Privacy’s Blueprint : : The Battle to Control the Design of New Technologies / / Woodrow Hartzog.

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018
VerfasserIn:
Place / Publishing House:Cambridge, MA : : Harvard University Press, , [2018]
©2018
Year of Publication:2018
Language:English
Online Access:
Physical Description:1 online resource (322 p.) :; 20 halftones, 1 chart
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9780674985124
ctrlnum (DE-B1597)501477
(OCoLC)1028732095
collection bib_alma
record_format marc
spelling Hartzog, Woodrow, author. aut http://id.loc.gov/vocabulary/relators/aut
Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Woodrow Hartzog.
Cambridge, MA : Harvard University Press, [2018]
©2018
1 online resource (322 p.) : 20 halftones, 1 chart
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Preface -- Introduction: Designing Our Privacy Away -- PART ONE. The Case for Taking Design Seriously in Privacy Law -- Why Design is Everything -- Privacy Law’s Design Gap -- PART TWO. A Design Agenda for Privacy Law -- Privacy Values in Design -- Setting Boundaries for Design -- A Tool Kit for Privacy Design -- PART THEREE. Applying Privacy’s Blueprint -- Social Media -- Hide and Seek Technologies -- The Internet of Things -- Conclusion -- Notes -- Acknowledgments -- Credits -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them. In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021)
Data protection Law and legislation United States.
Design and technology United States.
Privacy, Right of United States.
LAW / Privacy. bisacsh
Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018 9783110606621
https://doi.org/10.4159/9780674985124
https://www.degruyter.com/isbn/9780674985124
Cover https://www.degruyter.com/cover/covers/9780674985124.jpg
language English
format eBook
author Hartzog, Woodrow,
Hartzog, Woodrow,
spellingShingle Hartzog, Woodrow,
Hartzog, Woodrow,
Privacy’s Blueprint : The Battle to Control the Design of New Technologies /
Frontmatter --
Contents --
Preface --
Introduction: Designing Our Privacy Away --
PART ONE. The Case for Taking Design Seriously in Privacy Law --
Why Design is Everything --
Privacy Law’s Design Gap --
PART TWO. A Design Agenda for Privacy Law --
Privacy Values in Design --
Setting Boundaries for Design --
A Tool Kit for Privacy Design --
PART THEREE. Applying Privacy’s Blueprint --
Social Media --
Hide and Seek Technologies --
The Internet of Things --
Conclusion --
Notes --
Acknowledgments --
Credits --
Index
author_facet Hartzog, Woodrow,
Hartzog, Woodrow,
author_variant w h wh
w h wh
author_role VerfasserIn
VerfasserIn
author_sort Hartzog, Woodrow,
title Privacy’s Blueprint : The Battle to Control the Design of New Technologies /
title_sub The Battle to Control the Design of New Technologies /
title_full Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Woodrow Hartzog.
title_fullStr Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Woodrow Hartzog.
title_full_unstemmed Privacy’s Blueprint : The Battle to Control the Design of New Technologies / Woodrow Hartzog.
title_auth Privacy’s Blueprint : The Battle to Control the Design of New Technologies /
title_alt Frontmatter --
Contents --
Preface --
Introduction: Designing Our Privacy Away --
PART ONE. The Case for Taking Design Seriously in Privacy Law --
Why Design is Everything --
Privacy Law’s Design Gap --
PART TWO. A Design Agenda for Privacy Law --
Privacy Values in Design --
Setting Boundaries for Design --
A Tool Kit for Privacy Design --
PART THEREE. Applying Privacy’s Blueprint --
Social Media --
Hide and Seek Technologies --
The Internet of Things --
Conclusion --
Notes --
Acknowledgments --
Credits --
Index
title_new Privacy’s Blueprint :
title_sort privacy’s blueprint : the battle to control the design of new technologies /
publisher Harvard University Press,
publishDate 2018
physical 1 online resource (322 p.) : 20 halftones, 1 chart
contents Frontmatter --
Contents --
Preface --
Introduction: Designing Our Privacy Away --
PART ONE. The Case for Taking Design Seriously in Privacy Law --
Why Design is Everything --
Privacy Law’s Design Gap --
PART TWO. A Design Agenda for Privacy Law --
Privacy Values in Design --
Setting Boundaries for Design --
A Tool Kit for Privacy Design --
PART THEREE. Applying Privacy’s Blueprint --
Social Media --
Hide and Seek Technologies --
The Internet of Things --
Conclusion --
Notes --
Acknowledgments --
Credits --
Index
isbn 9780674985124
9783110606621
callnumber-first K - Law
callnumber-subject KF - United States
callnumber-label KF1262
callnumber-sort KF 41262 H37 42018EB
geographic_facet United States.
url https://doi.org/10.4159/9780674985124
https://www.degruyter.com/isbn/9780674985124
https://www.degruyter.com/cover/covers/9780674985124.jpg
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 340 - Law
dewey-ones 342 - Constitutional & administrative law
dewey-full 342.7308/58
dewey-sort 3342.7308 258
dewey-raw 342.7308/58
dewey-search 342.7308/58
doi_str_mv 10.4159/9780674985124
oclc_num 1028732095
work_keys_str_mv AT hartzogwoodrow privacysblueprintthebattletocontrolthedesignofnewtechnologies
status_str n
ids_txt_mv (DE-B1597)501477
(OCoLC)1028732095
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018
is_hierarchy_title Privacy’s Blueprint : The Battle to Control the Design of New Technologies /
container_title Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018
_version_ 1806143255164747776
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04204nam a22005175i 4500</leader><controlfield tag="001">9780674985124</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210824034702.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210824t20182018mau fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674985124</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/9780674985124</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)501477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1028732095</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KF1262</subfield><subfield code="b">.H37 2018eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW116000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">342.7308/58</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hartzog, Woodrow, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy’s Blueprint :</subfield><subfield code="b">The Battle to Control the Design of New Technologies /</subfield><subfield code="c">Woodrow Hartzog.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA : </subfield><subfield code="b">Harvard University Press, </subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (322 p.) :</subfield><subfield code="b">20 halftones, 1 chart</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Introduction: Designing Our Privacy Away -- </subfield><subfield code="t">PART ONE. The Case for Taking Design Seriously in Privacy Law -- </subfield><subfield code="t">Why Design is Everything -- </subfield><subfield code="t">Privacy Law’s Design Gap -- </subfield><subfield code="t">PART TWO. A Design Agenda for Privacy Law -- </subfield><subfield code="t">Privacy Values in Design -- </subfield><subfield code="t">Setting Boundaries for Design -- </subfield><subfield code="t">A Tool Kit for Privacy Design -- </subfield><subfield code="t">PART THEREE. Applying Privacy’s Blueprint -- </subfield><subfield code="t">Social Media -- </subfield><subfield code="t">Hide and Seek Technologies -- </subfield><subfield code="t">The Internet of Things -- </subfield><subfield code="t">Conclusion -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Credits -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them. In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Design and technology</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Privacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Harvard University Press Complete eBook-Package 2018</subfield><subfield code="z">9783110606621</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4159/9780674985124</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674985124</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9780674985124.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-060662-1 Harvard University Press Complete eBook-Package 2018</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection>