Catalog Search Results
Author
Pub. Date
[2015]
Description
Social networking has grown into a staple of modern society, but its continued evolution is becoming increasingly detrimental to our lives. Shifts in communication and privacy are affecting us more than we realize or understand. Terms of Service crystalizes this current moment in technology and contemplates its implications: the identity-validating pleasures and perils of online visibility; our newly adopted view of daily life through the lens of...
Author
Pub. Date
2014.
Description
"Investigative reporter for The Guardian and bestselling author Glenn Greenwald, provides an in-depth look into the NSA scandal that has triggered a national debate over national security and information privacy. With further revelations from documents entrusted to Glenn Greenwald by Edward Snowden himself, this book explores the extraordinary cooperation between private industry and the NSA, and the far-reaching consequences of the government's surveillance...
Author
Pub. Date
[2014]
Description
The deputy editor of The Futurist magazine discusses the impact the increased use of computer-aided forecasting will have on everyday life, cataloging the possible benefits and potential abuses of predictive analytics over the next decade. --Publisher's description.
47) The Dark Web
Author
Series
Pub. Date
[2020]
Accelerated Reader
IL: MG - BL: 5.5 - AR Pts: 1
Description
The Dark Web is a part of the internet that is hidden and hard to access. It allows users to remain anonymous. Some people use the Dark Web because they fear for their safety. Others use the Dark Web to sell illegal products or services. The Dark Web explores issues in policing the Dark Web.
Pub. Date
2022.
Description
"Many have argued that at least since the 9/11 terrorist attacks, the United States has become a surveillance state. Others have countered that the government has the public's best interest in mind. But what is the truth? How does a government and its law enforcement prioritize the safety of its citizens without infringing on their privacy? The diverse viewpoints in this volume address the questions of whether the United States is operating under...
51) Online privacy
Author
Series
Pub. Date
2017.
Description
"As much as most people value their privacy, the amount of information they share freely on social media is astounding. While this sharing may help create communities, security experts say it also destroys privacy. This book will discuss the scope of the growing privacy problem, potential consequences of "oversharing," and efforts to address it." -- Publisher's website.
Author
Pub. Date
[2020]
Description
Hailed as a masterwork of reporting and analysis, and based on decades of research within China, We Have Been Harmonized, by award-winning correspondent Kai Strittmatter, offers a groundbreaking look at how the internet and high tech have allowed China to create the largest and most effective surveillance state in history. We Have Been Harmonized is a terrifying portrait of life under unprecedented government surveillance--and a dire warning...
Author
Pub. Date
[2003]
Description
"The Soft Cage explores the hidden history of surveillance - from controlling slaves in the old South to implementing early criminal justice, tracking immigrants, and closely monitoring the poor as part of modern social work. It also explores the role computers play in creating a whole new world of seemingly benign technologies - such as credit cards, website "cookies," electronic toll collection, "data mining," and iris scanners at airports.".
"With...
Series
Reference shelf volume 89, no. 2
Pub. Date
2017.
Description
This volume examines personal cybersecurity and considers net neutrality and government surveillance, new challenges to privacy, and the power and influence of technology.
Author
Series
Pub. Date
2015.
Description
"Recent revelations of extensive government surveillance programs pit privacy concerns against the need to fight terrorism and crime. Using cases involving real people, this book explores how federal agencies, local law enforcement, and even schools are collecting, using and perhaps abusing the personal information they gather online. The book concludes with a discussion of proposed regulations and policies that could strike a better balance between...