During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly in a climate of growing public mistrust of State surveillance activities and business predisposition to monetize information relating to the online activities of users. This volume is informed by the range of discussions currently conducted at scholarly and policy levels. The essays illustrate the value of viewing privacy concerns not only in terms of the means by which information is communicated but also in terms of the political processes that are inevitably engaged and the institutional, regulatory and cultural contexts within which meanings regarding identity and security are constituted.
Contents: Introduction. Part I Identity, Security and Privacy in Context: Designing for trust, L. Jean Camp; The digital persona and its application to data surveillance, Roger Clarke; Privacy, visibility, transparency, and exposure, Julie E. Cohen; Exploring identity and identification in cyberspace, Oscar H. Gandy, Jr; A contextual approach to privacy online, Helen Nissenbaum. Part II Surveillance, Security and Anonymity: Hacking the Panopticon: distributed online surveillance and resistance, BenoÃ®t Dupont; The surveillant assemblage, Kevin D. Haggerty and Richard V. Ericson; 'Sousveillance': inverse surveillance in multimedia imaging, Steve Mann; Surveillance as cultural practice, Torin Monahan; Surveillance and security: a dodgy relationship, Walter Peissl; Counter-surveillance as political intervention?, Torin Monahan; Resistance against cyber-surveillance within social movements and how surveillance adapts, Oliver Leistert; Privacy, surveillance, and law, Richard A. Posner; Squaring the circle of smart surveillance and privacy, Joseph A. Cannataci. Part III Privacy, Data Protection and Security: Data protection pursuant to the right to privacy in human rights treaties, Lee A. Bygrave; Consumer culture and the commodification of policing and security, Ian Loader; Information technology and dataveillance, Roger A. Clarke; Public assessment of new surveillance-oriented security technologies: beyond the trade-off between privacy and security, Vincenzo Pavone and Sara Degli Esposti; European protectionism in cloud computing: addressing concerns over the PATRIOT Act, John T. Billings; Internet intermediaries, cloud computing and geospatial data: how competition and privacy converge in the mobile environment, Lisa Madelon Campbell; Stolen identities, Jennifer Whitson and Kevin D. Haggerty. Part IV Smart Technologies, Social Control and Human Rights: The body as data? Biobank regulation via the ’back door’ of data protection law, Lee A. Bygrave; CCTV policy in th