Details

Security and Privacy in the Digital Era


Security and Privacy in the Digital Era


1. Aufl.

von: Claudine Guerrier

139,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 16.08.2016
ISBN/EAN: 9781119347705
Sprache: englisch
Anzahl Seiten: 288

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>"The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties."<br /><b>—Mireille Delmas Marty</b>, Libertés et sûreté dans un monde dangereux, 2010</p> <p>This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to be less freedom in terms of security to the point that some scholars have wondered whether privacy should be redefined in this era. The actors involved (the Western states, digital firms, human rights organizations etc.) have seen their roles impact the legal and political science fields.</p>
<p>Introduction  vii</p> <p><b>Part 1 Technology and Human Rights  1</b></p> <p><b>Chapter 1. The Ideology of Human Rights 3</b></p> <p>1.1. Constitutional Texts  3</p> <p>1.2. Some texts have an international scope  8</p> <p>1.3. European texts 16</p> <p><b>Chapter 2. Protection of Personal Data 29</b></p> <p>2.1. Convention 108  29</p> <p>2.2. United Nations General Assembly Resolution 45/95 on December 14, 1990 31</p> <p>2.3. Sources of EU law 32</p> <p><b>Chapter 3. Telecommunication Interception  39</b></p> <p>3.1. Jurisprudence of the EHCR 39</p> <p>3.2. Interceptions in the United States  45</p> <p>3.3. European states and interceptions  50</p> <p>3.4. Interception controls 61</p> <p><b>Chapter 4. Biometrics and Videosurveillance 69</b></p> <p>4.1. Biometrics 69</p> <p>4.2. Videosurveillance 80</p> <p><b>Part 2 The Era of Surveillance and Control  89</b></p> <p><b>Chapter 5. The Sources of Law in the Field of Security Illustrate This Change 91</b></p> <p>5.1. The USA  91</p> <p>5.2. The United Kingdom 95</p> <p>5.3. France  99</p> <p><b>Chapter 6. Interceptions 113</b></p> <p>6.1. The United States of America  113</p> <p>6.2. France  126</p> <p><b>Chapter 7. Other Methods of Surveillance 135</b></p> <p>7.1. Biometrics 135</p> <p>7.2. Passenger name record 147</p> <p>7.3. Data and files  151</p> <p>7.4. New technologies; geolocation, body scanners, and drones are increasingly used  155</p> <p><b>Part 3 Between Security and Freedom  179</b></p> <p><b>Chapter 8. Towards Compromise 181</b></p> <p>8.1. Legal measures have been taken in order to protect some fundamental freedoms 181</p> <p>8.2. European jurisprudence  191</p> <p>8.3. The monitoring continues to develop in the communications sector 223</p> <p>Conclusion 241</p> <p>Bibliography  249</p> <p>Index 251</p>
<p><b>Claudine Guerrier</b> is Professor of Law at the Institut Mines-Télécom and the Télécom Ecole de Management in Paris, France. Her research focuses on the tense relationship between technology, security and privacy.</p>

Diese Produkte könnten Sie auch interessieren:

Strategies to the Prediction, Mitigation and Management of Product Obsolescence
Strategies to the Prediction, Mitigation and Management of Product Obsolescence
von: Bjoern Bartels, Ulrich Ermel, Peter Sandborn, Michael G. Pecht
PDF ebook
116,99 €