| 000 | 01904cam a22003258a 4500 | ||
|---|---|---|---|
| 001 | 15790576 | ||
| 003 | OSt | ||
| 005 | 20221109061525.0 | ||
| 008 | 090624s2009 cau b 001 0 eng c | ||
| 010 | _a 2009026320 | ||
| 020 | _a9780804752367 (cloth : alk. paper) | ||
| 020 | _a9780804752374 (pbk. : alk. paper) | ||
| 040 |
_aCSt/DLC _cDLC _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aJC596.2.U5 _bN57 2010 |
| 082 | 0 | 0 |
_a323.480973 NIS _222 |
| 100 | 1 | _aNissenbaum, Helen Fay. | |
| 245 | 1 | 0 |
_aPrivacy in Context : _bTechnology, Policy, and the Integrity of Social Life / _cHelen Nissenbaum. |
| 260 |
_aStanford, Calif. : _bStanford Law Books, _cc2010. |
||
| 300 |
_axiv, 288 p. ; _c24 cm. |
||
| 504 | _aIncludes bibliographical references (p. 257-279) and index. | ||
| 505 | 0 | _aTable of Contents Acknowledgments ix; Introduction 1(20); PART I: Information Technology's Power and Threat; Keeping Track and Watching over Us 21(15); Knowing Us Better than We Know Ourselves: Massive and Deep Databases 36(15); Capacity to Spread and Find Everything, Everywhere 51(16); PART II: Critical Survey of Predominant Approaches to Privacy; Locating the Value in Privacy 67(22); Privacy in Private 89(14); Puzzles, Paradoxes, and Privacy in Public 103(26); PART III: The Framework of Contextual Integrity; Contexts, Informational Norms, Actors, Attributes, and Transmission Principles 129(29); Breaking Rules for Good 158(28); Privacy Rights in Context: Applyin the Framework 186(45); Conclusion 231(14); Notes 245(12); References 257(24); Index 281 | |
| 650 | 0 |
_aPrivacy, Right of _zUnited States. |
|
| 650 | 0 |
_aInformation Technology _xSocial Aspects _zUnited States. |
|
| 650 | 0 |
_aInformation policy _zUnited States. |
|
| 650 | 0 | _aSocial norms. | |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||
| 999 |
_c211523 _d211523 |
||