{"id":699,"date":"2007-03-03T10:25:59","date_gmt":"2007-03-03T18:25:59","guid":{"rendered":"\/?p=699"},"modified":"2007-03-03T15:03:34","modified_gmt":"2007-03-03T23:03:34","slug":"new-book-on-cybercrime","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=699","title":{"rendered":"New book on Cybercrime"},"content":{"rendered":"<p>Speaking of <em><a href=\"\/?p=698\">new ways for a vendor to win my loyalty<\/a><\/em><strong>,<\/strong> here&#39;s an email I got today:<\/p>\n<p style=\"margin-left: 30px\">Dear Amazon.com Customer,<\/p>\n<p style=\"margin-left: 30px\">We&#39;ve noticed that customers who have expressed interest in The Digital Person: Technology And Privacy In The Information Age by Daniel J. Solove have also ordered Cybercrime: Digital Cops in a Networked Environment (Ex Machina: Law, Technology, and Society) by J. M. Balkin. For this reason, you might like to know that J. M. Balkin&#39;s Cybercrime: Digital Cops in a Networked Environment (Ex Machina: Law, Technology, and Society) is now available.&nbsp;<\/p>\n<p style=\"margin-left: 30px\">You can order your copy for just $22.00 by following the link below.<\/p>\n<div style=\"margin-left: 30px\"><a href=\"http:\/\/www.amazon.com\/gp\/product\/0814799833\/ref=pe_pe_5050_4942960_pe_snp_833\"><img hspace=\"10\" src=\"\/wp-content\/images\/2007\/03\/cybercrime.jpg\" align=\"left\" \/><strong>Cybercrime: Digital Cops in a Networked Environment (Ex Machina: Law, Technology, and Society)<\/strong><br \/>\n<\/a>&nbsp;&nbsp;<\/p>\n<p>J. M. Balkin<\/p>\n<p>Price: $22.00<\/p>\n<p style=\"clear: all\"><strong>Book Description<\/strong><\/p>\n<ul>\n<li>&#8220;Cybercrime is written by the leading academic experts and government officials who team together to present a state-of-the-art vision for how to detect and prevent digital crime, creating the blueprint for how to police the dangerous back alleys of the global Internet.&#8221;<br \/>\n<blockquote><p>&#8212; Peter P. Swire, C. William O&#39;Neill Professor of Law, the Ohio State University, and former Chief Counselor for Privacy, U.S. Office of Management &#038; Budget.)<\/p><\/blockquote>\n<\/li>\n<li>&#8220;A timely and important collection of materials from highly qualified authors. Cybercrime will provide a wealth of new insights both for general readers and for those who study and teach about the legal and policy implications of the internet.&#8221;<br \/>\n<blockquote><p>&#8211;David Johnson, Visiting &#8230; <a href=\"http:\/\/www.amazon.com\/gp\/r.html?R=46SXW89U5TS6&amp;C=2NB02DPAFU3BA&amp;T=C&amp;U=%2Fgp%2Fproduct%2F0814799833%2Fref%3Dpe%5F5050%5F4942960%5Fpe%5Fsnp%5F833&amp;H=rp1Ck3VTEsIUMWR3oPK1zAMhRw4A\" class=\"broken_link\">Read more<\/a>)<\/p><\/blockquote>\n<\/li>\n<\/ul>\n<\/div>\n<p>I actually received this in my mail this morning.&nbsp; I remember when I got my first email from Amazon, I started fuming.&nbsp; My reaction was, &#8220;No!&nbsp; This can&#39;t be! Not SPAM from Amazon!&#8221;.&nbsp; It seemed incredible.<\/p>\n<p>Then I read the message.&nbsp; And guess what.&nbsp;&nbsp;It wasn&#39;t&nbsp;SPAM.&nbsp; Why?&nbsp; By&nbsp;intersecting&nbsp;its knowledge of&nbsp;my interests with that of other people who share them,&nbsp;Amazon is able to make book suggestions that are&nbsp;just as cogent as&nbsp;most&nbsp;people I know.&nbsp;&nbsp;This is&nbsp;what I call a <strong>relationship<\/strong>.&nbsp; It isn&#39;t based on confinement or bombardment.&nbsp; It&#39;s based on service.&nbsp; The service is <strong>user-centric <\/strong>in a great way.<\/p>\n<p>Now, moving down a level of abstraction, I think I&#39;ll buy the book.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amazon knew we would be interested&#8230;  That&#39;s what I call a relationship.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,3,5],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/699"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=699"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/699\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}