This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Store » Books » Surveillance and the Law: Language, Power and Privacy
s and the law.jpg

Surveillance and the Law: Language, Power and Privacy

$69.95
Books

Product Details

Published October 9, 2018
Reference - 98 Pages

ISBN 9781138599901 - hardback
 

Surveillance of citizens is a clear manifestation of government power. The act of surveillance is generally deemed acceptable in a democratic society where it is necessary to protect the interests of the nation and where the power is exercised non-arbitrarily and in accordance with the law.

Surveillance and the Law analyses the core features of surveillance that create stark challenges for transparency and accountability by examining the relationship between language, power, and surveillance. It identifies a number of features of surveillance law, surveillance language, and the distribution of power that perpetuate the existing surveillance paradigm. Using case studies from the US, the UK, and Ireland, it assesses the techniques used to maintain the status quo of continued surveillance expansion. These jurisdictions are selected for their similarities, but also for their key constitutional distinctions, which influence how power is distributed and restrained in the different systems. Though the book maintains that the classic principles of transparency and accountability remain the best means available to limit the arbitrary exercise of government power, it evaluates how these principles could be better realised in order to restore power to the people and to maintain an appropriate balance between government intrusion and the right to privacy.

By identifying the common tactics used in the expansion of surveillance around the globe, this book will appeal to students and scholars interested in privacy law, human rights, information technology law, and surveillance studies.

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing