Show Summary Details

p. 11. Privacy in perillocked

  • Raymond Wacks

Abstract

Electronic and aerial surveillance, biometrics, closed circuit TV (CCTV), identity cards, radio frequency identification (RFID) codes, online security, encryption, the Google ‘right to be forgotten’ controversy, interception of email, the monitoring of employees, DNA, cloning, stem cell research, the ‘war on terror’—to mention only a few—all raise fundamental questions about privacy. Reports of the fragility of ‘privacy’ have, of course, been sounded for at least a century. In respect of the future of ‘privacy‘, there can be little doubt that the questions are changing before our eyes. And if, in the flat-footed domain of atoms, we have achieved only limited success in protecting individuals’ privacy, how much better the prospects in our binary universe? An account of some of the major forms of intrusion is provided, and controls over their use proposed.

Access to the complete content on Very Short Introductions online requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.

Please subscribe or login to access full text content.

If you have purchased a print title that contains an access token, please see the token for information about how to register your code.

For questions on access or troubleshooting, please check our FAQs, and if you can't find the answer there, please contact us.