Catalog Search Results
Author
Summary
Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer...
Author
Summary
"Social networking has grown into a staple of modern society, but its continued evolution is becoming increasingly detrimental to our lives. Shifts in communication and privacy are affecting us more than we realize or understand. Terms of Service crystallizes the current moment in technology and contemplates its implications: the identity-validating pleasures and perils of online visibility; our newly adopted view of daily life through the lens of...
Author
Summary
Hailed as a masterwork of reporting and analysis, and based on decades of research within China, We Have Been Harmonized, by award-winning correspondent Kai Strittmatter, offers a groundbreaking look at how the internet and high tech have allowed China to create the largest and most effective surveillance state in history. We Have Been Harmonized is a terrifying portrait of life under unprecedented government surveillance--and a dire warning...
Author
Summary
"As the debate about out-of-control policing heats up, an authority on constitutional law offers a provocative account of how our rights have been eroded In June 2013, documents leaked by Edward Snowden sparked widespread debate about secret government surveillance of Americans. Just over a year later, the shooting of Michael Brown, a black teenager in Ferguson, Missouri, set off protests and triggered concern about militarization and discriminatory...
Author
Series
Library technology reports volume 56, no. 6
Summary
This report constitutes a content analysis of privacy policies across a broad swath of academic and public libraries in the United States--Fifty selected libraries within each category to answer question on data collection and usage. In addition, the research surfaces further details that other libraries could consider when drafting a policy for the first time or when updating an existing policy.--
Series
Summary
This LITA Guide offers readers guidance on the wide range of privacy aspects that need to be considered in a twenty-first-century library. This includes: Foundations of privacy in libraries; Data collection, retention, use, and protection; Laws and regulations; Privacy instruction for patrons and staff; Contract with third parties; Library tools including social network sites, surveillance video, and RFID.