![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
1910 |
![]() ![]() Author: Bennett Colin J. Publisher: Mit Pr Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement. € 9,40
|
|
2008 |
![]() ![]() Author: Bennett Colin J. Publisher: Mit Pr Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement. € 7,20
|
![]() ![]() Author: Colin Bennett Publisher: ROUTLEDGE Researchers in political science, information science, and several other disciplines, along with practitioners and advocates with various orientations explore how identity cards and other forms of surveillance have become a form of governance in modern states. The topics include governing by identity, China's second-generation national identity card, the INES biometric card and the politics of national identity assignment in France, and the European health insurance card. Annotation ©2008 Book News, Inc., Portland, OR (booknews.com) € 60,60
|
2006 |
![]() ![]() Author: Bennett Colin J., Raab Charles D. Publisher: Mit Pr Privacy protection, according to Colin Bennett and Charles Raab, involves politics and public policy as much as it does law and technology. Moreover, the protection of our personal information in a globalized, borderless world means that privacy-related policies are inextricably interdependent. In this updated paperback edition of The Governance of Privacy Bennett and Raab analyze a broad range of privacy policy instruments available to contemporary advanced industrial states, from government regulations and transnational regimes to self-regulation and privacy-enhancing technologies. They consider two possible dynamics of privacy regulation--a 'race to the bottom,' with competitive deregulation by countries eager to attract global investment in information technology, versus 'a race to the top,' with the progressive establishment of global privacy standards.Bennett and Raab begin by discussing the goals of privacy protection, the liberal and individualist assumptions behind it, and the neglected relationship between privacy and social equity. They describe and evaluate different policy instruments, including the important 1995 Directive on Data Protection from the European Union, as well as the general efficacy of the 'top-down' statutory approach and self-regulatory and technological alternatives to it. They evaluate the interrelationships of these policy instruments and their position in a global framework of regulation and policy by state and non-state actors. And finally, they consider whether all of this policy activity at international, national, and corporate levels necessarily means higher levels of privacy protection. € 27,70
|
|
1999 |
![]() ![]() Author: Bennett Colin J. (EDT), Grant Rebecca (EDT) Publisher: Univ of Toronto Pr € 33,30
|
|
1987 |
![]() ![]() Author: Bennett Colin Publisher: Hermes Edizioni Come risalire alle vite precedenti. Quale reale possibilità ha l'uomo di ripercorrere esistenze ed esperienze già vissute? Quei momenti 'strani', in cui si ha la sensazione di essere già stati in un luogo o di aver già compiuto un determinato gesto, sono esperienze quotidiane che tutti viviamo, ma che ci affrettiamo a dimenticare o razionalizzare, appena passato il momento 'magico'. Eppure queste sensazioni di déjà-vu sono solo degli appelli che le nostre esperienze passate ci lanciano. Seguendo le istruzioni contenute in questo libro è possibile ripercorrere all'indietro la nostra storia spirituale, risalendo alle nostre vite precedenti. Ci saranno d'aiuto numerose ed efficaci tecniche, come il magnetismo personale, la proiezione delle forme-pensiero, la lettura delle sfere di cristallo, la concentrazione e la contemplazione psichica e la visione dell'aura. Tutti questi procedimenti sono qui esposti dettagliatamente, e danno a chiunque l'opportunità di fare un vero e proprio 'tuffo nel passato'. € 11,50
Scontato: € 10,93
|
|