Securing privacy in the Internet age /
edited by Anupam Chander, Lauren Gelman, and Margaret Jane Radin.
imprint
Stanford, Calif. : Stanford Law Books, c2008.
description
vi, 376 p. : ill. ; 23 cm.
ISBN
9780804759182 (pbk. : alk. paper)
format(s)
Book
Holdings
More Details
imprint
Stanford, Calif. : Stanford Law Books, c2008.
isbn
9780804759182 (pbk. : alk. paper)
contents note
Defining the legal standard for information security : what does "reasonable" security really mean? / Thomas J. Smedinghoff -- The coming wave of Internet-related security litigation / Ian C. Ballon -- The evolution of data protection as a privacy concern, and the contract law dynamics underlying it / Jonathan K. Sobel, Karen J. Petrulakis, and Denelle M. Dixon-Thayer -- Mutually assured protection : toward development of relational Internet data security and privacy contracting norms / Andrea M. Matwyshyn -- The international privacy regime / Tim Wu -- The new vulnerability : data security and personal information / Daniel J. Solove -- Beyond contract : utilizing restitution to reach shadow offenders and safeguard information privacy / Marcy E. Peek -- Improving software security : a discussion of liability for unreasonably insecure software / Jennifer A. Chandler -- Curing cybersecurity breaches through strict products liability / Shubha Ghosh and Vikram Mangalmurti -- Putting identity theft on ice : freezing credit reports to prevent lending to impostors / Chris Jay Hoofnagle -- Anonymous disclosure of security breaches : mitigating harm and facilitating coordinated response / Edward J. Janger and Paul M. Schwartz -- RFID and privacy / Jonathan Weinberg -- Should criminal liability be used to secure data privacy? / Susan W. Brenner -- The uneasy case for national ID cards / A. Michael Froomkin -- Contracts, markets, and data control / Raymond T. Nimmer -- Three economic arguments for cyberinsurance / Jay P. Kesan, Ruperto P. Majuca, and William J. Yurcik.
catalogue key
6661688
 
Includes bibliographical references and index.
A Look Inside
Reviews
Review Quotes
"Although much has been written on privacy and security as they relate, separately, to information and to information technology, this anthology is the first extended treatment of the two factors combined, with articles by top legal scholars in both fields.Securing Privacy in the Internet Ageis an important book." Helen Nissenbaum, New York University
"Although much has been written on privacy and security as they relate, separately, to information and to information technology, this anthology is the first extended treatment of the two factors combined, with articles by top legal scholars in both fields.Securing Privacy in the Internet Ageis an important book."Helen Nissenbaum, New York University
"Although much has been written on privacy and security as they relate, separately, to information and to information technology, this anthology is the first extended treatment of the two factors combined, with articles by top legal scholars in both fields. Securing Privacy in the Internet Ageis an important book."--Helen Nissenbaum, New York University
"Clearly, this is a book that moves among many interesting and even compelling topics on the important issues of privacy and security. The richness of this book is its incorporation of a variety of perspectives, including copious footnotes for every chapter. It is thought-provoking and interesting and would serve to introduce the novice on this issue to many aspects of privacy and security."-- Law and Politics Book Review
"Clearly, this is a book that moves among many interesting and even compelling topics on the important issues of privacy and security. The richness of this book is its incorporation of a variety of perspectives, including copious footnotes for every chapter. It is thought-provoking and interesting and would serve to introduce the novice on this issue to many aspects of privacy and security."Law and Politics Book Review
This item was reviewed in:
Reference & Research Book News, May 2009
To find out how to look for other reviews, please see our guides to finding book reviews in the Sciences or Social Sciences and Humanities.
Summaries
Main Description
The Internet Age has created vast and ubiquitous databases of personal information in universities, corporations, government agencies, and doctors' offices. Every week, stories of databases being compromised appear in the news. Yet, despite the fact that lost laptops and insecure computer servers jeopardize our privacy, privacy and security are typically considered in isolation. Advocates of privacy have sought to protect individuals from snooping corporations, while advocates of security have sought to protect corporations from snooping individuals. Securing Privacy in the Internet Ageaims to merge the discussion of these two goals. The book brings together many of the world's leading academics, litigators, and public policy advocates to work towards enhancing privacy and security. While the traditional adversary of privacy advocates has been the government, in what they see as the role of the Orwellian Big Brother, the principal focus of this book is the fraternity of Little Brothersthe corporations and individuals who seek to profit from gathering personal information about others.
Bowker Data Service Summary
The Internet age has created new legal issues for privacy and security. Advocates of privacy have sought to protect individuals from snooping corporations, and advocates of security have sought to protect corporations from snooping individuals. This book merges the discussion of these two goals.
Main Description
The Internet Age has created vast and ubiquitous databases of personal information in universities, corporations, government agencies, and doctors' offices. Every week, stories of databases being compromised appear in the news. Yet, despite the fact that lost laptops and insecure computer servers jeopardize our privacy, privacy and security are typically considered in isolation. Advocates of privacy have sought to protect individuals from snooping corporations, while advocates of security have sought to protect corporations from snooping individuals. Securing Privacy in the Internet Ageaims to merge the discussion of these two goals. The book brings together many of the world's leading academics, litigators, and public policy advocates to work towards enhancing privacy and security. While the traditional adversary of privacy advocates has been the government, in what they see as the role of the Orwellian Big Brother, the principal focus of this book is the fraternity of Little Brothers--the corporations and individuals who seek to profit from gathering personal information about others.
Table of Contents
Introduction: Securing Privacy in the Internet Agep. 1
Reviewing Existing Security and Privacy Law
Defining the Legal Standard for Information Security: What Does "Reasonable" Security Really Mean?p. 19
The Coming Wave of Internet-Related Security Litigationp. 41
The Evolution of Data Protection as a Privacy Concern, and the Contract Law Dynamics Underlying Itp. 55
Mutually Assured Protection: Toward Development of Relational Internet Data Security and Privacy Contracting Normsp. 73
The International Privacy Regimep. 91
Promoting Privacy and Security Through the Common Law
The New Vulnerability: Data Security and Personal Informationp. 111
Beyond Contract: Utilizing Restitution to Reach Shadow Offenders and Safeguard Information Privacyp. 137
Improving Software Security: A Discussion of Liability for Unreasonably Insecure Softwarep. 155
Curing Cybersecurity Breaches Through Strict Products Liabilityp. 187
Promoting Privacy and Security Through Statutory Reforms
Putting Identity Theft on Ice: Freezing Credit Reports to Prevent Lending to Impostorsp. 207
Anonymous Disclosure of Security Breaches: Mitigating Harm and Facilitating Coordinated Responsep. 221
RFID and Privacyp. 245
Should Criminal Liability Be Used to Secure Data Privacy?p. 271
The Uneasy Case for National ID Cardsp. 295
Promoting Privacy and Security Through the Market
Contracts, Markets, and Data Controlp. 325
Three Economic Arguments for Cyberinsurancep. 345
Indexp. 367
Table of Contents provided by Ingram. All Rights Reserved.

This information is provided by a service that aggregates data from review sources and other sources that are often consulted by libraries, and readers. The University does not edit this information and merely includes it as a convenience for users. It does not warrant that reviews are accurate. As with any review users should approach reviews critically and where deemed necessary should consult multiple review sources. Any concerns or questions about particular reviews should be directed to the reviewer and/or publisher.

  link to old catalogue

Share your feedback