Obfuscation : a user's guide for privacy and protest
書誌情報:Obfuscation : a user's guide for privacy and protest
Finn Brunton, Helen Nissenbaum
Cambridge, Mass. : MIT Press , [2015]
1 online resource (136 p.)
WebCatPlus を見る
CiNii Books を見る


  


所蔵一覧
https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7307711
巻号予約人数所在請求記号登録番号資料ID状態貸出区分備考 
1: electronic bk0オンライン 1A002013  利用可
電子書籍 

選択行を:  

書誌詳細
刊年2015
G/SMDリモートファイル
形態1 online resource (136 p.)
注記Includes bibliographical references and index
Restricted to subscribers or individual electronic text purchasers
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage -- especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies
Also available in print
Mode of access: World Wide Web
Description based on PDF viewed 12/23/2015
URL:https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7307711(Abstract with links to resource)
出版国アメリカ合衆国
標題言語英語
本文言語英語
著者情報Brunton, Finn
Nissenbaum, Helen Fay
ISBN9780262331319(: electronic bk)
無効/取消ISBN9780262029735(: electronic bk)
件名LCSH:Privacy,Rightof
LCSH:Informationtechnology
LCSH:Informationpolicy
NCID7307711
IDENThttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7307711

WebCatPlus を見る    CiNii Books を見る