LEADER 04168nam 2200721 450 001 9910453466603321 005 20200520144314.0 010 $a0-262-26042-5 010 $a0-262-26812-4 010 $a1-4356-7718-8 035 $a(CKB)1000000000539267 035 $a(OCoLC)646764024 035 $a(CaPaEBR)ebrary10251673 035 $a(SSID)ssj0000227577 035 $a(PQKBManifestationID)11198799 035 $a(PQKBTitleCode)TC0000227577 035 $a(PQKBWorkID)10270189 035 $a(PQKB)11482404 035 $a(MiAaPQ)EBC3338938 035 $a(CaBNVSL)mat06267370 035 $a(IDAMS)0b000064818b4374 035 $a(IEEE)6267370 035 $a(OCoLC)273057659$z(OCoLC)646764024$z(OCoLC)961694935$z(OCoLC)962729394$z(OCoLC)966095633$z(OCoLC)991911300$z(OCoLC)991957299$z(OCoLC)1036803849$z(OCoLC)1037531902$z(OCoLC)1037932794$z(OCoLC)1038652519$z(OCoLC)1045478309$z(OCoLC)1055382901$z(OCoLC)1065688226$z(OCoLC)1081207510$z(OCoLC)1083551151 035 $a(OCoLC-P)273057659 035 $a(MaCbMITP)7855 035 $a(PPN)233287051 035 $a(Au-PeEL)EBL3338938 035 $a(CaPaEBR)ebr10251673 035 $a(OCoLC)273057659 035 $a(EXLCZ)991000000000539267 100 $a20151223d2010 uy 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe privacy advocates $eresisting the spread of surveillance /$fColin J. Bennett 210 1$aCambridge, Massachusetts :$cMIT Press,$dc2008. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2010] 215 $a1 online resource (284 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-262-51487-7 311 $a0-262-02638-4 320 $aIncludes bibliographical references and index. 330 $aToday, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement. 606 $aPrivacy, Right of 606 $aHuman rights advocacy 606 $aHuman rights movements 606 $aHuman rights workers 608 $aElectronic books. 615 0$aPrivacy, Right of. 615 0$aHuman rights advocacy. 615 0$aHuman rights movements. 615 0$aHuman rights workers. 676 $a323.44/82 700 $aBennett$b Colin J$g(Colin John),$f1955-$054405 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910453466603321 996 $aThe privacy advocates$92183327 997 $aUNINA