,

Security and Privacy in the Digital Era

Specificaties
Gebonden, 288 blz. | Engels
John Wiley & Sons | e druk, 2016
ISBN13: 9781786300782
Rubricering
John Wiley & Sons e druk, 2016 9781786300782
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

"The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties."
Mireille Delmas Marty, Libertés et sûreté dans un monde dangereux, 2010

This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to be less freedom in terms of security to the point that some scholars have wondered whether privacy should be redefined in this era. The actors involved (the Western states, digital firms, human rights organizations etc.) have seen their roles impact the legal and political science fields.

Specificaties

ISBN13:9781786300782
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:288

Inhoudsopgave

<p>Introduction&nbsp; vii</p>
<p>Part 1 Technology and Human Rights&nbsp; 1</p>
<p>Chapter 1. The Ideology of Human Rights 3</p>
<p>1.1. Constitutional Texts&nbsp; 3</p>
<p>1.2. Some texts have an international scope&nbsp; 8</p>
<p>1.3. European texts 16</p>
<p>Chapter 2. Protection of Personal Data 29</p>
<p>2.1. Convention 108&nbsp; 29</p>
<p>2.2. United Nations General Assembly Resolution 45/95 on December 14, 1990 31</p>
<p>2.3. Sources of EU law 32</p>
<p>Chapter 3. Telecommunication Interception&nbsp; 39</p>
<p>3.1. Jurisprudence of the EHCR 39</p>
<p>3.2. Interceptions in the United States&nbsp; 45</p>
<p>3.3. European states and interceptions&nbsp; 50</p>
<p>3.4. Interception controls 61</p>
<p>Chapter 4. Biometrics and Videosurveillance 69</p>
<p>4.1. Biometrics 69</p>
<p>4.2. Videosurveillance 80</p>
<p>Part 2 The Era of Surveillance and Control&nbsp; 89</p>
<p>Chapter 5. The Sources of Law in the Field of Security Illustrate This Change 91</p>
<p>5.1. The USA&nbsp; 91</p>
<p>5.2. The United Kingdom 95</p>
<p>5.3. France&nbsp; 99</p>
<p>Chapter 6. Interceptions 113</p>
<p>6.1. The United States of America&nbsp; 113</p>
<p>6.2. France&nbsp; 126</p>
<p>Chapter 7. Other Methods of Surveillance 135</p>
<p>7.1. Biometrics 135</p>
<p>7.2. Passenger name record 147</p>
<p>7.3. Data and files&nbsp; 151</p>
<p>7.4. New technologies; geolocation, body scanners, and drones are increasingly used&nbsp; 155</p>
<p>Part 3 Between Security and Freedom&nbsp; 179</p>
<p>Chapter 8. Towards Compromise 181</p>
<p>8.1. Legal measures have been taken in order to protect some fundamental freedoms 181</p>
<p>8.2. European jurisprudence&nbsp; 191</p>
<p>8.3. The monitoring continues to develop in the communications sector 223</p>
<p>Conclusion 241</p>
<p>Bibliography&nbsp; 249</p>
<p>Index 251</p>

Rubrieken

    Personen

      Trefwoorden

        Security and Privacy in the Digital Era