Results 1 to 10 of 231 | next »
- Privacy, personal data and the law / by National Association of Attorneys General.Committee on the Office of Attorney General.(CARDINAL)138594; Morrow, Calvin M.(CARDINAL)144825;
Includes bibliographical references.
- Subjects: Privacy, Right of; Public records;
- Available copies: 1 / Total copies: 1
-
unAPI
- Privacy, data harvesting, and you / by Freedman, Jeri,author.(CARDINAL)761177;
Includes bibliographical references and index.Harvesting data -- The right to privacy -- Online consumer nation -- The power of persuasion -- Protecting your data."One of the most widespread online practices today is data harvesting, the collection of users, personal data and information about their activities. Data harvesting raises significant issues about the right to privacy. This informative narrative explains what data harvesting and data mining are and how they are carried out. The importance of privacy is covered, as well as two of the most common applications of data harvesting and data mining: the selling of products and services, and the influencing of people's attitudes toward political issues. Teens learn ways that they can safeguard their data to protect their privacy."--Publisher's description.
- Subjects: Data mining; Internet; Privacy, Right of;
- Available copies: 1 / Total copies: 1
-
unAPI
- Big data and privacy rights / by Eboch, M. M.,author.(CARDINAL)492807; Shackelford, Scott J.,consultant.(CARDINAL)401682;
Includes bibliographical references (pages 104-109) and index.Spies on the Internet -- Data growth through history -- Watching customer shop -- Staying healthy -- Staying in touch with social media -- Keeping the public safe -- For the public good? -- Personal protections -- Future trends -- Essential facts.The flow of information through our modern digital world has led to many new issues and controversies. Big Data and Privacy Rights examines how companies, governments, and individuals collect and use massive amounts of personal information, highlighting the privacy concerns that result when these activities are done without public knowledge.1200L
- Subjects: Young adult literature.; Young adult literature.; Privacy, Right of; Data protection; Privacy, Right of.; Data protection.;
- Available copies: 2 / Total copies: 2
-
unAPI
- Code 6 [audio-enabled device] by Grippando, James,1958-author(CARDINAL)351204; Lakin, Christine,1979-narrator(CARDINAL)787884; Findaway World, LLC(CARDINAL)345268; Harper Audio (Firm)(CARDINAL)539013; Playaway Digital Audio(CARDINAL)565887;
Read by Christine LakinAspiring playwright, Kate Gamble, is struggling to launch a script she's been secretly researching her entire life, mostly at the family dinner table. Her father is Christian Gamble, CEO of Buck Technologies, a private data integration company whose clients include the CIA and virtually every counter-terrorism organization in the Western World. Kate's father adores her, and a play about the dark side of Big Data would be the ultimate betrayal in his eyes. But Kate is compelled to tell this story, not only as an artist exploring the personal information catastrophe that affects us all, but as a daughter trying to understand her mother's apparent loss of purpose, made even more disturbing by the suicide note she left behind: I did it for Kate. Then Patrick Battle comes back into her life, changing everything she has ever thought about her play, her father, and her mother's tragic death. Patrick is a childhood friend, but he is now Buck's golden boy with security clearance to the company's most sensitive projects. When Buck comes under investigation by the Justice Department and Patrick suddenly goes missing, Kate doesn't know who to trust. A phone call confirms her worst nightmare: Patrick has been kidnapped, and the ransom demand is "Code 6," the most secret and potentially dangerous technology her father's company has ever developed. Kate's fight to bring Patrick home safely reveals a conspiracy and cover up that may implicate one of the most powerful executives in the tech industry, while the development of Kate's play unleashes family secrets and the demons behind her mother's cryptic final note. The two paths converge in explosive fashion, leading to a shocking and terrifying discovery that puts Kate and Patrick in the crosshairs of forces who will stop at nothing to control Code 6.One set of earphones and one AAA battery required for listening
- Subjects: Audiobooks.; Fiction.; Thrillers (Fiction).; Data privacy; Mothers; Technology;
- Available copies: 3 / Total copies: 3
-
unAPI
- Privacy in the age of big data : recognizing threats, defending your rights, and protecting your family / by Payton, Theresa,1966-author.(CARDINAL)399044; Claypoole, Ted,1963-author.(CARDINAL)399043;
Highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware.Includes bibliographical references and index.
- Subjects: Privacy, Right of; Data protection; Electronic surveillance;
- Available copies: 1 / Total copies: 1
-
unAPI
- Habeas data : privacy vs. the rise of surveillance tech / by Farivar, Cyrus,author.(CARDINAL)501772;
Includes bibliographical references.Introduction -- Telephones : how a fateful call in 1965 from a Los Angeles pay phone still rings out today -- How the government cracked an iPhone-without Apple's help -- How one mugger's calls helped create the NSA's post-9/11 phone metadata surveillance program -- When big brother rides in the back seat -- Can the police use extrasensory technology to look into your house without a warrant? -- Why (amazingly) e-mail providers won't give up messages without a warrant, even though the Supreme Court has never ruled on the issue -- Why the eighteenth-century Constitution protects against twenty-first-century satellite-based tracking -- How your phone can lead the authorities right to your door -- Can police search your phone when you're arrested? -- Why privacy needs all of us -- Who watches the watchers?
- Subjects: Privacy, Right of; Electronic surveillance; Government information; Civil rights;
- Available copies: 3 / Total copies: 4
-
unAPI
- Eyes & spies : how you're tracked and why you should know / by Kyi, Tanya Lloyd,1973-author.(CARDINAL)319317; Wuthrich, Belle,1989-illustrator.(CARDINAL)625200;
Includes bibliographical references (pages 126-134) and index."This book looks at the way information and data is collected and used by individuals, governments, companies, and organizations. Arguments for both increased security and increased privacy are offered, encouraging readers to think critically about the issues. Topics relevant to children are included, such as being tracked at school, cyberbullying, and online safety."--990L
- Subjects: Young adult literature.; Data protection.; Privacy, Right of.;
- Available copies: 6 / Total copies: 11
-
unAPI
- Privacy in the age of big data : recognizing threats, defending your rights, and protecting your family / by Payton, Theresa,1966-author.(CARDINAL)399044; Claypoole, Ted,1963-author.(CARDINAL)399043; Schmidt, Howard A.,writer of preface.(CARDINAL)552193;
Includes bibliographical references and index.The intersection of privacy, law, and technology -- Ground Zero: Your computer and the internet. Your computer is watching you -- How government follows your electronics tracks -- Chased online by criminals and snoops -- Just hanging out online... -- The spy in your pocket -- Risks in the streets. Cameras everywhere -- When your car is just another computer -- When your own body gives you away -- DNA and your health records -- Home is where the heart (of surveillance) is. Home sweet home: spies in your living room -- Risks of computer and phone networks -- Where do we go from here? The future of technology and privacy -- Laws and regulations that could help preserve privacy.Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection, while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Theresa M. Payton and Theodore Claypoole skillfully introduce readers to the many ways we are "watched" and how to change behaviors and activities to recapture and regain more of our privacy.--[book jacket]
- Subjects: Data protection; Electronic surveillance; Privacy, Right of;
- Available copies: 5 / Total copies: 8
-
unAPI
- Privacy is hard and seven other myths : achieving privacy through careful design / by Hoepman, Jaap-Henk,author.;
Includes bibliographical references and index.An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now. -- Provided by publisher."This book debunks 10 myths about how hard it really is to design privacy-friendly systems" --
- Subjects: Computer security.; Data protection.; Privacy.;
- Available copies: 2 / Total copies: 2
-
unAPI
- Protecting privacy in surveillance societies : the Federal Republic of Germany, Sweden, France, Canada, and the United States / by Flaherty, David H.(CARDINAL)166716;
Includes bibliographical references (pages 409-465).
- Subjects: Data protection; Privacy, Right of; Data protection; Privacy, Right of; Data protection; Privacy, Right of;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
Results 1 to 10 of 231 | next »