
Communication --- Privacy, Right of. --- Psychological aspects. --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Interpersonal relations --- Law and legislation --- Ethics. --- Philosophy of law. --- Biology-Philosophy. --- Philosophy of Law. --- Philosophy of Biology. --- Deontology --- Ethics, Primitive --- Ethology --- Moral philosophy --- Morality --- Morals --- Philosophy, Moral --- Science, Moral --- Philosophy --- Values --- Political science. --- Biology—Philosophy. --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Law --- Biology --- Moral Philosophy and Applied Ethics. --- Philosophy. --- Vitalism --- Jurisprudence
Choose an application
This book offers the first comprehensive and critical investigation of the specific modes of risk calculation that are emerging in the so-called War on Terror.Risk and the War on Terror offers an interdisciplinary set of contributions which debate and analyze both the empirical manifestations of risk in the War on Terror and their theoretical implications. From border controls and biometrics to financial targeting and policing practice, the imperative to deploy public and private data in order to ‘connect the dots’ of terrorism risk raises important questions for social scientists and practitioners alike.How are risk technologies redeployed from commercial, environmental and policing domains to the domain of the War on Terror?How can the invocation of risk in the War on Terror be understood conceptually?Do these moves embody transformations from sovereignty to governmentality; from discipline to risk; from geopolitics to biopolitics?What are the implications of such moves for the populations that come to be designated as ‘risky’ or ‘at risk’?Where are the gaps, ambiguities and potential resistances to these practices?In contrast with previous historical moments of risk measurement, governing by risk in the War on Terror has taken on a distinctive orientation to an uncertain future. This book will be of strong interest to students and researchers of international studies, political science, geography, legal studies, criminology and sociology.
Terrorism --- Privacy, Right of --- Ports of entry --- Prevention --- Risk assessment --- Security measures --- Terrorism risk assessment --- Privacy, Right of. --- 811 Filosofie --- 852 Internationale conflicten --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Prevention. --- Law and legislation --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Terrorism - United States - Prevention --- Terrorism - Risk assessment - United States --- Privacy, Right of - United States --- Ports of entry - Security measures - United States --- Terrorism - Prevention
Choose an application
"Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement."
Privacy, Right of --- Human rights advocacy --- Human rights movements --- Human rights workers --- Privacy, Right of. --- Human rights advocacy. --- Human rights movements. --- Human rights workers. --- Activists, Human rights --- Advocates, Human rights --- Defenders of human rights --- Human rights activists --- Human rights advocates --- Human rights defenders --- Workers, Human rights --- Reformers --- Social movements --- Advocacy, Human rights --- Social advocacy --- National human rights institutions --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Law and legislation --- INFORMATION SCIENCE/Technology & Policy
Choose an application
Social networking, government databases, online shopping and loyalty cards have all generated vast amounts of personal data. This book reveals the impact this is having on our privacy and security, and provides practical information on how we can safeguard our identity and protect our children in the information society.
Information technology --- Information society. --- Privacy, Right of. --- Computer security. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Sociology --- Information superhighway --- Social aspects. --- Protection --- Security measures --- Law and legislation
Choose an application
Human rights --- Computer architecture. Operating systems --- Expression [Freedom of ] --- Free expression --- Freedom of expression --- Freedom of speech --- Liberty of expression --- Liberty of speech --- Liberté d'expression --- Meningsuiting [Vrijheid van ] --- Speech [Freedom of ] --- Vrijheid van meningsuiting --- Privacy, Right of --- Computer networks --- Mass media --- Freedom of information --- Internet --- Security measures --- Law and legislation --- 342.727 --- 34:681.3 --- Informaticarecht --- 34:681.3 Informaticarecht --- 342.727 Vrijheid van meningsuiting --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Cyberspace --- Free speech --- Speech, Freedom of --- Assembly, Right of --- Intellectual freedom --- Information, Freedom of --- Liberty of information --- Right to know --- Telecommunication --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Political aspects --- Droit international --- Computer networks - Security measures --- Mass media - Law and legislation --- Internet - Law and legislation --- Liberté d'expression --- Diffamation --- Droits de l'homme
Choose an application
Identification cards --- Electronic surveillance --- Privacy, Right of --- Liberty. --- Cartes d'identité --- Surveillance électronique --- Droit à la vie privée --- Liberté --- Social aspects --- Aspect social --- Liberty --- Cartes d'identité --- Surveillance électronique --- Droit à la vie privée --- Liberté --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Civil liberty --- Emancipation --- Freedom --- Liberation --- Personal liberty --- Democracy --- Natural law --- Political science --- Equality --- Libertarianism --- Social control --- Cards, Identification --- Credentials (Identification cards) --- I.D. cards --- ID cards --- Identity cards --- IDs (Identification cards) --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Law and legislation --- Registers of births, etc. --- Identification cards - Case studies --- Electronic surveillance - Social aspects - Case studies --- Privacy, Right of - Case studies
Choose an application
Secrecy --- Confidential communications --- Privacy, Right of --- Law and legislation --- 342.721 <41> --- -Privacy, Right of --- -Secrecy --- -342.0850941 --- Qb8gbr --- Concealment --- Privacy --- Hiding places --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Data protection --- Right to be forgotten --- Communications, Confidential --- Confidential relationships --- Confidentiality --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Professional ethics --- Persoonlijke vrijheid. Privacy. Wetgeving i.v.m. transplantatie van organen--Verenigd Koninkrijk van Groot-Brittannië en Noord-Ierland --- -Law and legislation --- -342.721 <41> --- 342.721 <41> Persoonlijke vrijheid. Privacy. Wetgeving i.v.m. transplantatie van organen--Verenigd Koninkrijk van Groot-Brittannië en Noord-Ierland --- 342.0850941 --- Secrecy (Law) --- Secrets (Law) --- Secrecy - Law and legislation - Great Britain --- Confidential communications - Great Britain --- Privacy, Right of - Great Britain --- Secrecy - Law and legislation
Choose an application
The legal status of posthumous interests is analysed in three areas of medico-legal context.
Medical law --- Family law. Inheritance law --- Professional ethics. Deontology --- Law of real property --- Legal theory and methods. Philosophy of law --- Interest (Ownership rights) --- Donation of organs, tissues, etc --- Donation of organs, tissues, etc. --- Wills. --- Dead bodies (Law). --- Interest (Ownership rights). --- Dead bodies (Law) --- Human body --- Autopsy --- Privacy, Right of --- Wills --- Law and legislation --- Moral and ethical aspects --- Body, Human --- Privacy, Right of. --- Law and legislation. --- Moral and ethical aspects. --- Codicils --- Inheritance and succession --- Legal instruments --- Registers of births, etc. --- Legacies --- Probate records --- Remainders (Estates) --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Medical laws and legislation --- Interest (Law) --- Property --- Dead --- Law --- Human body - Law and legislation --- Autopsy - Law and legislation --- Donation of organs, tissues, etc - Law and legislation --- Human body - Moral and ethical aspects --- Droit médial
Listing 1 - 10 of 12 | << page >> |
Sort by
|