Security and privacy in the digital era
著者
書誌事項
Security and privacy in the digital era
(Innovation, entrepreneurship, management series, . Innovation and technology set / coordinated by Chantal Ammi ; v. 1)
ISTE , Wiley, 2016
大学図書館所蔵 全3件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references (p. [249]-250) and index
内容説明・目次
内容説明
"The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties."
-Mireille Delmas Marty, Libertes et surete dans un monde dangereux, 2010
This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to be less freedom in terms of security to the point that some scholars have wondered whether privacy should be redefined in this era. The actors involved (the Western states, digital firms, human rights organizations etc.) have seen their roles impact the legal and political science fields.
目次
- Introduction vii Part 1 Technology and Human Rights 1 Chapter 1. The Ideology of Human Rights 3 1.1. Constitutional Texts 3 1.2. Some texts have an international scope 8 1.3. European texts 16 Chapter 2. Protection of Personal Data 29 2.1. Convention 108 29 2.2. United Nations General Assembly Resolution 45/95 on December 14, 1990 31 2.3. Sources of EU law 32 Chapter 3. Telecommunication Interception 39 3.1. Jurisprudence of the EHCR 39 3.2. Interceptions in the United States 45 3.3. European states and interceptions 50 3.4. Interception controls 61 Chapter 4. Biometrics and Videosurveillance 69 4.1. Biometrics 69 4.2. Videosurveillance 80 Part 2 The Era of Surveillance and Control 89 Chapter 5. The Sources of Law in the Field of Security Illustrate This Change 91 5.1. The USA 91 5.2. The United Kingdom 95 5.3. France 99 Chapter 6. Interceptions 113 6.1. The United States of America 113 6.2. France 126 Chapter 7. Other Methods of Surveillance 135 7.1. Biometrics 135 7.2. Passenger name record 147 7.3. Data and files 151 7.4. New technologies
- geolocation, body scanners, and drones are increasingly used 155 Part 3 Between Security and Freedom 179 Chapter 8. Towards Compromise 181 8.1. Legal measures have been taken in order to protect some fundamental freedoms 181 8.2. European jurisprudence 191 8.3. The monitoring continues to develop in the communications sector 223 Conclusion 241 Bibliography 249 Index 251
「Nielsen BookData」 より