Privacy, Surveillance, and the New Media You
Series:
Edward Lee Lamoureux
Very little in the American way of life functions adequately under surveillance. Democracy itself may be at mortal risk due to the loss of privacy and the increase in surveillance.
Examining challenges in a wide range of contexts, this book investigates and critically examines our systems of data management, including the ways that data are collected, exchanged, analyzed, and re-purposed.
The volume calls for re-establishing personal privacy as a societal norm and priority, requiring action on the part of everyone at personal, societal, business, and governmental levels. Because new media products and services are professionally designed and implemented to be frictionless and highly rewarding, change is difficult and solutions are not easy. This volume provides insight into challenges and recommended solutions.
Book (EPUB)
- ISBN:
- 978-1-4331-3579-8
- Availability:
- Available
- Subjects:
Prices
Currency depends on your shipping address
- New York, Bern, Berlin, Bruxelles, Frankfurt am Main, Oxford, Wien, 2016. XL, 248 pp.
- Cover
- Title
- Copyright
- About the author(s)/editor(s)
- About the book
- This eBook can be cited
- Contents
- Acknowledgements
- Preface
- Introduction
- How the Heck Did We Get Here?
- Technological Complexities in Data Collection: Out of Sight, Out of Reach
- Appealing to Consumers’ Lowest Common Denominators: It’s All Good?
- Supporting Economic Interests of Business and Industry: Doubling Down on Data
- Unwillingness of Government to Protect Its Citizenry from Itself: Corporations Are Our Most Valued People
- Concerns over Terrorism and Security Risks: A Darned (In)Convenient War on Terror
- Family Observations: A Personal Anecdote
- Chapter Previews
- Chapter 1: The Harms
- Loss of Control over Personal Data
- Hacking as Lawlessness
- Leaks and Sponges: We Were Not Supposed to Collect It or Lose It
- Costs and Harms of Data Breaches
- Undermining Constitutional Protections
- Encroaching on First Amendment Protections
- Encroaching on Third Amendment Protections
- Encroaching on Fourth Amendment Protections
- Encroaching on Fifth Amendment Protections
- Encroaching on Fourteenth Amendment Protections
- Article III: No Harm No Foul? Perhaps Not So Much
- Personal Data and the Value Equation
- Chapter 2: Centerings
- Theoretical Orientations
- Interrogating New Media
- The Framework of Contextual Integrity
- Identifying Loci of Control
- Ideological Powers in Platforms
- Chapter 3: FIP 1: No Secret Data Collection
- When Is a Contract Just Barely, or Not, a Contract?
- Data Anonymity via Aggregation as Oxymoron
- Even the Most Private Datum Isn’t
- Knowing about the Unknowable
- Quick Reminder: The Constitution Is Supposed to Protect Our Privacy
- Chapter 4: FIPs 2 and 4: Discovery and Repair
- You Can’t Fix It If You Don’t Know About—And Can’t Access—It
- Online Privacy and the European Union
- The Right to Be Forgotten
- Ownership of Social Media Accounts in the Enterprise: “Unhand My Stuff!”
- Toward Chapter 5 and the Third FIP
- Chapter 5: FIP 3: One Use Should Not Bind Them All
- Data Collection and Security: Commercial Entities Sharing with the Government
- Battles over Encryption and Cryptography
- Encryption and Export Controls
- The Snowden Revelations
- Data Collection and Insecurity: The Government Sharing with Commercial Entities
- Crossing Government and Commercial Streams within the Data Marketplace
- We Claim to Know Better but Do Not Act Like It
- Chapter 6: FIP 5: If You Don’t Protect It, You Should Not Have It
- Improved Data Reliability via the Marketplace
- Big Data Can Aid Problem Solving
- Recommendations Can Help
- Improved Targeting Can Be Good for Both Sides
- The Usability and Functionality Lies
- Unreliability via the Marketplace
- Data Abuse via the Marketplace
- You Can Touch This Because I Can’t Protect It
- Chapter 7: Recommendations
- Action Proposals for Government
- Executive Leadership
- Federal Agencies
- Congressional Legislation
- Congressional Legislative Action on Commercial Activities
- Congressional Legislative Action on Intelligence Activities
- Intelligence Community and Law Enforcement
- Judges and Courts
- State-Level Actions
- States and the FIPs: Constraint of Government Agencies and Law Enforcement from Predatory Practices
- State-Based Actions in the Commercial Privacy Environment
- Action Proposals for Commercial Entities
- Industry Leadership
- Executive Leadership
- Worker Behaviors
- Protocol Changes
- Privacy Policies and Terms of Service
- Flip the Defaults
- Offer Multiple Versions
- Reconsider Data as Revenue Streams
- Reengineer Data Anonymity
- Nonprofits: Great Responsibilities
- WE, the People
- Notes
- Chapter 3: FIP 1: No Secret Data Collection
- Chapter 7: Recommendations
- Works Cited
- About the Author
- About the Front Cover
- Index
- Series index
About the author(s)/editor(s)
Chapter
- Subjects:
Prices
Chapter Price (Chapters only digitally available)
Currency depends on your shipping address
Extract
EDWARD LEE LAMOUREUX (Ph.D., University of Oregon) is a Professor at Bradley University. He is lead co-author of Intellectual Property Law and Interactive Media: Free for a Fee (2015, 2nd edition). He served as editor of the Journal of Communication and Religion from 1998–2003.
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.
Or login to access all content.- Cover
- Title
- Copyright
- About the author(s)/editor(s)
- About the book
- This eBook can be cited
- Contents
- Acknowledgements
- Preface
- Introduction
- How the Heck Did We Get Here?
- Technological Complexities in Data Collection: Out of Sight, Out of Reach
- Appealing to Consumers’ Lowest Common Denominators: It’s All Good?
- Supporting Economic Interests of Business and Industry: Doubling Down on Data
- Unwillingness of Government to Protect Its Citizenry from Itself: Corporations Are Our Most Valued People
- Concerns over Terrorism and Security Risks: A Darned (In)Convenient War on Terror
- Family Observations: A Personal Anecdote
- Chapter Previews
- Chapter 1: The Harms
- Loss of Control over Personal Data
- Hacking as Lawlessness
- Leaks and Sponges: We Were Not Supposed to Collect It or Lose It
- Costs and Harms of Data Breaches
- Undermining Constitutional Protections
- Encroaching on First Amendment Protections
- Encroaching on Third Amendment Protections
- Encroaching on Fourth Amendment Protections
- Encroaching on Fifth Amendment Protections
- Encroaching on Fourteenth Amendment Protections
- Article III: No Harm No Foul? Perhaps Not So Much
- Personal Data and the Value Equation
- Chapter 2: Centerings
- Theoretical Orientations
- Interrogating New Media
- The Framework of Contextual Integrity
- Identifying Loci of Control
- Ideological Powers in Platforms
- Chapter 3: FIP 1: No Secret Data Collection
- When Is a Contract Just Barely, or Not, a Contract?
- Data Anonymity via Aggregation as Oxymoron
- Even the Most Private Datum Isn’t
- Knowing about the Unknowable
- Quick Reminder: The Constitution Is Supposed to Protect Our Privacy
- Chapter 4: FIPs 2 and 4: Discovery and Repair
- You Can’t Fix It If You Don’t Know About—And Can’t Access—It
- Online Privacy and the European Union
- The Right to Be Forgotten
- Ownership of Social Media Accounts in the Enterprise: “Unhand My Stuff!”
- Toward Chapter 5 and the Third FIP
- Chapter 5: FIP 3: One Use Should Not Bind Them All
- Data Collection and Security: Commercial Entities Sharing with the Government
- Battles over Encryption and Cryptography
- Encryption and Export Controls
- The Snowden Revelations
- Data Collection and Insecurity: The Government Sharing with Commercial Entities
- Crossing Government and Commercial Streams within the Data Marketplace
- We Claim to Know Better but Do Not Act Like It
- Chapter 6: FIP 5: If You Don’t Protect It, You Should Not Have It
- Improved Data Reliability via the Marketplace
- Big Data Can Aid Problem Solving
- Recommendations Can Help
- Improved Targeting Can Be Good for Both Sides
- The Usability and Functionality Lies
- Unreliability via the Marketplace
- Data Abuse via the Marketplace
- You Can Touch This Because I Can’t Protect It
- Chapter 7: Recommendations
- Action Proposals for Government
- Executive Leadership
- Federal Agencies
- Congressional Legislation
- Congressional Legislative Action on Commercial Activities
- Congressional Legislative Action on Intelligence Activities
- Intelligence Community and Law Enforcement
- Judges and Courts
- State-Level Actions
- States and the FIPs: Constraint of Government Agencies and Law Enforcement from Predatory Practices
- State-Based Actions in the Commercial Privacy Environment
- Action Proposals for Commercial Entities
- Industry Leadership
- Executive Leadership
- Worker Behaviors
- Protocol Changes
- Privacy Policies and Terms of Service
- Flip the Defaults
- Offer Multiple Versions
- Reconsider Data as Revenue Streams
- Reengineer Data Anonymity
- Nonprofits: Great Responsibilities
- WE, the People
- Notes
- Chapter 3: FIP 1: No Secret Data Collection
- Chapter 7: Recommendations
- Works Cited
- About the Author
- About the Front Cover
- Index
- Series index