Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almafu_9960943608902883
    Format: 1 online resource (xxviii, 216 pages) : , digital, PDF file(s).
    ISBN: 1-83998-104-0 , 1-83998-105-9
    Series Statement: Anthem ethics of personal data collection
    Content: This volume's relevance may be explained, first and foremost, during a time of unprecedented loss of life around the world each day. The data, which is oftentimes incomplete and misleading, nonetheless reveals the state as deficient as well as negligent in its response to social healthcare needs. This volume attests to the fact that pressing global public health concerns are ever present as subjects of societal discourse and debate in developed and developing states. Moreover, the COVID-19 pandemic makes the omission of the ethics of personal data collection analysis in the international relations literature even more salient given the rise of contact tracing and increased uses of mobile phone Apps to track citizens by states and firms across the globe, as this volume's chapters analyzing the responses to COVID-19 in Iran and Taiwan explain.
    Note: Title from publisher's bibliographic system (viewed on 09 Dec 2022). , Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Foreword -- Word Clouds -- Introduction: Non-Western versus Western Reflections on the Ethics of Personal Data Collection in a Variegated "Chessboard-Web" Ecosystem -- Questions to Raise in the Literature -- Overview of Chapters -- References -- Part I -- Chapter 1 Information Technology: National Security Savior or Civil Rights Disaster -- Introduction: Information Technology-Tool for State Security or a Civil Rights Concern? -- Technology, Security, and the New Environments They Create -- China's Increasing Surveillance and Its Impacts on the Marginalized -- State of Emergency and the New Normal-State Control -- Corporations' and State's Aligned Interest in Information Technologies -- Misuse of User Data and Its Consequences -- Conclusion: China and the United States-Concurrent or Contrasting Realities? -- References -- Chapter 2 : Is This Chapter "Fake News"?: Exploring the Possibilities of Regulating Online Disinformation While Preserving the Right to Freedom of Expression in Europe -- Introduction -- Jurisdictional Choices -- Fake News-What Is It and Where Do We Stand? -- Freedom of Expression and Fake News -- The Balancing Exercise: Limiting Freedom of Expression under Art. 10(2) ECHR -- "Prescribed by law" -- "Legitimate aim" -- "Necessary in a democratic society" -- Article 17 ECHR's "Abuse of Rights" Doctrine -- "Thinking Outside the Box": Alternative Justifications for Regulation -- The hierarchy of expression: Fake news as commercial speech -- Extending "duties and responsibilities" of journalists -- Conclusion -- References -- Cases -- Chapter 3 Geopolitics, Personal Data Collection, and Globalization: Iran's Response to COVID-19 -- Introduction -- Understanding the COVID-19 Situation in Iran -- The Socioeconomic Context in Iran Pre-COVID-19. , Government Response to the COVID-19 Pandemic -- Government Data Collection on COVID-19 in Iran -- The Use of Personal Data Collection Mechanisms to Monitor the Spread of COVID-19 in Iran -- Proposing Greater Reliance on Personal Data -- Analysis -- Conclusion -- References -- Part II -- Chapter 4 Taiwan's Response to the COVID-19 Pandemic: A Social Constructivist Analysis of Identity Differentiation with the People's Republic of China -- The Taiwan Model -- Identity Formation in the Time of COVID-19 -- Success based on democracy -- International perception -- Superiority -- IV. Unification approaches from China-carrot-and-stick tactics -- Outcomes -- Information Technology and Personal Data Protection: The Paradox in Taiwan -- Democracy and Liberalism: Drivers to Protect Data Security in the West -- The Paradox of Taiwan -- Chinese Collectivism Culture -- Taiwan's Unique International Status, Not Democracy, Helps Propel Its Data Protection Development -- Conclusion -- References -- Chapter 5 Reeducation Camps in Xinjiang, China: An Intersectional Constructivist Approach -- Introduction -- Literature Review -- Data and Methodology -- Journalistic reports and leaked documents -- Firsthand accounts and advocacy from humanitarian organizations -- Satellite imagery analysis -- Analysis and Conclusion -- Conclusion -- References -- Part III -- Chapter 6 Smartphones and Data Privacy Ethics: International Regulations in a "Chessboard-Web" Environment -- Introduction -- Literature Review: The Chessboard Regulatory Scheme -- "Chessboard" privacy regulations, data classifications, and tools for smartphones -- Review of privacy regulations -- Traditional data protection methods: Data classifications: owned, processed, sourced, and linked -- Privacy-based tools supporting current regulations: Informed consent. , Entanglement of the Chessboard and Web-Slaughter's Perspective -- The power of network centrality -- Example 1-Network centrality of data platforms -- Contact tracing for COVID-19: Web versus Chessboard Influence -- Example 2-Web-based ecosystems with eigenvector centrality -- Discussion -- Conclusion -- Conflicts of Interest -- Limitations -- References -- Chapter 7 : Ethical Considerations around Crowdsourcing Stories of Sexual Abuse and Harassment in Public Spaces: The Safecity India Story -- Introduction -- Background to the Creation of the Safecity.in Platform -- Structure the Reporting Platform to Make It Accessible and Engaging -- Practical Change Driven by and for the Community -- Insights into Place as a Critical Unit of Analysis for Bringing the Dark Figure of Gender-Based Violence into Focus -- Ownership of the Data: From the People, for the People -- Police Use of Deadly Force: When the State Wishes Not to Collect Data -- Conclusions -- References -- Chapter 8 Protecting Privacy in a Sexual Assault Prevention Program -- Overview of Military Academies -- The Problem of Sexual Assault on Campus and within Military Units -- Privacy within the Military -- Findings: Testing EAAA at USAFA -- Lessons Learned -- Conclusion -- References -- Conclusion -- References -- Afterword -- Building Forward in Beauty and Balance: A Decade of Action Rooted in Human and Indigenous Rights -- List of Contributors -- Index.
    Additional Edition: ISBN 1-83998-103-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages