|
|
|
|
| LEADER |
00000nam a22000005i 4500 |
| 001 |
978-3-031-51063-2 |
| 003 |
DE-He213 |
| 005 |
20250807153256.0 |
| 007 |
cr nn 008mamaa |
| 008 |
240527s2024 sz | s |||| 0|eng d |
| 020 |
|
|
|a 9783031510632
|9 978-3-031-51063-2
|
| 024 |
7 |
|
|a 10.1007/978-3-031-51063-2
|2 doi
|
| 050 |
|
4 |
|a HD45
|
| 072 |
|
7 |
|a KJD
|2 bicssc
|
| 072 |
|
7 |
|a BUS041000
|2 bisacsh
|
| 072 |
|
7 |
|a KJD
|2 thema
|
| 082 |
0 |
4 |
|a 658.4062
|2 23
|
| 082 |
0 |
4 |
|a 658.514
|2 23
|
| 245 |
1 |
0 |
|a Human Privacy in Virtual and Physical Worlds
|h [electronic resource] :
|b Multidisciplinary Perspectives /
|c edited by Mary C. Lacity, Lynda Coon.
|
| 250 |
|
|
|a 1st ed. 2024.
|
| 264 |
|
1 |
|a Cham :
|b Springer Nature Switzerland :
|b Imprint: Palgrave Macmillan,
|c 2024.
|
| 300 |
|
|
|a XVII, 274 p. 23 illus., 18 illus. in color.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 341 |
0 |
|
|b Table of contents navigation
|2 onix
|
| 341 |
0 |
|
|b Single logical reading order
|2 onix
|
| 341 |
0 |
|
|b Short alternative textual descriptions
|2 onix
|
| 341 |
0 |
|
|b Use of color is not sole means of conveying information
|2 onix
|
| 341 |
0 |
|
|b Use of high contrast between text and background color
|2 onix
|
| 341 |
0 |
|
|b Next / Previous structural navigation
|2 onix
|
| 341 |
0 |
|
|b All non-decorative content supports reading without sight
|2 onix
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Technology, Work and Globalization,
|x 2730-6631
|
| 505 |
0 |
|
|a Chapter 1. Introduction to Human Privacy in Virtual and Physical Worlds -- Foundations of human privacy:. Chapter 2. Exploring Privacy from a Philosophical Perspective: Conceptual and Normative Dimensions -- Chapter 3. What’s so special about private parts? How anthropology questions the public-private dichotomy -- Technical views of privacy:. Chapter 4. Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measures -- Chapter 5. Data Governance, Privacy, and Ethics -- Chapter 6. Web2 versus Web3 information privacy: an Information Systems discipline perspective -- Chapter 7. Multi-party computation: Privacy in Coopetition -- Chapter 8. Zero Knowledge Proofs and Privacy: A Technical Look at Privacy -- Domain-specific view of privacy. Chapter 9. An Architect’s View of Privacy -- Chapter 10. Healthcare Privacy in an Electronic Data Age -- Chapter 11. Privacy Considerations in Archival Practice and Research -- Chapter 12. Employee and customer information privacy concerns in supply chain management.
|
| 506 |
0 |
|
|a Open Access
|
| 520 |
|
|
|a This open-access book is premised on the belief that understanding and protecting privacy requires a multidisciplinary approach. The editors of this contributed book believe that privacy is a ‘wicked problem’ because of its social complexity. In the modern world, political, social, and technological structures increasingly violate human privacy in physical and virtual spaces. Our behaviors are surveilled, captured, and monetized—often without our knowledge. Contributors are experts from diverse fields, including anthropology, architecture, data science, engineering, history, information systems, library sciences, medicine, philosophy, and supply chain management, each writing for an explicitly interdisciplinary readership. Privacy as a concept is a moving target across the globe, morphing and transforming historically from one epoch to the next. By moving beyond the limitations of a single disciplinary lens, this book aims at a richer, more comprehensive, and more lasting analysis. This collection is of great interest to students and scholars of diverse backgrounds studying human privacy. Mary C. Lacity is David D. Glass Chair and Distinguished Professor of Information Systems in the Sam M. Walton College of Business at the University of Arkansas. She was previously Curators’ Distinguished Professor at the University of Missouri. She has held visiting positions at MIT, the London School of Economics, Washington University, and Oxford University. She is Founding Co-editor of the Palgrave Series on Technology, Work, and Globalization. She has published 32 books on the topics related to technology, work, and globalization, including authoring and co-editing nine books in the series. Lynda Coon is Professor of History and Dean of the Honors College at the University of Arkansas. In 2023, she organized a cross-disciplinary course called Privacy, recruiting professors from architecture, political science, engineering, medicine, business, philosophy, data science, and library sciences to teach the course. Coon’s research focuses on the history of Christianity from circa 300-900. Her first book, Sacred Fictions: Holy Women and Hagiography in Late Antiquity, explored the sacred biographies of holy women in late antiquity. Her second book, Dark Age Bodies: Gender and Monastic Practice in the Early Medieval West, focused on the ritual, spatial, and gendered worlds of monks in the Carolingian period (ca. 750-987).
|
| 532 |
8 |
|
|a Accessibility summary: This PDF does not fully comply with PDF/UA standards, but does feature limited screen reader support, described non-text content (images, graphs), bookmarks for easy navigation and searchable, selectable text. Users of assistive technologies may experience difficulty navigating or interpreting content in this document. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.
|
| 532 |
8 |
|
|a No reading system accessibility options actively disabled
|
| 532 |
8 |
|
|a Publisher contact for further accessibility information: accessibilitysupport@springernature.com
|
| 650 |
|
0 |
|a Technological innovations.
|
| 650 |
|
0 |
|a Data protection.
|
| 650 |
|
0 |
|a Business information services.
|
| 650 |
1 |
4 |
|a Innovation and Technology Management.
|
| 650 |
2 |
4 |
|a Data and Information Security.
|
| 650 |
2 |
4 |
|a Business Information Systems.
|
| 700 |
1 |
|
|a Lacity, Mary C.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Coon, Lynda.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer Nature eBook
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031510625
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031510649
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031510656
|
| 830 |
|
0 |
|a Technology, Work and Globalization,
|x 2730-6631
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-031-51063-2
|
| 912 |
|
|
|a ZDB-2-BUM
|
| 912 |
|
|
|a ZDB-2-SXBM
|
| 912 |
|
|
|a ZDB-2-SOB
|
| 950 |
|
|
|a Business and Management (SpringerNature-41169)
|
| 950 |
|
|
|a Business and Management (R0) (SpringerNature-43719)
|