The Privacy-technology Dilemma in the Age of Digital Surveillance

ثبت نشده
چکیده

The proliferation of new technologies and their increasing use in many aspects of our lives pose a number of threats to privacy; digital networks, ubiquitous computing, ambient intelligence, automated profiling, genetics, radio frequency identification (RFID), wiretapping, closed circuit television (CCTV) cameras, digital rights management systems and similar technologies challenge the traditional confines of privacy, and on several occasions, call for its reconceptualization. In a dynamically changing technological framework one must answer the following dilemma: how to benefit from the friendly uses of technology without surrendering the individual's freedom and autonomy. The contributions that are included in the book that follows introduce exactly this dilemma, trying to propose possible solutions and answers, policies or practices that can balance the benefits of technology with the need to protect the right to privacy in an era of surveillance and digital technology. The difficult balance between technology and privacy is a subject that has already drawn the international theoretical attention. Privacy, a relatively new right—at least for many of the European legal Portugal)—has attracted the European theoretical attention over the past three decades exactly due to the rapid rise of technology. Nonetheless, the things are quite different in the other side of the Atlantic, beginning with the American theoretical dialogue on the subject initiated by the famous 'right to be left alone' of S. D. Warren and L. D. Brandeis. In their 'Right to Privacy' published in the Harvard Law Review in 1890, the two authors base the necessity for acknowledging an implicit right to privacy exactly in the rise of technology and the new threats that the press casts for the freedom of the individual. In the exact same way, nowadays the network, the databanks and the technologies of surveillance present new endangerments that call for the protection of privacy. This very idea connects the chapters in this book. Technology does not only present a possible threat to privacy. It also reflects the very contours of privacy, the reason that its protection becomes a legal and social necessity. This is the reason why the expansion of technology also analogically augments the legal acknowledgment of the social appreciation of privacy. This evolution has influenced the rise of the 'public safety' international technological surveillance, the relevant bibliography on the subject of privacy and technology over the past two decades, and especially after The contributions that follow engage to this open dialogue, by offering new theoretical …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Video Privacy in the Age of Automated Surveillance

Automated digital video surveillance has come of age and a new threat to personal privacy is posed. Traditional physical security coupled with information systems has slowly been eroding personal privacy. But the advent of automated video analytics and the latest integrated information systems will truly open Pandora’s Box. The possibility that your employer will know when you arrive at work, w...

متن کامل

Book Review: 'Data Privacy Law: An International Perspective'

We live in interesting times of continuous flux, and this is especially true of data privacy. Indeed the world of privacy is changing, and changing fast: many new initiatives and international agreements on data privacy are being negotiated and the existing international data privacy frameworks, such as the Council of Europe Convention 108, the OECD Guidelines, have recently been revised. Last,...

متن کامل

Automatic Detection and Localization of Surface Cracks in Continuously Cast Hot Steel Slabs Using Digital Image Analysis Techniques

Quality inspection is an indispensable part of modern industrial manufacturing. Steel as a major industry requires constant surveillance and supervision through its various stages of production. Continuous casting is a critical step in the steel manufacturing process in which molten steel is solidified into a semi-finished product called slab. Once the slab is released from the casting unit, th...

متن کامل

The Digital Privacy Paradox: Small Money, Small Costs, Small Talk

This paper uses data from the MIT digital currency experiment to shed light on consumer behavior regarding commercial, public and government surveillance. The setting allows us to explore the apparent contradiction that many cryptocurrencies offer people the chance to escape government surveillance, but do so by making transactions themselves public on a distributed ledger (a ‘blockchain’). We ...

متن کامل

Security, confidentiality, and privacy of information in the field of health with data EPR embedding in medical MRI images based on HVS model

the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014