Securing privacy in the Internet age

書誌事項

Securing privacy in the Internet age

edited by Anupam Chander, Lauren Gelman, and Margaret Jane Radin

Stanford Law Books, an imprint of Stanford University Press, c2008

  • : pbk

この図書・雑誌をさがす
注記

Includes bibliographical references and index

収録内容
  • Introduction : securing privacy in the Internet age / Anupam Chander
  • Defining the legal standard for information security : what does "reasonable" security really mean? / Thomas J. Smedinghoff
  • The coming wave of Internet-related security litigation / Ian C. Ballon
  • The evolution of data protection as a privacy concern, and the contract law dynamics underlying it / Jonathan K. Sobel, Karen J. Petrulakis, and Denelle M. Dixon-Thayer
  • Mutually assured protection : toward development of relational Internet data security and privacy contracting norms / Andrea M. Matwyshyn
  • The international privacy regime / Tim Wu
  • The new vulnerability : data security and personal information / Daniel J. Solove
  • Beyond contract : utilizing restitution to reach shadow offenders and safeguard information privacy / Marcy E. Peek
  • Improving software security : a discussion of liability for unreasonably insecure software / Jennifer A. Chandler
  • Curing cybersecurity breaches through strict products liability / Shubha Ghosh and Vikram Mangalmurti
  • Putting identity theft on ice : freezing credit reports to prevent lending to impostors / Chris Jay Hoofnagle
  • Anonymous disclosure of security breaches : mitigating harm and facilitating coordinated response / Edward J. Janger and Paul M. Schwartz
  • RFID and privacy / Jonathan Weinberg
  • Should criminal liability be used to secure data privacy? / Susan W. Brenner
  • The uneasy case for national ID cards / A. Michael Froomkin
  • Contracts, markets, and data control / Raymond T. Nimmer
  • Three economic arguments for cyberinsurance / Jay P. Kesan, Ruperto P. Majuca, and William J. Yurcik
内容説明・目次

内容説明

The Internet Age has created vast and ubiquitous databases of personal information in universities, corporations, government agencies, and doctors' offices. Every week, stories of databases being compromised appear in the news. Yet, despite the fact that lost laptops and insecure computer servers jeopardize our privacy, privacy and security are typically considered in isolation. Advocates of privacy have sought to protect individuals from snooping corporations, while advocates of security have sought to protect corporations from snooping individuals. Securing Privacy in the Internet Age aims to merge the discussion of these two goals. The book brings together many of the world's leading academics, litigators, and public policy advocates to work towards enhancing privacy and security. While the traditional adversary of privacy advocates has been the government, in what they see as the role of the Orwellian Big Brother, the principal focus of this book is the fraternity of Little Brothers-the corporations and individuals who seek to profit from gathering personal information about others.

目次

@fmct:Contents @toc2:Introduction: Securing Privacy in the Internet Age @tocca:Anupam Chander 1 @toc1:Part 1. Reviewing Existing Security and Privacy Law @toc2:1 Defining the Legal Standard for Information Security: What Does "Reasonable" Security Really Mean? @tocca:Thomas J. Smedinghoff 000 @toc2:2 The Coming Wave of Internet-Related Security Litigation @tocca:Ian C. Ballon 000 @toc2:3 The Evolution of Data Protection as a Privacy Concern, and the Contract Law Dynamics Underlying It @tocca:Jonathan K. Sobel, Karen J. Petrulakis, and Denelle M. Dixon-Thayer 000 @toc2:4 Mutually Assured Protection: Toward Development of Relational Internet Data Security and Privacy Contracting Norms @tocca:Andrea M. Matwyshyn 000 @toc2:5 The International Privacy Regime @tocca:Tim Wu 000 @toc1:Part 2. Promoting Privacy Security Through the Common Law @toc2:6 The New Vulnerability: Data Security and Personal Information @tocca:Daniel J. Solove 000 @toc2:7 Beyond Contract: Utilizing Restitution to Reach Shadow Offenders and Safeguard Information Privacy @tocca:Marcy E. Peek 000 @toc2:8 Improving Software Security: A Discussion of Liability for Unreasonably Insecure Software @tocca:Jennifer A. Chandler 000 @toc2:9 Curing Cybersecurity Breaches Through Strict Products Liability @tocca:Shubha Ghosh and Vikram Mangalmurti 000 @toc1:Part 3. Promoting Privacy and Security Through Statutory Reforms @toc2:10 Putting Identity Theft on Ice: Freezing Credit Reports To Prevent Lending to Impostors @tocca:Chris Jay Hoofnagle 000 @toc2:11 Anonymous Disclosure of Security Breaches: Mitigating Harm and Facilitating Coordinated Response @tocca:Edward J. Janger and Paul M. Schwartz 000 @toc2:12 RFID and Privacy @tocca:Jonathan Weinberg 000 @toc2:13 Should Criminal Liability Be Used to Secure Data Privacy? @tocca:Susan W. Brenner 000 @toc2:14 The Uneasy Case for National ID Cards @tocca:A. Michael Froomkin 000 Part 4. Promoting Privacy and Security Through the Market @toc2:15 Contracts, Markets, and Data Control @tocca:Raymond T. Nimmer 000 16 Three Economic Arguments for Cyberinsurance @tocca:Jay P. Kesan, Ruperto P. Majuca, and William J. Yurcik 000 @toc4:Index 000

「Nielsen BookData」 より

詳細情報
ページトップへ