Privacy Part 1: Corporate Data Gathering: Difference between revisions
No edit summary |
|||
Line 23: | Line 23: | ||
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, ''Code 2.0'' (Chapter 7)] (focus on "Privacy in Public: Data") | * [https://www.socialtext.net/codev2/privacy Lawrence Lessig, ''Code 2.0'' (Chapter 7)] (focus on "Privacy in Public: Data") | ||
* [ | * [http://www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213 Bruce Schneier, Why Anonymous Data Sometimes Isn't] | ||
:* The concept of the "Internet of Things" is well summarized [http://www.youtube.com/watch?v=sfEbMV295Kk here]. | :* The concept of the "Internet of Things" is well summarized [http://www.youtube.com/watch?v=sfEbMV295Kk here]. | ||
Line 44: | Line 44: | ||
* [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know It (''New York Times'')] | * [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know It (''New York Times'')] | ||
* [https://www.schneier.com/blog/archives/2013/05/the_eyes_and_ea.html Bruce Schneier, Surveillance and the Internet of Things] | |||
</onlyinclude> | </onlyinclude> |
Revision as of 10:30, 18 November 2013
April 1
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online it way succumb to the interests of profitability, online behavior regulation, and cybersecurity.
Over the next two weeks we'll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns. Next week we'll build on these concepts with an eye toward government surveillance and law enforcement.
Readings
- Conceptualizing privacy
- Privacy and technology
- Hal Abelson, Ken Ledeen, and Harry Lewis, Blown to Bits (Chapter 2) (read pages 36-42)
- Lawrence Lessig, Code 2.0 (Chapter 7) (focus on "Privacy in Public: Data")
- The concept of the "Internet of Things" is well summarized here.
- Privacy and law
Optional Readings