Normal view MARC view ISBD view

Privacy lost : how technology is endangering your privacy / David H. Holtzman ; foreword by Evan Bayh.

By: Holtzman, David H, 1956-.
Material type: materialTypeLabelBookPublisher: San Francisco : Jossey-Bass, c2006Edition: 1st ed.Description: xxvi, 326 p. ; 24 cm.ISBN: 0787985112 ; 9780787985110 .Subject(s): Privacy, Right of | Information technology -- Social aspectsDDC classification: 323.44 Online resources: Table of contents only | Contributor biographical information | Publisher description
Contents:
Introduction: how and why our privacy is at risk -- Privacy invasions hurt. The seven sins against privacy ; Collateral damage: the harm to society -- Why technology is key. Technology affects privacy: how and why ; New tech, new crimes: fresh wounds -- Privacy in context. Privacy and the law: a right ahead or left behind? ; Privacy and identity: the cult of me ; Privacy and culture in a technological world: shoji screens -- The technology. Voyeurism: surveillance technology ; Stalking: networks, tags, and locators -- The watchers. Marketing invasions: Garbos and greed ; Governmet invasions for security: mugwumps and momists -- What can be done? Fighting back: Gandhis, curmudgeons, and vigilantes ; The panopticon: see the bars, rattle the cage.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Status Date due Barcode
Books Books Eastern University Library
General Stacks
323.44 HOP 2006 (Browse shelf) Not For Loan 10082

Includes bibliographical references (p. 279) and index.

Introduction: how and why our privacy is at risk -- Privacy invasions hurt. The seven sins against privacy ; Collateral damage: the harm to society -- Why technology is key. Technology affects privacy: how and why ; New tech, new crimes: fresh wounds -- Privacy in context. Privacy and the law: a right ahead or left behind? ; Privacy and identity: the cult of me ; Privacy and culture in a technological world: shoji screens -- The technology. Voyeurism: surveillance technology ; Stalking: networks, tags, and locators -- The watchers. Marketing invasions: Garbos and greed ; Governmet invasions for security: mugwumps and momists -- What can be done? Fighting back: Gandhis, curmudgeons, and vigilantes ; The panopticon: see the bars, rattle the cage.

There are no comments for this item.

Log in to your account to post a comment.

Last Updated on 25 March 2024
Copyright © Eastern University Library 2024