Jump to ContentJump to Main Navigation

You are looking at 1-7 of 7 items

  • Keywords: Obfuscation x
Clear All Modify Search

View:

Obfuscation: A User's Guide for Privacy and Protest

Finn Brunton and Helen Nissenbaum

Published in print:
2015
Published Online:
September 2016
ISBN:
9780262029735
eISBN:
9780262331319
Item type:
book
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029735.001.0001
Subject:
Information Science, Information Science

This is a book about obfuscation: the production of noise modeled on an existing signal in order to make a collection of data more ambiguous, confusing, harder to exploit, more difficult to act on, ... More


Core Cases

Finn Brunton and Helen Nissenbaum

in Obfuscation: A User's Guide for Privacy and Protest

Published in print:
2015
Published Online:
September 2016
ISBN:
9780262029735
eISBN:
9780262331319
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029735.003.0002
Subject:
Information Science, Information Science

The authors provide thirteen “core cases” of obfuscation in practice. These cases clarify what obfuscation does in particular scenarios across a variety of technologies and social, legal, and ... More


Other Examples

Finn Brunton and Helen Nissenbaum

in Obfuscation: A User's Guide for Privacy and Protest

Published in print:
2015
Published Online:
September 2016
ISBN:
9780262029735
eISBN:
9780262331319
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029735.003.0003
Subject:
Information Science, Information Science

The authors provide an additional eighteen examples of obfuscation. By contrast with the core cases of I.1, these examples are broader and more varied in their application, including speculative ... More


Why Is Obfuscation Necessary?

Finn Brunton and Helen Nissenbaum

in Obfuscation: A User's Guide for Privacy and Protest

Published in print:
2015
Published Online:
September 2016
ISBN:
9780262029735
eISBN:
9780262331319
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029735.003.0004
Subject:
Information Science, Information Science

This chapter concisely defines obfuscation in terms of data, and information and power asymmetries. What can those whose data is being collected know and do about how data about them is captured, ... More


Is Obfuscation Justified?

Finn Brunton and Helen Nissenbaum

in Obfuscation: A User's Guide for Privacy and Protest

Published in print:
2015
Published Online:
September 2016
ISBN:
9780262029735
eISBN:
9780262331319
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029735.003.0005
Subject:
Information Science, Information Science

This chapter takes up moral and ethical arguments for and against obfuscation. Is obfuscation a form of lying, a waste of resources or a kind of pollution, an act of free riding on the willingness of ... More


Will Obfuscation Work?

Finn Brunton and Helen Nissenbaum

in Obfuscation: A User's Guide for Privacy and Protest

Published in print:
2015
Published Online:
September 2016
ISBN:
9780262029735
eISBN:
9780262331319
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029735.003.0006
Subject:
Information Science, Information Science

This chapter takes up the question of how obfuscation strategies should be designed, measured, assessed, and improved. To answer, it describes different approaches to obfuscation in terms of threats ... More


America Looks Up: Sentimentality, Politics, and American Evangelicalism

Todd M. Brenneman

in Homespun Gospel: The Triumph of Sentimentality in Contemporary American Evangelicalism

Published in print:
2013
Published Online:
January 2014
ISBN:
9780199988983
eISBN:
9780199370009
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199988983.003.0005
Subject:
Religion, Religion and Society

With the rise of a contemporary evangelical presence in politics, evangelicals have turned to emotion to shape that presence. Sentimentality, particularly, has provided the authority to be involved ... More


View: