understanding the importance and impact of anonymity and authentication in a networked society
navigation menu top border
navigation menu bottom border
left side navigation top border

left side navigation bottom border

left side navigation top border
left side navigation top border

main display area top border

LESSONS FROM THE IDENTITY TRAIL

Anonymity, Privacy and Identity in a Networked Society

 Edited by:

Ian Kerr
Valerie Steeves
Carole Lucock

During the past decade, rapid developments in information and communications technology have transformed key social, commercial, and political realities. Within that same time period, working at something less than Internet speed, much of the academic and policy debate arising from these new and emerging technologies has been fragmented. There have been few examples of interdisciplinary dialogue about the importance and impact of anonymity and privacy in a networked society. Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society fills that gap, and examines key questions about anonymity, privacy, and identity in an environment that increasingly automates the collection of personal information and relies upon surveillance to promote private and public sector goals.

This book has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers, and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recent research outcomes.

The book is available for download under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Canada License by chapter below.  Hard copies are available for purchase at Amazon & at Oxford University Press.

Creative Commons License 

Copyright Notice 80.38 Kb

About this Book 58.58 Kb
Acknowledgements 76.00 Kb
Contributors 89.97 Kb
The Strange Return of Gyges’ Ring : An Introduction 150.55 Kb

I. PRIVACY

Introduction to Part I 64.11 Kb

Chapter 1. Soft Surveillance, Hard Consent: The Law and Psychology of Engineering Consent 220.76 Kb
by IAN KERR, JENNIFER BARRIGAR, JACQUELYN BURKELL, AND KATIE BLACK

Chapter 2. Approaches to Consent in Canadian Data Protection Law 23 230.07 Kb
by PHILIPPA LAWSON AND MARY O'DONOGHUE

Chapter 3. Learning from Data Protection Law at the Nexus of Copyright and Privacy 211.87 Kb
by ALEX CAMERON

Chapter 4. A Heuristics Approach to Understanding Privacy-Protecting Behaviors in Digital Social Environments 187.21 Kb
by ROBERT CAREY AND JACQUELYN BURKELL

Chapter 5. Ubiquitous Computing and Spatial Privacy 230.62 Kb
by ANNE UTECK

Chapter 6. Core Privacy: A Problem for Predictive Data Mining 181.69 Kb
by JASON MILLAR

Chapter 7. Privacy Versus National Security: Clarifying the Trade-Off 186.14 Kb
by JENNIFER CHANDLER

Chapter 8. Privacy’s Second Home: Building a New Home for Privacy Under Section 15 of the Charter 204.42 Kb
by DAPHNE GILBERT

Chapter 9. What Have You Done for Me Lately? Reflections on Redeeming Privacy for Battered Women 229.09 Kb
by JENA MCGILL

Chapter 10. Genetic Technologies and Medicine: Privacy, Identity, and Informed Consent 205.51 Kb
by MARSHA HANEN

Chapter 11. Reclaiming the Social Value of Privacy 359.40 Kb
by VALERIE STEEVES

II. IDENTITY

Introduction to Part II 63.92 Kb 

Chapter 12. A Conceptual Analysis of Identity 154.83 Kb
by STEVEN DAVIS

Chapter 13. Identity: Difference and Categorization 202.97 Kb
by CHARLES D. RAAB

Chapter 14. Identity Cards and Identity Romanticism 341.48 Kb
by A. MICHAEL FROOMKIN

Chapter 15. What’s in a Name? Who Benefits from the Publication Ban in Sexual Assault Trials? 215.82 Kb
by JANE DOE

Chapter 16. Life in the Fish Bowl: Feminist Interrogations of Webcamming 228.94 Kb
by JANE BAILEY

Chapter 17. Ubiquitous Computing, Spatiality, and the Construction of Identity: Directions for Policy Response 193.19 Kb
by DAVID J. PHILLIPS

Chapter 18. Dignity and Selective Self-Presentation 327.03 Kb
by DAVID MATHESON

Chapter 19. The Internet of People? Reflections on the Future Regulation of Human-Implantable Radio Frequency Identification 225.78 Kb
by IAN KERR

Chapter 20. Using Biometrics to Revisualize the Canada–U.S. Border 227.39 Kb
by SHOSHANA MAGNET

Chapter 21. Soul Train: The New Surveillance in Popular Music 225.71 Kb
by GARY T. MARX

Chapter 22. Exit Node Repudiation for Anonymity Networks 1.11 Mb
by JEREMY CLARK, PHILIPPE GAUVIN, AND CARLISLE ADAMS

Chapter 23. TrackMeNot: Resisting Surveillance in Web Search 948.30 Kb
by DANIEL C. HOWE AND HELEN NISSENBAUM

III. ANONYMITY

Introduction to Part III 63.60 Kb

Chapter 24. Anonymity and the Law in the United States 232.09 Kb
by A. MICHAEL FROOMKIN

Chapter 25. Anonymity and the Law in Canada 207.84 Kb
by CAROLE LUCOCK AND KATIE BLACK

Chapter 26. Anonymity and the Law in the United Kingdom 181.21 Kb
by IAN LLOYD

Chapter 27. Anonymity and the Law in the Netherlands 208.34 Kb
by SIMONE VAN DER HOF, BERT JAAP KOOPS, AND RONALD LEENES

Chapter 28. Anonymity and the Law in Italy 191.43 Kb
by GIUSELLA FINOCCHIARO
 

 INDEX  175.36 Kb

 
main display area bottom border

.:privacy:. | .:contact:. | .:1rxdrugs.net:.


This is a SSHRC funded project:
Social Sciences and Humanities Research Council of Canada

© 2014 On the Identity Trail
Joomla! is Free Software released under the GNU/GPL License.