Catalog Search Results
Author
Language
English
Formats
Description
"This book traces the history of the right to anonymous speech in America, dating back to the pseudonymous publication of the Federalist Papers and other foundational political writings. It examines how courts have recognized a First Amendment right to anonymity, and how that right has shaped the Internet that we know today"--
Author
Language
English
Description
In defining privacy as "the claim of individuals…to determine for themselves when, how and to what extent information about them is communicated," Alan Westin's 1967 classic Privacy and Freedom laid the philosophical groundwork for the current debates about technology and personal freedom, and is considered a foundational text in the field of privacy law. By arguing that citizens retained control over how their personal data was used, Westin redefined...
Author
Language
English
Formats
Description
In the last decade, technology has grown and changed to the point where many people don't have secrets anymore. It's all out there on the Web. Readers take an in-depth look at privacy online and discover why is it important to maintain their privacy, how to go about that, and what impact the law can have on the decisions they make online today and tomorrow.
Author
Language
English
Description
"In the first week of June 2013, the American people discovered that for a decade, they had abjectly traded their individual privacy for the chimera of national security. The revelation that the federal government has full access to all phone records and the vast trove of presumably private personal data posted on the Internet has brought the threat of a surveillance society to the fore. But the erosion of privacy rights extends far beyond big government....
Author
Language
English
Formats
Description
Technology has had a great influence on the legal system, particularly the right to privacy. This book explains how individual rights are being challenged in cyberspace, through digital media, and the pursuit of national security. Readers are introduced to topics such as what rights the Constitution protects in general and questions how the rules have been tested with regard to technology, such as expectations of privacy online. Digital media are...
Author
Series
Language
English
Formats
Description
Recent revelations of extensive government surveillance programs pit privacy concerns against the need to fight terrorism and crime. Using cases involving real people, this book explores how federal agencies, local law enforcement, and even schools are collecting, using—and perhaps abusing—the personal information they gather online. The book concludes with a discussion of proposed regulations and policies that could strike a better
...Author
Language
English
Formats
Description
Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting...
Author
Language
English
Formats
Description
"April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, explores the most common types of data being collected about individuals today and delve into how it is being used-sometimes against us-by the private sector, the government, and even our employers and schools"--
12) Cybercrime
Author
Series
Accelerated Reader
IL: MG - BL: 5.7 - AR Pts: 1
Language
English
Formats
Description
Computer networks allow people to easily share information. Organizations and entire cities rely on computer networks. Hackers can break into networks to disrupt systems or steal data. Hacking and other cybercrimes are on the rise. Cybercrime explores common cybercrimes and how people can guard against these threats.
Author
Language
English
Formats
Description
The advance of identification technology-biometrics, identity cards, surveillance, databases, dossiers-threatens privacy, civil liberties, and related human interests. Since the terrorist attacks of September 11, 2001, demands for identification in the name of security have increased. In this insightful book, Jim Harper takes readers inside identification-a process everyone uses every day but few people have ever thought about. Using stories and examples...
Author
Language
English
Formats
Description
The Patriot Act, which was passed shortly after the September 11, 2001 terrorist attacks, has allowed the government to monitor communication by phone, email, or social media, to access credit and bank reports, or to track activity on the internet. This book examines the new methods used by the government to spy on citizens, the reasons it became necessary, and the tradeoffs between increased safety and a loss of privacy, and the moral arguments for...
15) Identity theft
Author
Series
Accelerated Reader
IL: MG - BL: 5.7 - AR Pts: 1
Lexile measure
780L
Language
English
Formats
Description
Many people store and share personal information online. This information is part of a person's identity. Identity thieves can find and steal this information. Identity Theft explores how people can protect themselves from identity theft.
Author
Series
Accelerated Reader
IL: MG - BL: 5.6 - AR Pts: 1
Lexile measure
780L
Language
English
Formats
Description
Most people today have cell phones. People rely on cell phones for communication. Cell phones also store a lot of personal data. Cell Phone Privacy explores how people can protect this data.
Author
Series
House report / 104th Congress 1st session volume 104-156
Report / 108th Congress 1st session volume 108-172
Report / 107th Congress 2d session volume 107-371
More Series...
Report / 108th Congress 1st session volume 108-172
Report / 107th Congress 2d session volume 107-371
More Series...
Language
English
Author
Language
English
Formats
Description
Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection, while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Theresa M. Payton and Theodore Claypoole skillfully introduce readers to the many ways we are "watched" and how to change behaviors and activities...
Author
Language
English
Formats
Description
The fascinating history and unnerving future of high-tech aerial surveillance, from its secret military origins to its growing use on American citizens Eyes in the Sky is the authoritative account of how the Pentagon secretly developed a godlike surveillance system for monitoring America's enemies overseas, and how it is now being used to watch us in our own backyards.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request