Information ethics : privacy, property, and power (2005)
0.00
0.0022860633 = product of:
0.008001221 = sum of:
0.0016129497 = product of:
0.0064517986 = sum of:
0.0064517986 = weight(_text_:m in 2392) [ClassicSimilarity], result of:
0.0064517986 = score(doc=2392,freq=4.0), product of:
0.066373095 = queryWeight, product of:
2.4884486 = idf(docFreq=9980, maxDocs=44218)
0.026672479 = queryNorm
0.09720503 = fieldWeight in 2392, product of:
2.0 = tf(freq=4.0), with freq of:
4.0 = termFreq=4.0
2.4884486 = idf(docFreq=9980, maxDocs=44218)
0.01953125 = fieldNorm(doc=2392)
0.25 = coord(1/4)
0.006388272 = product of:
0.012776544 = sum of:
0.012776544 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
0.012776544 = score(doc=2392,freq=4.0), product of:
0.093402475 = queryWeight, product of:
3.5018296 = idf(docFreq=3622, maxDocs=44218)
0.026672479 = queryNorm
0.13679022 = fieldWeight in 2392, product of:
2.0 = tf(freq=4.0), with freq of:
4.0 = termFreq=4.0
3.5018296 = idf(docFreq=3622, maxDocs=44218)
0.01953125 = fieldNorm(doc=2392)
0.5 = coord(1/2)
0.2857143 = coord(2/7)
- Classification
- 323.44/5 22 (GBV;LoC)
- DDC
- 323.44/5 22 (GBV;LoC)
- Footnote
- Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
- Type
- m