Catalog Search Results
Author
Description
"Voyeur Nation traces the evolution and forces driving what the author calls the 'voyeurism value.' Calvert argues that although spectatorship and sensationalism are far from new phenomena, today a confluence of factors - legal, social, political, and technological - pushes mediated voyeurism to the forefront of our image-based world." "The First Amendment increasingly is called on to safeguard our right, via new technologies and recording devices,...
Author
Description
"Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store...
Description
"This anthology focuses on the ethical issues surrounding information control in the broadest sense. Anglo-American institutions of intellectual property protect and restrict access to vast amounts of information. Ideas and expressions captured in music, movies, paintings, processes of manufacture, human genetic information, and the like are protected domestically and globally."--Jacket.
Author
Description
"This is going on your permanent record!" is a threat that has never held more weight than it does in the Internet Age, when information lasts indefinitely. The ability to make good on that threat is as democratized as posting a Tweet or making a blog. Data about us is created, shared, collected, analyzed, and processed at an overwhelming scale. The damage caused can be severe, affecting relationships, employment, academic success, and any number...
7) Code
Author
Description
"Code counters the common belief that cyberspace cannot be controlled or censored. To the contrary, under the influence of commerce, cyberspace is becoming a highly regulable world where behavior will be much more tightly controlled than in real space."--Cover.
Author
Description
Explores the social, legal, and moral implications of various types of employee monitoring, discussing the boundaries of employee privacy, the investigative and surveillance technologies used, how employers try to protect themselves, and what employees can do to ensure their own protection.
Author
Description
"Prominent among the quests for post-9/11 security are developments in surveillance, especially at national borders. These developments are not new, but many of them have been extended and intensified. The result? More and more people and populations are counted as "suspicious" and, at the same time, surveillance techniques become increasingly opaque and secretive. Lyon argues that in the aftermath of 9/11 there have been qualitative changes in the...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request