Results 1 to 5 of 5
- Report to the President. by United States.Information Security Oversight Office.(CARDINAL)291965;
-
- Subjects: United States. Information Security Oversight Office; Security classification (Government documents);
- Available copies: 1 / Total copies: 1
-
unAPI
- NISP : the National Industrial Security Program : industry's perspective, making progress, but falling short on potential. by United States.Information Security Oversight Office.(CARDINAL)291965;
-
- Subjects: Defense information, Classified; Industries;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- Refuge of a scoundrel : the Patriot Act in libraries / by Foerstel, Herbert N.(CARDINAL)202880;
Includes bibliographical references (pages [209]-210) and index.1. A recent history of library surveillance -- Background -- The library awareness program -- Origins in the New York office -- The FBI meets congress -- The controversy escalates -- It only hurts when we laugh -- A selective survey of library visits -- Winding down a troubled program -- The role of librarians in FBI surveillance -- The special libraries association -- Librarians as potential KGB agents -- Paint the critics red -- The law and library surveillance -- 2: The USA Patriot Act -- Passage of the bill -- General provisions -- Provisions directly affecting libraries -- National security letters and emergency foreign intelligence warrants -- Sunsetted provisions -- Blurring the distinction between criminal justice and counterintelligence -- 3: The Patriot Act in libraries and bookstores -- Fearing the worst -- What are you going to do when they come for you? -- Destroying patron records before they can be seized -- FBI advice and reassurance -- Documenting those elusive federal visits to libraries -- Gag orders -- 4: Making things worse: government actions beyond the Patriot Act -- Executive orders, regulations, and administrative guidelines -- Homeland security act -- Total information awareness -- TIPS program -- CAPPS II -- Patriot Act II and the victory act -- Ashcroft's national tour -- State anti-terrorism legislation in the wake of 9/11 -- 5: Fighting back: responses to the Patriot Act -- Congressional oversight of the Patriot Act -- Public oversight of the Patriot Act -- The Patriot Act in art and humor -- Legislative attempts to modify the Patriot Act -- State, local, and professional resolutions opposing the Patrio Act -- Ashcroft on the offensive -- The truth, the whole truth, and nothing but the truth?
- Subjects: United States.; Library records; Library surveillance.; Bookstores; Libraries and state;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- Reform and experimentation after the Cold War, 1989-2001 / by Shiman, Philip,author.(CARDINAL)370600; Arena, Joseph A.,1983-author.(CARDINAL)867596; Converse, Elliott Vanveltner,author.(CARDINAL)191754; United States.Department of Defense.Historical Office,issuing body.(CARDINAL)719204;
Includes bibliographical references (pages 583-616) and index.This book, the fifth volume in the History of Acquisition in the Department of Defense series, focuses on the adoption in the 1990s of new concepts and methods for acquiring major weapon systems. The changes came from several quarters - the White House, the Office of the Secretary of Defense, the military services, and Congress - and in response to numerous pressures. The most important of these were the end of the Cold War and the resulting decline in defense spending; advances in weapons technology, especially information technology; and the widespread belief that the acquisition system was failing to deliver the weapon systems the nation needed, when it needed them, and at a cost it was willing to pay. Both President George H. W. Bush and President William J. "Bill" Clinton made correcting acquisition's perceived weaknesses a high priority. Reforms aimed at decreasing the time required to develop and field advanced weapon systems while reducing their cost, strengthening acquisition management and organizations, improving the quality and professionalism of the acquisition workforce, forging new relationships with the defense industry, and tapping the commercial economy for leading-edge technologies, innovative business practices, and finished products easily installed in or adapted to military systems. Despite the many changes of the 1990s, decades-long trends continued: reliance on technologically superior weapons to gain advantage over potential opponents, the centralization of acquisition management in the Office of the Secretary of Defense, and congressional push for greater oversight. In-depth case studies of major weapon system programs illustrate how acquisition functioned, particularly in adapting to reforms that sometimes succeeded, sometimes failed, and sometimes had no impact on program outcomes. Taken as a whole, however, the reforms made the acquisition community better able to adopt innovations and best practices from the private sector, more responsive to the users of systems, and more capable of designing policies, organizations, and procedures to address the security threats of the new century. --
- Subjects: Case studies.; United States. Department of Defense; United States. Department of Defense; Research and development contracts, Government; Weapons systems;
- Available copies: 0 / Total copies: 1
-
unAPI
- Privacy rights in the Digital Age / by Kirtley, Jane E.,editor.(CARDINAL)202631; Shally-Jensen, Michael,editor.(CARDINAL)682936;
Includes bibliographical references (pages 705-737) and index.Customer proprietary network information (CPNI) -- The Cyber Intelligence Sharing and Protection Act (CISPA) H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress) -- Cybersecurity -- Dark web -- Data Breach Notification Laws -- Data breaches -- Data brokers -- Data harvesting -- Data protection regimes -- Data science -- Debt collection -- Defence and Security Media Advisory Committee (DSMA Committee) -- Descartes, Rene -- DNA databases -- Do-not-track legislation -- Douglas, William Orville -- Doxing -- Driver's Privacy Protection Act of 1994 (DDPA), 18 U.S.C. 2271-2725 -- Drones -- Drug and alcohol testing -- Economic arguments for privacy rights -- Education Data Exchange Network (EDEN) -- Educational setting, privacy in an -- Electoral interference and privacy -- Electronic Communications Privacy Act (ECPA), 18 U.S.C. 2510 et seq -- Electronic Frontier Foundation -- Electronic Privacy Information Center (EPIC) -- Electronic surveillance -- Email -- Employment eligibility verification systems -- End-of-life care -- The Enlightenment -- Espionage Act -- Facebook -- Facial recognition technology -- Fair Credit Reporting Act -- Fair information practice principles -- Family Educational Rights and Privacy Act -- Federal Communications Commission -- Federal Communications Commission v. AT&T Inc., 562 U.S. 397 (2011) -- Federal Trade Commission -- Financial information, privacy rights in -- First Amendment to the U.S. Constitution -- Florida Star v. B.J.F., 491 U.S. 524 (1989) -- Foreign Intelligence Surveillance Act of 1978 -- Foreign Intelligence Surveillance Court -- Fourth Amendment to the U.S. Constitution -- Freedom of Information Act --Genome sequencing -- General Data Protection Regulation -- Global positioning system (GPS) tracking -- Godkin, Edwin Lawrence (1831-1902) -- Gonzaga University v. Doe, 536 U.S. 273 (2002) -- Google -- Government Communications Headquarters (GCHQ) -- Gramm-Leach-Bliley Act -- Greenwald, Glenn (1967-) -- Griswold v. State of Connecticut 381 U.S. 479 (1965) -- Hacking, computer -- Harassment -- Health care information -- Health Insurance Portability and Accountability Act -- HIV testing -- Home, privacy of the -- Homeland Security, U.S. Department of -- Homeless people, right to privacy of -- Hustler Magazine v. Falwell, 485 U.S. 46 (1988) -- Identity theft -- In re iPhone Application Litigation, 844 F.Supp.2d 1040 (E.D. Cal. 2012) -- Information Awareness Office (IAO) -- Informative asymmetries -- Instagram -- Integrated Automated Fingerprint Identification System (IAFIS) -- Intellectual property -- International Center for Information Ethics (ICIE) -- Internet cafes -- Internet Service Providers and privacy -- Interrogations -- Invasion of privacy -- Journalism and the protection of sources -- Katz v. United States, 389 U.S. 347 (1967) -- Kyllo v. United States, 533 U.S. 27 (2001) -- Law enforcement -- Lawrence v. Texas, 539 U.S. 558 (2003) -- Legal evolution of privacy rights in the United States -- License plate reader system -- Locke, John (1632-1704) -- Magic Lantern -- Malware -- Manning, Chelsea Elizabeth -- Mapp v. Ohio, 367 U.S. 495 (1961) -- Marketing -- Mass media -- Medical confidentiality, privacy right to -- Metadata -- Meyer v. Nebraska, 262 U.S. 390 (1923) -- Migrants and refugees in the United States, privacy rights of -- Mobile devices -- Model legislation on privacy -- National Archives and Records Aministration v. Favish, 541 U.S. 157 (2004) -- National Instant Criminal Background Check System (NICS) -- National Security Agency (NSA) -- New Jersey v. TLO, 469 U.S. 325 (1985) -- New York Times Co. v. Sullivan, Abernathy, et. al., 376 U.S. 254 (1964) -- New leaks -- Next Generation Identification (NGI) --Obscenity -- Official Secrets Act -- Olmstead v. United States, 277 U.S. 438 (1928) -- Online privacy and protection -- Open data movement -- Open source -- Patient Safety and Quality Improvement Act of 2005 (PSQIA) -- Personal autonomy -- Philosophical basis of privacy -- The Plame Affair -- Poitras, Laura -- Pornography -- PRISM -- Privacy Act of 1974 -- Privacy and Civil Liberties Oversight Board (PCLOB) -- Privacy laws, federal -- Privacy laws, state -- Privacy Protection Act, 42 U.S.C. section aa et seq --Privacy settings -- Privacy torts -- Privacy sphere -- Prosser, William Lloyd (1898-1972) -- Protect America Act of 2007 -- Public morality -- Public records -- Publicity, right of -- Reno v. Condon, 528 U.S. 141 (2000) -- Repository for Individuals of Special Concern (RICS) -- Right to be forgotten -- Right to be let alone -- Riley v. California, 134 S. Ct. 2473 (2014) -- Safe Harbor -- Scientific and medical data sharing -- Search engines -- Search warrants -- Security flaws, computers -- September 11 -- Sexting -- Sexual orientation -- Smart moves -- Smartphones -- Snapchat -- Snooper's Charter -- Snowden, Edward Joseph -- Social media -- Social media profiling -- Social networking technologies -- Social Security numbers -- (SSNs) -- Sorrell v. IMS Health, 131 S. Ct. 2653 (2011) -- Spam -- Spyware -- Stalking -- Stanley v. Georgia, 394 U.S. 557 (1969) -- Stop and frisk policy -- Stored Communications Act (SCA) -- Subpoenas -- Supreme Court of the United States -- Surveillance cameras -- Telephones -- Tempora -- Terrorism and privacy -- Text messaging --- Theoretical basis for privacy -- Time, Inc. v. Hill, 385 U.S. 374 (1967) -- Twitter --Publisher's Note -- Contributors -- Editor's Introduction -- Cross-Cultural Perspectives on Privacy -- Abortion -- Administrative searches -- Airport security systems -- Amazon -- American Civil Liberties Union (ACLU) -- Anonymity and anonymizers -- Anti-Forensics -- APEC Cross Border Privacy Rules System -- Apple, Inc -- Apps -- Assange, Julian -- Automated teller machines (ATMs) -- Background checks -- Bartnicki et ano v. Vopper, et al., 532 U.S. 514 (2001) -- Beliefs, privacy of -- Big data -- Bioethics -- Biometric Center of Excellence -- Biometric Optical Surveillance System -- Biometrics -- Blockchain technologies -- Body, privacy of the -- Border Security, Immigration Reform, and Privacy -- Bots -- Boundless Informant -- Brain-computer interfacing (BCI) -- Brandeis, Louis Dembitz -- Caller ID -- Cantrell v. Forest City Publishing Company, 419 U.S. 245 (1974) -- Cellphones -- Center for Democracy and Technology (CDT) -- Central Security Service -- Children's Online Privacy Protection Act, 15 U.S.C. 6501-6508 -- Children's right to privacy -- City of Ontario, Cal. v. Quon, 506 U.S. 746 (2010) -- City of Sherman v. Otis Henry, 928 S.W.2d 464 (1996) -- Cloud computing -- Computer Fraud and Abuse Act (CFAA) -- Computer harvesting -- Computers and privacy -- Confidential informants -- Confidential Information Protection and Statistical Efficiency Act of 2002 -- Consent -- Constitutional law -- Consumer privacy -- Cookies -- Cox Broadcasting Corporation v. Cohn, 420 U.S. 469 (1975) -- Credit and debit cards -- Credit reporting agencies (CRAs) -- Criminal justice (criminal procedure) -- Cruzan v. Director, Missouri Department of Health, 497 U.S. 261 (1990) --U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) -- U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) -- Unenumerated constitutional right, privacy as an -- United States v. Jones, 132 S. Ct. 945 (2012) -- USA FREEDOM Act, Pub. L No. 114-23 -- USA PATRIOT Act, Pub. L. No. 107-52 -- Video Privacy Protection Act (18 USCA section 2710) -- Voting and privacy rights -- Warren, Earl -- Washington v. Glucksberg, 521 U.S. 702 (1997) -- "We are watching you" Act -- Wearable technology -- Whistleblowers -- WikiLeaks -- Wikipedia -- Wilson v. Layne, 526 U.S. 603 (1999) -- Wiretapping -- Workplace, privacy in the -- Zacchini v. Scripps-Howard Broadcasting Co., 433 U.S. 562 (1977).Discusses the practical, political, psychological, and philosophical challenges of technological advances have changed the landscape of traditional notions of privacy.
- Subjects: Encyclopedias.; Privacy, Right of; Electronic surveillance; Computer security; Data protection; Electronic government information;
- Available copies: 1 / Total copies: 1
-
unAPI
Results 1 to 5 of 5