Kapitel
Lizenziert
Nicht lizenziert
Erfordert eine Authentifizierung
9. Privacy Rights in Context: Applying the Framework
-
Helen Nissenbaum
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Kapitel in diesem Buch
- Frontmatter i
- Contents vii
- Acknowledgments ix
- Introduction 1
-
PART I: Information Technology’s Power and Threat
- Introduction 19
- 1. Keeping Track and Watching over Us 21
- 2. Knowing Us Better than We Know Ourselves: Massive and Deep Databases 36
- 3. Capacity to Spread and Find Everything, Everywhere 51
-
PART II: Critical Survey of Predominant Approaches to Privacy
- Introduction 65
- 4. Locating the Value in Privacy 67
- 5. Privacy in Private 89
- 6. Puzzles, Paradoxes, and Privacy in Public 103
-
PART III: The Framework of Contextual Integrity
- Introduction 127
- 7. Contexts, Informational Norms, Actors, Attributes, and Transmission Principles 129
- 8. Breaking Rules for Good 158
- 9. Privacy Rights in Context: Applying the Framework 186
- Conclusion 231
- Notes 245
- References 257
- Index 281
Kapitel in diesem Buch
- Frontmatter i
- Contents vii
- Acknowledgments ix
- Introduction 1
-
PART I: Information Technology’s Power and Threat
- Introduction 19
- 1. Keeping Track and Watching over Us 21
- 2. Knowing Us Better than We Know Ourselves: Massive and Deep Databases 36
- 3. Capacity to Spread and Find Everything, Everywhere 51
-
PART II: Critical Survey of Predominant Approaches to Privacy
- Introduction 65
- 4. Locating the Value in Privacy 67
- 5. Privacy in Private 89
- 6. Puzzles, Paradoxes, and Privacy in Public 103
-
PART III: The Framework of Contextual Integrity
- Introduction 127
- 7. Contexts, Informational Norms, Actors, Attributes, and Transmission Principles 129
- 8. Breaking Rules for Good 158
- 9. Privacy Rights in Context: Applying the Framework 186
- Conclusion 231
- Notes 245
- References 257
- Index 281