LEADER 03546oam 2200721I 450 001 9910797688903321 005 20190503073427.0 010 $a9780262331319 010 $a0-262-33132-2 010 $a0-262-33131-4 035 $a(CKB)3710000000473147 035 $a(EBL)4093096 035 $a(SSID)ssj0001552973 035 $a(PQKBManifestationID)16171284 035 $a(PQKBTitleCode)TC0001552973 035 $a(PQKBWorkID)13847506 035 $a(PQKB)11576915 035 $a(StDuBDS)EDZ0001530832 035 $a(MiAaPQ)EBC4093096 035 $a(CaBNVSL)mat07307711 035 $a(IDAMS)0b00006484a9042d 035 $a(IEEE)7307711 035 $a(OCoLC)920881714$z(OCoLC)959272307$z(OCoLC)959590944$z(OCoLC)959950793$z(OCoLC)960443848$z(OCoLC)960929308 035 $a(OCoLC-P)920881714 035 $a(MaCbMITP)9929 035 $a(Au-PeEL)EBL4093096 035 $a(CaPaEBR)ebr11119528 035 $a(CaONFJC)MIL829504 035 $a(OCoLC)920881714 035 $a(EXLCZ)993710000000473147 100 $a20150911h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aObfuscation $ea user's guide for privacy and protest /$fFinn Brunton, Helen Nissenbaum 210 1$aCambridge, Massachusetts ;$aLondon, England :$cThe MIT Press,$d[2015] 210 4$dİ2015 215 $a1 online resource (x, 123 pages) 300 $aDescription based upon print version of record. 311 $a0-262-02973-1 320 $aIncludes bibliographical references and index. 327 $aContents; Acknowledgments; Introduction; I. An Obfuscation Vocabulary; 1 Core Cases; 2 Other Examples; II. Understanding Obfuscation; 3 Why Is Obfuscation Necessary?; 4 Is Obfuscation Justified?; 5 Will Obfuscation Work?; Epilogue; Notes; Bibliography; Index 330 $aWith Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage -- especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it. --Publisher. 606 $aPrivacy, Right of$zUnited States 606 $aInformation technology$xSocial aspects$zUnited States 606 $aInformation policy$zUnited States 610 $aINFORMATION SCIENCE/Internet Studies 610 $aINFORMATION SCIENCE/Technology & Policy 610 $aINFORMATION SCIENCE/Communications & Telecommunications 615 0$aPrivacy, Right of 615 0$aInformation technology$xSocial aspects 615 0$aInformation policy 676 $a323.4/3 700 $aBrunton$b Finn$f1980-$0848393 701 $aNissenbaum$b Helen Fay$0523098 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9910797688903321 996 $aObfuscation$93723457 997 $aUNINA