Catalog Search Results
Author
Series
Pub. Date
2018.
Description
Privacy invasion, cyberbullying, and identity theft are vulnerabilities that young people expose themselves to every time they go online. This book explains what sorts of information might be shared, stored, and stolen when using the internet, how to protect online privacy, and what to do after falling victim to digital privacy crimes. Readers will learn about the vulnerabilities of shopping and banking digitally and about how apps can quickly lead...
Author
Pub. Date
2019
Description
The fascinating history and unnerving future of high-tech aerial surveillance, from its secret military origins to its growing use on American citizens
Eyes in the Sky is the authoritative account of how the Pentagon secretly developed a godlike surveillance system for monitoring America's enemies overseas, and how it is now being used to watch us in our own backyards. Whereas a regular aerial camera can only capture a small patch of ground at...
Author
Pub. Date
2004
Description
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide, J.J. Luna shows you how to protect yourself from these information predators by securing your vehicle and real estate ownership, your bank accounts, your business dealings, your computer files, your home address, and more....
27) Identity theft
Author
Series
Pub. Date
[2020]
Accelerated Reader
IL: MG - BL: 5.7 - AR Pts: 1
Description
Many people store and share personal information online. This information is part of a person's identity. Identity thieves can find and steal this information. Identity Theft explores how people can protect themselves from identity theft.
Author
Pub. Date
[2005]
Description
Publisher description for Invasion of privacy : a reference handbook / Kevin M. Keenan. Invasion of Privacy: A Reference Handbook, chronicles the most pressing privacy issues and dilemmas from around the world from the 17th century to today. Shocking accounts of government and corporate abuse liven discussions of controversial topics ranging from high-tech surveillance and the collection of personal data to bodily and sexual privacy. The Internet,...
Author
Pub. Date
2021.
Description
"Val and Julie just want what's best for their kids, David and Sophie. So when teenage son David comes home one day asking for a Pilot, a new brain implant to help with school, they reluctantly agree. This is the future, after all. Soon, Julie feels mounting pressure at work to get a Pilot to keep pace with her colleagues, leaving Val and Sophie part of the shrinking minority of people without the device. Before long, the implications are clear, for...
Author
Pub. Date
2012
Description
"From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. Using real life stories and his own consulting experience, J.J. Luna shows you legal methods for protecting yourself from information predators and how to secure your bank accounts, business dealings, computer files, and even your home address. In this third updated edition, there are...
35) Privacy
Series
Pub. Date
[2006]
Description
Looks at all sides in several arguments concerning the right to privacy, including debates about the Patriot Act, traveler searches, national identity cards, and public video surveillance.
Author
Pub. Date
[2017]
Description
Be online without leaving a trace.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics...
Author
Pub. Date
[2015]
Description
"Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection, while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Theresa M. Payton and Theodore Claypoole skillfully introduce readers to the many ways we are "watched" and how to change behaviors and activities...
Author
Series
Pub. Date
[2015]
Description
"Governments, businesses, and individuals all rely extensively on online communication and information but repeated news reports of online breaches do not inspire confidence in the online world. This is true in many areas including business. What information is collected, how it is used or misused, and how it can be protected are among the topics covered in this book"--From the publisher's web site.
Author
Series
Pub. Date
2002
Description
Defining and valuing the right to privacy -- Unfortunately, everyone cannot be trusted to behave well if let alone -- Too much official invasion of privacy harms the public interest -- Civilized life requires the exchange of information to unfair advantage -- A free society depends on the right to learn and share information without undue secrecy -- There are things nobody else has a right to learn from a person who wishes to keep them private.