Privacy’s Blueprint : : The Battle to Control the Design of New Technologies / / Woodrow Hartzog.
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Cambridge, MA : : Harvard University Press, , [2018] ©2018 |
Year of Publication: | 2018 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (322 p.) :; 20 halftones, 1 chart |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9780674985124 |
---|---|
ctrlnum |
(DE-B1597)501477 (OCoLC)1028732095 |
collection |
bib_alma |
record_format |
marc |
spelling |
Hartzog, Woodrow, author. aut http://id.loc.gov/vocabulary/relators/aut Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Woodrow Hartzog. Cambridge, MA : Harvard University Press, [2018] ©2018 1 online resource (322 p.) : 20 halftones, 1 chart text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Preface -- Introduction: Designing Our Privacy Away -- PART ONE. The Case for Taking Design Seriously in Privacy Law -- Why Design is Everything -- Privacy Law’s Design Gap -- PART TWO. A Design Agenda for Privacy Law -- Privacy Values in Design -- Setting Boundaries for Design -- A Tool Kit for Privacy Design -- PART THEREE. Applying Privacy’s Blueprint -- Social Media -- Hide and Seek Technologies -- The Internet of Things -- Conclusion -- Notes -- Acknowledgments -- Credits -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them. In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021) Data protection Law and legislation United States. Design and technology United States. Privacy, Right of United States. LAW / Privacy. bisacsh Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018 9783110606621 https://doi.org/10.4159/9780674985124 https://www.degruyter.com/isbn/9780674985124 Cover https://www.degruyter.com/cover/covers/9780674985124.jpg |
language |
English |
format |
eBook |
author |
Hartzog, Woodrow, Hartzog, Woodrow, |
spellingShingle |
Hartzog, Woodrow, Hartzog, Woodrow, Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Frontmatter -- Contents -- Preface -- Introduction: Designing Our Privacy Away -- PART ONE. The Case for Taking Design Seriously in Privacy Law -- Why Design is Everything -- Privacy Law’s Design Gap -- PART TWO. A Design Agenda for Privacy Law -- Privacy Values in Design -- Setting Boundaries for Design -- A Tool Kit for Privacy Design -- PART THEREE. Applying Privacy’s Blueprint -- Social Media -- Hide and Seek Technologies -- The Internet of Things -- Conclusion -- Notes -- Acknowledgments -- Credits -- Index |
author_facet |
Hartzog, Woodrow, Hartzog, Woodrow, |
author_variant |
w h wh w h wh |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Hartzog, Woodrow, |
title |
Privacy’s Blueprint : The Battle to Control the Design of New Technologies / |
title_sub |
The Battle to Control the Design of New Technologies / |
title_full |
Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Woodrow Hartzog. |
title_fullStr |
Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Woodrow Hartzog. |
title_full_unstemmed |
Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Woodrow Hartzog. |
title_auth |
Privacy’s Blueprint : The Battle to Control the Design of New Technologies / |
title_alt |
Frontmatter -- Contents -- Preface -- Introduction: Designing Our Privacy Away -- PART ONE. The Case for Taking Design Seriously in Privacy Law -- Why Design is Everything -- Privacy Law’s Design Gap -- PART TWO. A Design Agenda for Privacy Law -- Privacy Values in Design -- Setting Boundaries for Design -- A Tool Kit for Privacy Design -- PART THEREE. Applying Privacy’s Blueprint -- Social Media -- Hide and Seek Technologies -- The Internet of Things -- Conclusion -- Notes -- Acknowledgments -- Credits -- Index |
title_new |
Privacy’s Blueprint : |
title_sort |
privacy’s blueprint : the battle to control the design of new technologies / |
publisher |
Harvard University Press, |
publishDate |
2018 |
physical |
1 online resource (322 p.) : 20 halftones, 1 chart |
contents |
Frontmatter -- Contents -- Preface -- Introduction: Designing Our Privacy Away -- PART ONE. The Case for Taking Design Seriously in Privacy Law -- Why Design is Everything -- Privacy Law’s Design Gap -- PART TWO. A Design Agenda for Privacy Law -- Privacy Values in Design -- Setting Boundaries for Design -- A Tool Kit for Privacy Design -- PART THEREE. Applying Privacy’s Blueprint -- Social Media -- Hide and Seek Technologies -- The Internet of Things -- Conclusion -- Notes -- Acknowledgments -- Credits -- Index |
isbn |
9780674985124 9783110606621 |
callnumber-first |
K - Law |
callnumber-subject |
KF - United States |
callnumber-label |
KF1262 |
callnumber-sort |
KF 41262 H37 42018EB |
geographic_facet |
United States. |
url |
https://doi.org/10.4159/9780674985124 https://www.degruyter.com/isbn/9780674985124 https://www.degruyter.com/cover/covers/9780674985124.jpg |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
340 - Law |
dewey-ones |
342 - Constitutional & administrative law |
dewey-full |
342.7308/58 |
dewey-sort |
3342.7308 258 |
dewey-raw |
342.7308/58 |
dewey-search |
342.7308/58 |
doi_str_mv |
10.4159/9780674985124 |
oclc_num |
1028732095 |
work_keys_str_mv |
AT hartzogwoodrow privacysblueprintthebattletocontrolthedesignofnewtechnologies |
status_str |
n |
ids_txt_mv |
(DE-B1597)501477 (OCoLC)1028732095 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018 |
is_hierarchy_title |
Privacy’s Blueprint : The Battle to Control the Design of New Technologies / |
container_title |
Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018 |
_version_ |
1806143255164747776 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04204nam a22005175i 4500</leader><controlfield tag="001">9780674985124</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210824034702.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210824t20182018mau fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674985124</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/9780674985124</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)501477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1028732095</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KF1262</subfield><subfield code="b">.H37 2018eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW116000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">342.7308/58</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hartzog, Woodrow, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy’s Blueprint :</subfield><subfield code="b">The Battle to Control the Design of New Technologies /</subfield><subfield code="c">Woodrow Hartzog.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA : </subfield><subfield code="b">Harvard University Press, </subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (322 p.) :</subfield><subfield code="b">20 halftones, 1 chart</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Introduction: Designing Our Privacy Away -- </subfield><subfield code="t">PART ONE. The Case for Taking Design Seriously in Privacy Law -- </subfield><subfield code="t">Why Design is Everything -- </subfield><subfield code="t">Privacy Law’s Design Gap -- </subfield><subfield code="t">PART TWO. A Design Agenda for Privacy Law -- </subfield><subfield code="t">Privacy Values in Design -- </subfield><subfield code="t">Setting Boundaries for Design -- </subfield><subfield code="t">A Tool Kit for Privacy Design -- </subfield><subfield code="t">PART THEREE. Applying Privacy’s Blueprint -- </subfield><subfield code="t">Social Media -- </subfield><subfield code="t">Hide and Seek Technologies -- </subfield><subfield code="t">The Internet of Things -- </subfield><subfield code="t">Conclusion -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Credits -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them. In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Design and technology</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Privacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Harvard University Press Complete eBook-Package 2018</subfield><subfield code="z">9783110606621</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4159/9780674985124</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674985124</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9780674985124.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-060662-1 Harvard University Press Complete eBook-Package 2018</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection> |