Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Privacy-invading technologies and privacy by design : safeguarding privacy, liberty and security in the 21st century
Klitou D., T.M.C. Asser Press, The Hague, The Netherlands, 2014. 338 pp. Type: Book (978-9-462650-25-1)
Date Reviewed: Jun 24 2015

One of the most relevant shortcomings associated with the wide use of some technologies is the dubious protection of privacy. In Klitou’s book, the reader will find an interesting, well-written study on the privacy problems raised by the use of technology.

Specifically, the author elaborates on privacy-invading technologies and concentrates on four case studies, namely body scanners, public space closed-circuit television (CCTV) microphones, public space CCTV loudspeakers, and human-implantable microchips. The core of the book discusses how quickly technology evolves and threatens privacy, and how regulations and legal frameworks cannot move at the same pace, which opens the door for privacy rights violation.

The author concentrates on the legal view of the US and the UK and states that current regulations (for example, the US Privacy Act and the European Data Protection Directive) focus on the user of privacy-invading technologies (PITs) instead of paying attention to manufacturers and developers, and he advocates for the model of privacy by design, which is a completely opposite approach that concentrates on manufacturers and developers instead of end users.

The book has an introductory chapter plus nine chapters organized in four parts. The structure, goals, and a brief overview of each chapter are given in chapter 1. Next, Part 1 (“Principles of Privacy”) comprises chapters 2 and 3, which are devoted to stating some definitions about privacy, liberty, and security and to analyzing the adequacy of the current privacy legal framework. Part 2 (“Technological Threats to Privacy”) comprises chapters 4 to 8 and elaborates on PITs and describes and analyzes four case studies. Chapter 5 deals with body scanners; chapter 6 analyzes public space CCTV microphones and loudspeakers; chapter 7 focuses on human-implantable microchips, for example radio-frequency identification (RFID) and global positioning systems (GPS); and chapter 8 summarizes the discussions of Part 2. Part 3 (“New Approach to Protecting Privacy”) comprises a single chapter (that is, chapter 9), which is completely devoted to describing the concept of privacy by design and its benefits. The book ends with Part 4 (“Research Results”) that summarizes the main conclusions of the book in chapter 10.

I was expecting much technical/engineering content about data privacy like [1] and [2], which is not actually present in the book. It was published within the “Information Technology and Law” series, which is not technical but mostly legal. The book could be interesting to a wide audience, from lawyers and regulators to developers and engineers.

Reviewer:  Agusti Solanas Review #: CR143554 (1509-0777)
1) Navarro-Arribas, G.; Torra, V. Advanced research in data privacy. Springer, New York, NY, 2015.
2) Solanas, A.; Martínez-Ballesté, A. Advances in artificial intelligence for privacy protection and security. World Scientific, Singapore, 2010, http://www.worldscientific.com/worldscibooks/10.1142/6707.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Privacy (K.4.1 ... )
 
 
Organizational Impacts (K.4.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Privacy": Date
Handbook of personal data protection
Madsen W., Stockton Press, New York, NY, 1992. Type: Book (9780333569207)
Nov 1 1993
Privacy and security issues in information systems
Turn R., Ware W., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
Data bases
Burnham D., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy