Catalog Search Results
Author
Description
A thorough introduction to privacy law, covering landmark cases, important themes, historical curiosities, and enduring controversies. Annotation. Glenn (government and political affairs, Millersville U.) examines "the most abstract, most broad, most ill-defined, and what many consider to be the most difficult to grasp of America's freedoms<-->the right to privacy." Coverage includes the significance of the right to privacy and its implications for...
Author
Description
Can the government stick us with privacy we don't want? It can, it does, and according to the author, it may need to do more of it. Privacy is a foundational good, she argues, a necessary tool in the liberty lover's kit for a successful life. A nation committed to personal freedom must be prepared to mandate privacy protections for its people, whether they eagerly embrace them or not. This book draws attention to privacies of seclusion, concealment,...
Author
Description
In this era of computer information and credit cards, Eaton asks us to consider a national ID card. His "debate'' includes the views of both proponents and the opposition. The thought of such a card conjures up images of Orwellian totalitarian states, so opponents such as the ACLU see it as a potential vehicle of repression. Eaton, however, ar gues that there is already plenty of information about us available via banks, credit cards, and so on. He...
Author
Description
"Americans are obliged to "waive" their rights in essentially all applications for employment, credit, housing, public utilities, telephone or mobile phone service, internet access, and even cable TV connection. The law requires "notice and consent" whenever such waivers are included in employment applications, but consumer reporting agencies have learned to use deceptive methods to avoid drawing the attention of applicants to the meaning and consequence...
Description
This is a report about one of the most important and least understood results of the tragedy on September 11th. In a one-hour primetime special, ABC News anchor Peter Jennings examines the government's effort to harness technology in the name of security, and the price we might pay if we fail to balance security and freedom in the digital age.
Author
Description
To what extent is the individual protected from arbitrary and unreasonable intrusions into his personal privacy by the Bill of Rights and the Fourteenth Amendment? The aim of Dr. Beckenridge's study is to answer this question, which is of such crucial relevance in America today. The Right to Privacy is based upon the belief that the individual has the right to determine the degree to which he wishes to share of himself with others and has control...
Description
University of Southern California journalism professor Robert Hernandez incorporated Google Glass into his journalism class curriculum, with plans to build a media platform around wearable technology. "I do believe that our mobile phones are going to be outdated and are going to be replaced with wearables," he says in this discussion about "augmented reality storytelling." While discussing how Google Glass works, Hernandez also addresses privacy concerns...
Description
The first episode of this six-part series, America's Surveillance State, touches briefly on themes each subsequent episode will focus on. Topics include the mechanics of the NSA surveillance program, how and why the Bush-Cheney administration loosened legal restrictions on domestic surveillance, and the industrial-surveillance complex. Also covered are the mainstream media's relationship with the NSA, and how the government is cracking down on investigative...
Author
Description
"This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a stand-alone topic, it's been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is data protection? This book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive...
Description
Futurist Hazel Henderson continues discussing with Professor Jon L. Mills his current book, Privacy in the New Media Age. The conversation focuses on the USA and how the Constitution favors free speech and press in the First Amendment over individual rights to privacy. Mills cites many examples of how individuals are harmed in today's social media, by false statements by bloggers, ubiquitous cameras in public places, tracking individuals' movements...
Author
Description
While other books in the field focus on specific aspects of privacy or how to avoid invasions, David H. Holtzman-a master technologist, internet pioneer, security analyst, and former military codebreaker-presents a comprehensive insider's expose of the world of invasive technology, who's using it, and how our privacy is at risk. Holtzman starts out by categorizing privacy violations into "The 7 Sins Against Privacy" and then goes on to explain in...
Description
The aim of compiling the various essays presented here is to make readily accessible many of the most significant and influential discussions of privacy to be found in the literature. In addition to being representative of the diversity of attitudes toward privacy, this collection has a coherence that results from the authors' focus on the same issues and theories. The main issue addressed in this book is the moral significance of privacy. Some social...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request