the library of essays on law and privacy. 3 vols. solicitation, cyber-bullying or happy slapping...

3
KS4093 / February 2015 ご注文承り中!! 【人権(個人の尊重・幸福追求権)、憲法、情報法、社会科学】 より一層複雑化するプライバシーの問題を考える際の重要なレファレンス 法とプライバシー論文叢書 全3巻 The Library of Essays on Law and Privacy. 3 vols. Leith, Philip (ed.), The Library of Essays on Law and Privacy. 3 vols. 1500 pp. 2015:4 (Ashgate, UK) <621-916> ISBN 978-1-4094-4718-4 hard set 現在、プライバシーは法のみならず、コンピューティング、心理学、 経済学、社会研究でも主要なトピックとなり、その学問的知識が急激に 蓄積されたことによって、多くのディシプリンにわたる重大な問題はか えって捉えづらくなりました。本叢書は、そうした複雑な問題群の中か ら重要なものを取り出し、その知識を理解できるようにするためのアプ ローチを提供する論文集です。 本叢書は、第 1 巻「個人とプライバシー」、第 2 巻「情報社会における プライバシー」、第 3 巻「安全保障とプライバシー」から構成され、次の ようなテーマのもとに編集されています。一つは、プライバシーが文化 的な文脈において何を意味するのかに対する人類学的アプローチ。一つ は、国家が個人を守らなければならない場合、他者を個人から守らなければならない場合、国 家そのものを守らなければならない場合における国家監視の問題。いま一つは、統治や商業に よって絶え間なくデータが集積される世界においてプライバシーが何を意味するのか。 プライバシーの規制は、いつでも求められる問題で、本叢書の論稿は、プライバシーの規制 にあたってなされた選択の背後にある倫理的な論拠を理解するのに役立ちます。より一層複雑 化するプライバシーの問題を考える際の重要なレファレンスとして、憲法、人権、情報法の研 究者はもちろん、プライバシーに関心を持つ社会科学研究者に本叢書を広くお薦めいたします。 〔本叢書は分売も可能です。〕 《収録論文明細》 第 1 巻:個人とプライバシー Vol. 1: Cannataci, Joseph A. (ed.), The Individual and Privacy. 542 pp. 2015:3 <621-917> ISBN 978-1-4094-4717-7 hard Contents: Introduction. Part I The Time Dimension: Perspectives from History and Anthropology through Philosophy to Religion and Technology Law: Privacy in eighteenth-century Aleppo: the limits of cultural ideals, Abraham Marcus; An introduction to Stanner’s concept of privacy, John Hilary Martin, and Privacy and the Aboriginal people, W.E.H. Stanner; Privacy: an intercultural perspective, Rafael Capurro; Japanese conceptions of privacy: an intercultural perspective, Makoto Nakada and Takanori Tamura; Privacy, technology law and religions across cultures, Joseph A. Cannataci. Part II The Space Dimensions in Privacy Perspectives and Methodologies: from Early Days in Sociology through

Upload: dangdung

Post on 19-May-2018

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: The Library of Essays on Law and Privacy. 3 vols. solicitation, cyber-bullying or happy slapping videos, Bruce L. Mann. Part VII Health Care: Impact of news of celebrity illness on

KS-4093 / February 2015 ご注文承り中!!

【人権(個人の尊重・幸福追求権)、憲法、情報法、社会科学】

● より一層複雑化するプライバシーの問題を考える際の重要なレファレンス

法とプライバシー論文叢書 全 3 巻 The Library of Essays on Law and Privacy. 3 vols.

Leith, Philip (ed.), The Library of Essays on Law and Privacy. 3 vols. 1500 pp. 2015:4 (Ashgate, UK)

<621-916> ISBN 978-1-4094-4718-4 hard set

現在、プライバシーは法のみならず、コンピューティング、心理学、

経済学、社会研究でも主要なトピックとなり、その学問的知識が急激に

蓄積されたことによって、多くのディシプリンにわたる重大な問題はか

えって捉えづらくなりました。本叢書は、そうした複雑な問題群の中か

ら重要なものを取り出し、その知識を理解できるようにするためのアプ

ローチを提供する論文集です。 本叢書は、第 1 巻「個人とプライバシー」、第 2 巻「情報社会における

プライバシー」、第 3 巻「安全保障とプライバシー」から構成され、次の

ようなテーマのもとに編集されています。一つは、プライバシーが文化

的な文脈において何を意味するのかに対する人類学的アプローチ。一つ

は、国家が個人を守らなければならない場合、他者を個人から守らなければならない場合、国

家そのものを守らなければならない場合における国家監視の問題。いま一つは、統治や商業に

よって絶え間なくデータが集積される世界においてプライバシーが何を意味するのか。 プライバシーの規制は、いつでも求められる問題で、本叢書の論稿は、プライバシーの規制

にあたってなされた選択の背後にある倫理的な論拠を理解するのに役立ちます。より一層複雑

化するプライバシーの問題を考える際の重要なレファレンスとして、憲法、人権、情報法の研

究者はもちろん、プライバシーに関心を持つ社会科学研究者に本叢書を広くお薦めいたします。

〔本叢書は分売も可能です。〕 《収録論文明細》

第 1巻:個人とプライバシー

Vol. 1: Cannataci, Joseph A. (ed.), The Individual and Privacy. 542 pp. 2015:3 <621-917> ISBN 978-1-4094-4717-7 hard Contents: Introduction. Part I The Time Dimension: Perspectives from History and Anthropology through Philosophy to Religion and Technology Law: Privacy in eighteenth-century Aleppo: the limits of cultural ideals, Abraham Marcus; An introduction to Stanner’s concept of privacy, John Hilary Martin, and Privacy and the Aboriginal people, W.E.H. Stanner; Privacy: an intercultural perspective, Rafael Capurro; Japanese conceptions of privacy: an intercultural perspective, Makoto Nakada and Takanori Tamura; Privacy, technology law and religions across cultures, Joseph A. Cannataci. Part II The Space Dimensions in Privacy Perspectives and Methodologies: from Early Days in Sociology through

Page 2: The Library of Essays on Law and Privacy. 3 vols. solicitation, cyber-bullying or happy slapping videos, Bruce L. Mann. Part VII Health Care: Impact of news of celebrity illness on

(株)極東書店 2 KS-4093 / 法とプライバシー論文叢書

Social Psychology to the Socio-Legal Approach and the Cognitive Sciences in the Twenty-First Cen-tury: The sociology of secrecy and of secret societies, Georg Simmel; The social psychology of pri-vacy, Barry Schwartz; Interpersonal relationships and personal space: research review and theoretical model, Eric Sundstrom and Irwin Altman; Privacy regulation: culturally universal or culturally specific?, Irwin Altman; The socio-legal context of privacy, Philip Leith; Guide to measuring privacy concern: re-view of survey and observational instruments, Sören Preibusch; Theoretical and practical considera-tions for online privacy research: CONSENT as a case-study, Noellie Brockdorff, Liberato Camilleri, Marco Montalto, Albert Caruana, Saviour Chircop and Jeanne Pia Mifsud Bonnici. Part III The Cul-tural Dimension: Conceptualizations of Privacy and Personality around the World: The dao of privacy, Lara A. Ballard; Conceptualizing privacy, Daniel J. Solove; ‘I’ve got nothing to hide’ and other misun-derstandings of privacy, Daniel J. Solove; Lex personalitatis & technology-driven law, Joseph A. Cannataci; Data protection in Germany I: the population census decision and the right to informational self-determination, Gerrit Hornung and Christoph Schnabel; Data protection in Germany II: recent decisions on online-searching of computers, automatic number plate recognition and data retention, Gerrit Hornung and Christoph Schnabel; Protecting the right to privacy in China, Cao Jingchun; Pri-vacy and developing countries, Gus Hosein. Name Index.

第 2巻:情報社会におけるプライバシー

Vol. 2: Leith, Philip (ed.), Privacy in the Information Society. 580 pp. 2015:3 <621-918> ISBN 978-1-4094-4128-1 hard Contents: Introduction. Part I Privacy Generally: An examination of the concern for information privacy in the New Zealand regulatory context, Ellen A. Rose; Property rights in personal information: an economic defense of privacy, Richard S. Murphy; Privacy and security concerns as major barriers for e-commerce: a survey study, Godwin J. Udo; Privacy by design - principles of privacy-aware ubiquitous systems, Marc Langheinrich; The problem of anonymous vanity searches, Christopher Soghoian. Part II Data Protection and Commerce: EU data protection policy. The privacy fallacy: ad-verse effects of Europe’s data protection policy in an information-driven economy, Lucas Bergkamp; Information technology, marketing practice, and consumer privacy: ethical issues, Ellen R. Foxman and Paula Kilcoyne; Consent in data protection law: privacy, fair processing and confidentiality, Roger Brownsword; The Data Protection Directive 95/46/EC: idealisms and realisms, Rebecca Wong; Be-havioral advertising: the cryptic hunter and gatherer of the internet, Joanna Penn; Privacy and confi-dentiality in an e-commerce world: data mining, data warehousing, matching and disclosure limitation, Stephen E. Fienberg; Safe harbor - a framework that works, Damon Greer; The ‘final’ privacy frontier? Regulating trans-border data flows, Gehan Gunasekara; To track or not to track: recent legislative proposals to protect consumer privacy, Molly Jennings. Part III Biometrics: Biometrics: privacy's foe or privacy's friend?, John D. Woodward; Privacy issues in the application of biometrics: a European perspective, Marek Rejman-Greene; Biometrics and privacy: a note on the politics of theorizing technology, Irma van der Ploeg; Biometric technologies in support of identity and privacy assurance, Colin Soutar; Privacy law: biometrics and privacy, Jan Grijpink. Part IV The Cloud: Security and pri-vacy implications of cloud computing - lost in the cloud, Vassilka Tchifilionova; Privacy and consumer risks in cloud computing, Dan Svantesson and Roger Clarke; Digital evidence in cloud computing systems, M. Taylor, J. Haggerty, D. Gresty and R. Hegarty; Caught in the clouds: the web 2.0, cloud computing, and privacy?, Paul Lanois. Part V Geo-Location: Re-mapping privacy law: how the Google Maps scandal requires tort law reform, Lindsey A. Strachan; E‐commerce tax: how the tax-man brought geography to the ‘borderless’ internet, Dan Jerker B. Svantesson; Tweets from Justin Bieber's heart: the dynamics of the ‘location’ field in user profiles, Brent Hecht, Lichan Hong, Bongwon Suh and Ed H. Chi. Part VI Social Networks: Teens, privacy and online social networks: how teens manage their online identities and personal information in the age of MySpace, Amanda Lenhart and Mary Madden; Publicly private and privately public: social networking on YouTube, Patricia G. Lange; Employer’s use of social networking sites: a socially irresponsible practice, Leigh A. Clark and Sherry J. Roberts; Social networking websites - a concatenation of impersonation, denigration, sexual ag-gressive solicitation, cyber-bullying or happy slapping videos, Bruce L. Mann. Part VII Health Care: Impact of news of celebrity illness on breast cancer screening: Kylie Minogue's breast cancer diag-

Page 3: The Library of Essays on Law and Privacy. 3 vols. solicitation, cyber-bullying or happy slapping videos, Bruce L. Mann. Part VII Health Care: Impact of news of celebrity illness on

(株)極東書店 3 KS-4093 / 法とプライバシー論文叢書

nosis, Simon Chapman, Kim McLeod, Melanie Wakefield and Simon Holding; Privacy, information technology, and health care, Thomas C. Rindfleisch; ‘Iceland Inc.’?: On the ethics of commercial population genomics, Jon F. Merz, Glenn E. McGee and Pamela Sankar; Geocoding in cancer re-search: a review, Gerard Rushton, Marc P. Armstrong, Josephine Gittler, Barry R. Greene, Claire E. Pavlik, Michele M. West and Dale L. Zimmerman. Name index.

第 3巻:安全保障とプライバシー

Vol. 3: Savirimuthu, Joseph (ed.), Security and Privacy. 540 pp. 2015:3 <621-919> ISBN 978-1-4094-4487-9 hard Contents: Introduction. Part I Identity, Security and Privacy in Context: Designing for trust, L. Jean Camp; The digital persona and its application to data surveillance, Roger Clarke; Privacy, visibility, transparency, and exposure, Julie E. Cohen; Exploring identity and identification in cyberspace, Oscar H. Gandy, Jr; A contextual approach to privacy online, Helen Nissenbaum. Part II Surveillance, Secu-rity and Anonymity: Hacking the Panopticon: distributed online surveillance and resistance, Benoît Dupont; The surveillant assemblage, Kevin D. Haggerty and Richard V. Ericson; 'Sousveillance': in-verse surveillance in multimedia imaging, Steve Mann; Surveillance as cultural practice, Torin Mo-nahan; Surveillance and security: a dodgy relationship, Walter Peissl; Counter-surveillance as political intervention?, Torin Monahan; Resistance against cyber-surveillance within social movements and how surveillance adapts, Oliver Leistert; Privacy, surveillance, and law, Richard A. Posner; Squaring the circle of smart surveillance and privacy, Joseph A. Cannataci. Part III Privacy, Data Protection and Security: Data protection pursuant to the right to privacy in human rights treaties, Lee A. Bygrave; Consumer culture and the commodification of policing and security, Ian Loader; Information technol-ogy and dataveillance, Roger A. Clarke; Public assessment of new surveillance-oriented security technologies: beyond the trade-off between privacy and security, Vincenzo Pavone and Sara Degli Esposti; European protectionism in cloud computing: addressing concerns over the PATRIOT Act, John T. Billings; Internet intermediaries, cloud computing and geospatial data: how competition and privacy converge in the mobile environment, Lisa Madelon Campbell; Stolen identities, Jennifer Whitson and Kevin D. Haggerty. Part IV Smart Technologies, Social Control and Human Rights: The body as data? Biobank regulation via the ‘back door’ of data protection law, Lee A. Bygrave; CCTV policy in the UK: reconsidering the evidence base, William Webster; Camera surveillance within the UK: enhancing public safety or a social threat?, Barrie Sheldon; Privacy and data protection at the time of facial recognition: towards a new right to digital identity?, Shara Monteleone; The deciders: the future of privacy and free speech in the age of Facebook and Google, Jeffrey Rosen; Affordance, conventions, and design, Donald A. Norman; eHealth: roadmap to finding a successful cure for pri-vacy issues, Deborah C. Peel; There's no app for that: protecting users from mobile service providers and developers of location-based applications, Daniel L. Pieringer; The Privacy Bill of Rights: what are the expectations for 2013?, Christopher Wolf. Name index.