| 000 | 05078naaaa2200949uu 4500 | ||
|---|---|---|---|
| 001 | https://directory.doabooks.org/handle/20.500.12854/160486 | ||
| 005 | 20260216164820.0 | ||
| 003 | oapen | ||
| 006 | m o d | ||
| 007 | cr|mn|---annan | ||
| 008 | 20250527s2017 xx |||||o ||| 0|eng d | ||
| 020 | _a9781315619309 | ||
| 020 | _a9781317213543 | ||
| 020 | _a9781317213536 | ||
| 020 | _a9781315619309 | ||
| 020 | _a9781317213529 | ||
| 020 | _a9780367667887 | ||
| 020 | _a9781138649248 | ||
| 040 |
_aoapen _coapen |
||
| 024 | 7 |
_a10.4324/9781315619309 _cdoi |
|
| 041 | 0 | _aeng | |
| 042 | _adc | ||
| 072 | 7 |
_aJW _2bicssc |
|
| 072 | 7 |
_aJPS _2bicssc |
|
| 072 | 7 |
_aJHB _2bicssc |
|
| 072 | 7 |
_aJKV _2bicssc |
|
| 072 | 7 |
_aURH _2bicssc |
|
| 100 | 1 |
_aFriedewald, Michael _4edt |
|
| 700 | 1 |
_aBurgess, J. Peter _4edt |
|
| 700 | 1 |
_aČas, Johann _4edt |
|
| 700 | 1 |
_aBellanova, Rocco _4edt |
|
| 700 | 1 |
_aPeissl, Walter _4edt |
|
| 700 | 1 |
_aFriedewald, Michael _4oth |
|
| 700 | 1 |
_aBurgess, J. Peter _4oth |
|
| 700 | 1 |
_aČas, Johann _4oth |
|
| 700 | 1 |
_aBellanova, Rocco _4oth |
|
| 700 | 1 |
_aPeissl, Walter _4oth |
|
| 245 | 1 | 0 |
_aSurveillance, Privacy and Security _bCitizens’ Perspectives |
| 260 |
_aOxford _bTaylor & Francis _c2017 |
||
| 300 | _a1 electronic resource (310 p.) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 490 | 1 | _aPRIO New Security Studies | |
| 506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
| 520 | _aThis volume examines the relationship between privacy, surveillance and security, and the alleged privacy–security trade-off, focusing on the citizen’s perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen’s perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies, critical security studies, intelligence studies, EU politics and IR in general. A PDF version of this book is available for free in open access via www.tandfebooks.com. It has been made available under a Creative Commons Attribution-Non Commercial 3.0 license. | ||
| 540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by-nc-nd/4.0/ _2cc _4https://creativecommons.org/licenses/by-nc-nd/4.0/ |
||
| 546 | _aEnglish | ||
| 650 | 7 |
_aWarfare and defence _2bicssc |
|
| 650 | 7 |
_aInternational relations _2bicssc |
|
| 650 | 7 |
_aSociology _2bicssc |
|
| 650 | 7 |
_aCrime and criminology _2bicssc |
|
| 650 | 7 |
_aComputer fraud and hacking _2bicssc |
|
| 653 | _aPacket Filtering | ||
| 653 | _aPerceived Privacy Risks | ||
| 653 | _amass surveillance | ||
| 653 | _aHofstede’s National Cultural Dimensions | ||
| 653 | _aprivacy | ||
| 653 | _aHigh Privacy Concern | ||
| 653 | _asecurity | ||
| 653 | _aUncertainty Avoidance | ||
| 653 | _aEd Snowden | ||
| 653 | _aGeneral Data Protection Regulation | ||
| 653 | _acitizens | ||
| 653 | _aData Protection Impact Assessments | ||
| 653 | _aJohann Čas | ||
| 653 | _aRocco Bellanova | ||
| 653 | _aDNA Database | ||
| 653 | _aJ. Peter Burgess | ||
| 653 | _aSurveillance Oriented Security Technologies | ||
| 653 | _aWalter Peissl | ||
| 653 | _aVice Versa | ||
| 653 | _aTijs van den Broek | ||
| 653 | _aCitizen Summits | ||
| 653 | _aMerel Ooms | ||
| 653 | _aPersonal Data Protection | ||
| 653 | _aMarc van Lieshout | ||
| 653 | _aDeep Packet Inspection | ||
| 653 | _aSven Rung | ||
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/102629/1/9781317213543.pdf _70 _zDOAB: download the publication |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/160486 _70 _zDOAB: description of the publication |
| 999 |
_c387 _d387 |
||