Protection of Human Identity in the Digital Age

Protection of Human Identity in the Digital Age

By Mirella Atherton

Book

$75.00* RRP

Forthcoming Release, 15/08/2025

Code: 9780455249285

Thomson Reuters, AUSTRALIA

eBook+Book Bundle
Buy the Book + eBook bundle and save $52.50. Learn more about Thomson Reuters ProView.

Available Formats

Format Title Date Code Price
Book Protection of Human Identity in the Digital Age 15/08/2025 9780455249285 $75.00 Pre-order
eBook - ProView Protection of Human Identity in the Digital Age eBook 15/08/2025 9780455249292 $75.00 Pre-order
Book+eBook Best Value Protection of Human Identity in the Digital Age Book + eBook 15/08/2025 43365695 $97.50 Pre-order

Description

An identity can be seen when you search another person’s eyes with your eyes. Perhaps it is looking into someone’s soul and appreciating the totality of their life experiences. However it is described, a person’s identity is linked to the uniqueness that lies deep inside the nuclei of almost every cell in the body, where we store our genes that make up our genomes and ultimately our DNA. This book will start by discussing the human identity, including the theories behind privacy, surveillance and the harmful effects of unwanted intrusion. The book will then progress to the types of personal data that can be collected from human beings including financial information and health information. The book will consider the intrinsic and extrinsic value of individual characteristics and recognisable traits before examining digital footprints and digital profiles.

People in families have similar physical traits and character traits that derive from parents and grandparents, great grandparents and ancestors. Our connections to others related to us and around us are a key part of our individual identity. Those in our community and across the globe are relying on collective good will to protect our individual identities.

Table of Contents

Contents

Protection of the Human Identity in the Digital Age

Preface

About the Author

Contents

INTRODUCTION

PART 1 – HUMAN IDENTITY

Chapter 1 – Theories behind Individual Privacy

1.1        Introduction

1.2        Theories about identity

1.3        Hobbs (1588 – 1679)

1.4        Locke (1632 – 1704)

1.5        Hegel (1770 - 1831)

1.6        Foucault (1926-1984)

1.7        Conclusion  

Chapter 2 – Surveillance

2.1        Introduction

2.2        Global developments in mass surveillance

2.3        Public spaces             

2.4        Exploitation or Empowerment?

2.5        The Modern Panopticon

2.6        Conclusion

Chapter 3 – The harmful effects of unwanted intrusion

3.1        Introduction

3.2        Economic power

3.3        Cyberbullying

3.3        Biometric identification systems

3.4        Cybersecurity

3.5        Conclusion

PART 2 – TYPES OF DATA

Chapter 4 – Sensitive personal information

4.1       Introduction

4.2       Data within the global context

4.3       Wearable skins and devices

4.4       Data mining

4.5       Web scraping, screen scraping and data trawling

4.6       Conclusion

Chapter 5 – Financial information

5.1      Introduction

5.2      Consumer Data Right (CDR)

5.3      Open banking design

5.4      Leaving behind traditional systems

5.5      Financial data security

5.6      The principles of transparency in practice

5.7      Digital currencies

5.8      Conclusion

Chapter 6 – Health information

6.1      Introduction

6.2      Personal information collected in the course of providing a health service

6.3      Sharing of genetic information

6.4      Health data breaches

6.5      Big Data and Blockchain         

6.6      The dark web

6.7      Conclusion

PART 3 – INDIVIDUAL CHARACTERISTICS AND RECOGNISABLE TRAITS

Chapter 7 - Human Recognition

7.1      Introduction

7.2      The human body

7.3      The public and private persona

7.4      Biometrics

7.5      DNA

7.6      Conclusion

PART 4 – DIGITAL FOOTPRINTS AND DIGITAL PROFILES

Chapter 8 – Digital knowledge and understanding

8.1      Introduction

8.2      Website visits, online searches and purchases

8.3      Email communication and digital platform interactions

8.4      Location data

8.5      Cookies

8.6      Espionage

8.6      Conclusion

Chapter 9 - Children’s Privacy

9.1      Introduction

9.2      Children’s Development

9.3      Online behaviour         

9.4      Parental influence

9.5      Commercial value of children’s data

9.6      Networked Toys

9.7      Specific legislation

9.8      Conclusion

Chapter 10 – Conclusions

*
Pre-order: This item will be available on: 15 Aug 2025

Got a Promo Code?

Free standard shipping
on all orders
7-10 business day delivery