隐私权倡导者:抵制监控的蔓延

Q2 Arts and Humanities Journal of Information Ethics Pub Date : 2011-10-01 DOI:10.5860/choice.46-5880
T. Lipinski
{"title":"隐私权倡导者:抵制监控的蔓延","authors":"T. Lipinski","doi":"10.5860/choice.46-5880","DOIUrl":null,"url":null,"abstract":"The Privacy Advocates: Resisting the Spread of Surveillance Colin J. Bennett. Cambridge, MA: MIT Press, 2008. 259 pp. $28.00The author is no stranger to monographs on the topic of privacy either as solo author or as a co-author (most recently, a review of his Governance of Privacy: Policy Instruments in Global Perspective [2003] [written with Charles D. Raab] appeared in the Spring, 2008 issue of the Journal of Information Ethics [pp. 86-87]). Bennett (and at times with co-authors) has made consistent contributions to the literature on privacy. The latest offering, however, differs from his previous efforts, or others for that matter, in that instead of exploring some aspect of privacy rights, protection, invasion, etc., this book focuses on the \"individuals and groups that have emerged from civil society\" as privacy advocates not \"those within the state or the market\" nor those members of civil society who have self-identified as such advocates (p. iv). True to his training in political science, Bennett is interested in not only the \"who\" but the \"how\": how do these advocates identify problems, strategize, and mobilize responses, etc.? The \"data\" is drawn from observation, a documentary review of various sources, and thirty key informant interviews (the list of those interviewed appears in several places) with actors from North America, Europe, and Australia.The presentation proceeds logically as if it were an extended journal article or dissertation but it was in fact funded by a grant from the Social Sciences and Humanities Research Council of Canada. The first chapter identifies the research problem while subsequent chapters discuss the advocacy groups and the contrasting following chapters cover the actors as individuals. The strategies both groups and actors have developed and case studies or \"key conflicts\" constitute the next two chapters; discussion of how these advocates have formed social networks and whether privacy might in the future become a social movement conclude the seven chapters of the book. A list of the deceptively simple interview questions is included in an appendix. As is typical of the author's work, a detailed bibliography of the relevant literature appears but it also includes, as would be expected given the task at hand, numerous references to popular and news sources that help identify the \"key conflicts\" and advocacy responses as reported in the mass media.The surveillance grid or typology offered in the first chapter is very useful as is the overview that accompanies it; it is concise, to-the-point, yet referential to selected prior work. Bennett recognizes that to some extent he is studying himself here since he admits that he is a privacy advocate, a \"perennial\" scholar. Bennett offers a taxonomy of actor categories: activists, researchers, consultants, technologists, journalists, and artists. The exposition offers a refreshing view of the all-too-familiar strands of privacy problems by providing perspectives drawn from the inventory of the advocates themselves. The discussion of privacy groups is organized into those dedicated to privacy or privacy-centric alone (e. …","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"169"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"89","resultStr":"{\"title\":\"The Privacy Advocates: Resisting the Spread of Surveillance\",\"authors\":\"T. Lipinski\",\"doi\":\"10.5860/choice.46-5880\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Privacy Advocates: Resisting the Spread of Surveillance Colin J. Bennett. Cambridge, MA: MIT Press, 2008. 259 pp. $28.00The author is no stranger to monographs on the topic of privacy either as solo author or as a co-author (most recently, a review of his Governance of Privacy: Policy Instruments in Global Perspective [2003] [written with Charles D. Raab] appeared in the Spring, 2008 issue of the Journal of Information Ethics [pp. 86-87]). Bennett (and at times with co-authors) has made consistent contributions to the literature on privacy. The latest offering, however, differs from his previous efforts, or others for that matter, in that instead of exploring some aspect of privacy rights, protection, invasion, etc., this book focuses on the \\\"individuals and groups that have emerged from civil society\\\" as privacy advocates not \\\"those within the state or the market\\\" nor those members of civil society who have self-identified as such advocates (p. iv). True to his training in political science, Bennett is interested in not only the \\\"who\\\" but the \\\"how\\\": how do these advocates identify problems, strategize, and mobilize responses, etc.? The \\\"data\\\" is drawn from observation, a documentary review of various sources, and thirty key informant interviews (the list of those interviewed appears in several places) with actors from North America, Europe, and Australia.The presentation proceeds logically as if it were an extended journal article or dissertation but it was in fact funded by a grant from the Social Sciences and Humanities Research Council of Canada. The first chapter identifies the research problem while subsequent chapters discuss the advocacy groups and the contrasting following chapters cover the actors as individuals. The strategies both groups and actors have developed and case studies or \\\"key conflicts\\\" constitute the next two chapters; discussion of how these advocates have formed social networks and whether privacy might in the future become a social movement conclude the seven chapters of the book. A list of the deceptively simple interview questions is included in an appendix. As is typical of the author's work, a detailed bibliography of the relevant literature appears but it also includes, as would be expected given the task at hand, numerous references to popular and news sources that help identify the \\\"key conflicts\\\" and advocacy responses as reported in the mass media.The surveillance grid or typology offered in the first chapter is very useful as is the overview that accompanies it; it is concise, to-the-point, yet referential to selected prior work. Bennett recognizes that to some extent he is studying himself here since he admits that he is a privacy advocate, a \\\"perennial\\\" scholar. Bennett offers a taxonomy of actor categories: activists, researchers, consultants, technologists, journalists, and artists. The exposition offers a refreshing view of the all-too-familiar strands of privacy problems by providing perspectives drawn from the inventory of the advocates themselves. The discussion of privacy groups is organized into those dedicated to privacy or privacy-centric alone (e. …\",\"PeriodicalId\":39913,\"journal\":{\"name\":\"Journal of Information Ethics\",\"volume\":\"20 1\",\"pages\":\"169\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"89\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Ethics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5860/choice.46-5880\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Arts and Humanities\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Ethics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5860/choice.46-5880","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Arts and Humanities","Score":null,"Total":0}
引用次数: 89

摘要

隐私权倡导者:抵制监控的蔓延科林·j·贝内特。剑桥,马萨诸塞州:麻省理工学院出版社,2008。作者对隐私主题的专著并不陌生,无论是作为单独作者还是作为合著者(最近的一篇评论他的隐私治理:全球视角下的政策工具[2003][与查尔斯·d·拉布合著]出现在2008年春季的《信息伦理学杂志》[第86-87页])。贝内特(有时和他的合著者)对隐私方面的文献做出了持续的贡献。然而,最新的这本书不同于他之前的著作,也不同于其他著作,因为这本书没有探讨隐私权、保护、侵犯等方面,而是关注“从公民社会中涌现出来的个人和团体”作为隐私权倡导者,而不是“那些在国家或市场内部的人”,也不是那些自认为是隐私权倡导者的公民社会成员(第iv页)。班尼特不仅对“谁”感兴趣,而且对“如何”感兴趣:这些倡导者如何识别问题、制定战略、动员响应等等?这些“数据”来自观察、对各种来源的文献回顾,以及对来自北美、欧洲和澳大利亚的演员的30个关键线人的采访(被采访人的名单出现在几个地方)。这篇演讲的逻辑进行,就好像它是一篇延伸的期刊文章或论文,但实际上它是由加拿大社会科学和人文科学研究委员会资助的。第一章确定了研究问题,而随后的章节讨论了倡导团体,对比之后的章节涵盖了作为个体的行动者。小组和行动者都制定了战略,案例研究或“关键冲突”构成了接下来的两章;关于这些倡导者是如何形成社交网络的,以及隐私在未来是否会成为一种社会运动的讨论结束了这本书的七个章节。一个看似简单的面试问题列表包含在附录中。作为作者的典型作品,出现了相关文献的详细参考书目,但考虑到手头的任务,它也包括大量参考大众和新闻来源,以帮助确定大众媒体报道的“关键冲突”和倡导反应。第一章中提供的监视网格或类型学非常有用,伴随它的概述也非常有用;它是简洁的,切中要害的,但参考了选定的先前的工作。班尼特承认,在某种程度上,他是在研究自己,因为他承认自己是一个隐私倡导者,一个“常年”的学者。班尼特对演员进行了分类:活动家、研究人员、顾问、技术专家、记者和艺术家。通过提供从倡导者自己的清单中得出的观点,该博览会提供了对熟悉的隐私问题的全新看法。隐私组的讨论被组织成专门讨论隐私或仅以隐私为中心的组(e. ...)
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Privacy Advocates: Resisting the Spread of Surveillance
The Privacy Advocates: Resisting the Spread of Surveillance Colin J. Bennett. Cambridge, MA: MIT Press, 2008. 259 pp. $28.00The author is no stranger to monographs on the topic of privacy either as solo author or as a co-author (most recently, a review of his Governance of Privacy: Policy Instruments in Global Perspective [2003] [written with Charles D. Raab] appeared in the Spring, 2008 issue of the Journal of Information Ethics [pp. 86-87]). Bennett (and at times with co-authors) has made consistent contributions to the literature on privacy. The latest offering, however, differs from his previous efforts, or others for that matter, in that instead of exploring some aspect of privacy rights, protection, invasion, etc., this book focuses on the "individuals and groups that have emerged from civil society" as privacy advocates not "those within the state or the market" nor those members of civil society who have self-identified as such advocates (p. iv). True to his training in political science, Bennett is interested in not only the "who" but the "how": how do these advocates identify problems, strategize, and mobilize responses, etc.? The "data" is drawn from observation, a documentary review of various sources, and thirty key informant interviews (the list of those interviewed appears in several places) with actors from North America, Europe, and Australia.The presentation proceeds logically as if it were an extended journal article or dissertation but it was in fact funded by a grant from the Social Sciences and Humanities Research Council of Canada. The first chapter identifies the research problem while subsequent chapters discuss the advocacy groups and the contrasting following chapters cover the actors as individuals. The strategies both groups and actors have developed and case studies or "key conflicts" constitute the next two chapters; discussion of how these advocates have formed social networks and whether privacy might in the future become a social movement conclude the seven chapters of the book. A list of the deceptively simple interview questions is included in an appendix. As is typical of the author's work, a detailed bibliography of the relevant literature appears but it also includes, as would be expected given the task at hand, numerous references to popular and news sources that help identify the "key conflicts" and advocacy responses as reported in the mass media.The surveillance grid or typology offered in the first chapter is very useful as is the overview that accompanies it; it is concise, to-the-point, yet referential to selected prior work. Bennett recognizes that to some extent he is studying himself here since he admits that he is a privacy advocate, a "perennial" scholar. Bennett offers a taxonomy of actor categories: activists, researchers, consultants, technologists, journalists, and artists. The exposition offers a refreshing view of the all-too-familiar strands of privacy problems by providing perspectives drawn from the inventory of the advocates themselves. The discussion of privacy groups is organized into those dedicated to privacy or privacy-centric alone (e. …
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Information Ethics
Journal of Information Ethics Arts and Humanities-Philosophy
自引率
0.00%
发文量
0
期刊最新文献
Diversity Matters: Economic Inequality and Policymaking During a Pandemic A Survival Guide to the Misinformation Age: Scientific Habits of Mind Intellectual Privacy: Rethinking Civil Liberties in the Digital Age Hate Crimes in Cyberspace We Believe the Children: A Moral Panic in the 1980s
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1