Catalog Search Results
Author
Formats
Summary
"The essential road map for understanding-and defending-your right to privacy in the twenty-first century. Privacy is disappearing. From our sex lives to our workout routines, the details of our lives once relegated to pen and paper have joined the slipstream of new technology. As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights advocate Danielle Citron has spent decades working with lawmakers...
Summary
Director Elizabeth Banks takes the helm as the next generation of fearless Charlie's Angels take flight. In Banks's bold vision, the Angels are working for the mysterious Charles Townsend, whose security and investigative agency has expanded internationally. With the world's smartest, bravest, and most highly trained women all over the globe, there are now teams of Angels guided by multiple Bosleys taking on the toughest jobs everywhere.
Author
Summary
"The surprising story of the fitful development of the right to privacy--and its battle against the public's right to know--across American history. There is no hotter topic than the desire to constrain tech companies like Facebook from exploiting our personal data, or to keep Alexa from spying on you. Privacy has also provoked constitutional crisis (presidential tax returns) while Justice Clarence Thomas seeks to remove the protection of journalists...
Author
Formats
Summary
Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer...
Author
Summary
Never before has so much been known about so many. CCTV cameras, TSA scanners, NSA databases, big data marketers, predator drones, "stop and frisk" tactics, Facebook algorithms, hidden spyware, and even old-fashioned nosy neighbors-surveillance has become so ubiquitous that we take its presence for granted. While many types of surveillance are pitched as ways to make us safer, almost no one has examined the unintended consequences of living under...
Author
Summary
In defining privacy as "the claim of individuals…to determine for themselves when, how and to what extent information about them is communicated," Alan Westin's 1967 classic Privacy and Freedom laid the philosophical groundwork for the current debates about technology and personal freedom, and is considered a foundational text in the field of privacy law. By arguing that citizens retained control over how their personal data was used, Westin redefined...
Author
Summary
This is a book about what privacy is and why it matters. Governments and companies keep telling us that Privacy is Dead, but they are wrong. Privacy is about more than just whether our information is collected. It's about human and social power in our digital society. And in that society, that's pretty much everything we do, from GPS mapping to texting to voting to treating disease. We need to realize that privacy is up for grabs, and we need to craft...
Author
Summary
"This book looks at the way information and data is collected and used by individuals, governments, companies, and organizations. Arguments for both increased security and increased privacy are offered, encouraging readers to think critically about the issues. Topics relevant to children are included, such as being tracked at school, cyberbullying, and online safety."--
Author
Series
Summary
"This book is an easy-to-read and comprehensive guide to understanding how the Dark Web works and why you should be using it! Readers are led on a tour from how to download the platform for personal or public use, to how it can best be utilized for finding information. This guide busts myths and informs readers, remaining jargon-free"--
Author
Summary
Hailed as a masterwork of reporting and analysis, and based on decades of research within China, We Have Been Harmonized, by award-winning correspondent Kai Strittmatter, offers a groundbreaking look at how the internet and high tech have allowed China to create the largest and most effective surveillance state in history. We Have Been Harmonized is a terrifying portrait of life under unprecedented government surveillance--and a dire warning...
Author
Summary
In a world where full body scans are permitted before someone boards an aircraft, it is no wonder people are concerned with the issue of privacy rights. The issue of privacy has always been a complex one, and the events of September 11, 2001 made it that much more complicated. Privacy rights had to be weighed against the importance of protecting Americans' lives and monitoring terrorist activity. This stirring tome covers the roots of privacy in America,...
14) The bell ringers
Author
Summary
The death of a former British head of intelligence triggers an all-out resistance movement led by the Bell Ringers against an out-of-control, security-obsessed state.
Author
Formats
Summary
"Social networking has grown into a staple of modern society, but its continued evolution is becoming increasingly detrimental to our lives. Shifts in communication and privacy are affecting us more than we realize or understand. Terms of Service crystallizes the current moment in technology and contemplates its implications: the identity-validating pleasures and perils of online visibility; our newly adopted view of daily life through the lens of...
Author
Summary
The advance of identification technology-biometrics, identity cards, surveillance, databases, dossiers-threatens privacy, civil liberties, and related human interests. Since the terrorist attacks of September 11, 2001, demands for identification in the name of security have increased. In this insightful book, Jim Harper takes readers inside identification-a process everyone uses every day but few people have ever thought about. Using stories and examples...
Author
Summary
"April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, explores the most common types of data being collected about individuals today and delve into how it is being used-sometimes against us-by the private sector, the government, and even our employers and schools"--
Author
Summary
We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics,...
Author
Summary
The Internet gives us information, communication options, shopping opportunities, entertainment, and much more---all at the touch of a fingertip and much of it for free. But in exchange for these benefits, we may be losing a basic right: the right to privacy. By clicking to accept website user agreements, we often allow companies to track our activities online and to share our data with outside groups. In addition, the police and government agencies...
Author
Summary
You are under surveillance right now... your cell phone provider tracks your location, your online and in-store purchasing patterns are recorded, Facebook can determine your sexual orientation without you ever mentioning it. Corporations use surveillance to manipulate the prices we're offered; governments use surveillance to discriminate, censor, and put people in danger worldwide. Schneier shows what we can do to reform our government surveillance...