Coverart for item
The Resource Internet abuses and privacy rights, [compiled by] H. W. Wilson, a division of EBSCO Information Services

Internet abuses and privacy rights, [compiled by] H. W. Wilson, a division of EBSCO Information Services

Label
Internet abuses and privacy rights
Title
Internet abuses and privacy rights
Statement of responsibility
[compiled by] H. W. Wilson, a division of EBSCO Information Services
Contributor
Subject
Genre
Language
eng
Cataloging source
DON
Dewey number
364.1680973
Illustrations
illustrations
Index
index present
LC call number
HV6773.2
LC item number
.I58 2017
Literary form
non fiction
Nature of contents
bibliography
Series statement
The reference shelf
Series volume
volume 89, number 2
Label
Internet abuses and privacy rights, [compiled by] H. W. Wilson, a division of EBSCO Information Services
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • The watchers : assaults on privacy in America
  • Jonathan Shaw
  • Open technology : values, compromises, and ownership
  • Brynne Morris, Georgia Bullen, Steph Alarcon, Fernanda Lavalle, Nat Meysenberg, and Chris Ritzo
  • Net neutrality and government surveillance
  • Cyberpolitics : neutrality, privacy, and security
  • Follow Obama's lead on cybersecurity
  • Robert Knake
  • Consumers are going to love the end of net neutrality - at first
  • Christopher Mims
  • Personal Cybersecurity
  • Government's privacy rights don't exceed the public's
  • Noah Feldman
  • Documents show AT&T secretly sells customer data to law enforcement
  • Nicky Woolf
  • Concerns loom over a data-sharing pact to protect privacy of Europeans
  • Natalia Drozdiak and Sam Schechner
  • Trump's FCC pick quickly targets net neutrality rules
  • Cecelia Kang
  • Now it's much easier for government agencies to get NSA surveillance data
  • Robyn Greene
  • The personal data dimension
  • The risks of sending secret messages in the White House
  • Kaveh Waddell
  • New challenges to privacy
  • Cyberthreats of today and tomorrow
  • The privacy threat from always-on microphones like the Amazon Echo
  • Jay Stanley
  • Incentives need to change for firms to take cyber-security more seriously
  • Hacking, cryptography, and the countdown to quantum computing
  • Alex Hutchinson
  • The Dyn DDoS attack and the changing balance of online cyber power
  • How to protect your digital privacy in the era of public shaming
  • Kalev Leetaru
  • The internet of things is a cyberwar nightmare
  • James Stavridis
  • The biggest security threats coming in 2017
  • Wired staff
  • Why does our privacy really matter?
  • Evan Selinger
  • Internet news and accountability
  • Internet news and the fight for legitimacy
  • Fake news expert on how false stories spread and why people believe them
  • Julia Angwin
  • Who controls your Facebook feed
  • Will Oremus
  • The very real consequences of fake news stories and why your brain can't ignore them
  • Nsikan Akpan
  • Why do we fall for fake news?
  • Shyam Sundar
  • The Trump administration plays right into Russia's information warfare strategy
  • David Fidler
  • The power and influence of technology
  • Black hats and white hats : the hacking phenomenon
  • Passing the email privacy act has never been more urgent
  • The perfect weapon : how Russian cyberpower invaded the U.S.
  • Eric Lipton, David E. Sanger, and Scott Shane
  • Hacking the attention economy
  • Danah Boyd
  • Partisan politics and the Russia hacking imbroglio
  • Jonah Goldberg
  • Feds : we can read all your email, and you'll never know
  • Clark D. Cunningham
  • Lobbying muscle may help tech titans "trump" Trump
  • Allan Holmes and Jared Bennett
  • Andy Greenberg
  • Reboot the world
  • Paul Ford
  • Practicing good personal cybersecurity isn't just about protecting yourself
  • Josephine Wolff
Dimensions
26 cm.
Extent
xiii, 216 pages
Isbn
9781682174524
Isbn Type
(pbk)
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Label
Internet abuses and privacy rights, [compiled by] H. W. Wilson, a division of EBSCO Information Services
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • The watchers : assaults on privacy in America
  • Jonathan Shaw
  • Open technology : values, compromises, and ownership
  • Brynne Morris, Georgia Bullen, Steph Alarcon, Fernanda Lavalle, Nat Meysenberg, and Chris Ritzo
  • Net neutrality and government surveillance
  • Cyberpolitics : neutrality, privacy, and security
  • Follow Obama's lead on cybersecurity
  • Robert Knake
  • Consumers are going to love the end of net neutrality - at first
  • Christopher Mims
  • Personal Cybersecurity
  • Government's privacy rights don't exceed the public's
  • Noah Feldman
  • Documents show AT&T secretly sells customer data to law enforcement
  • Nicky Woolf
  • Concerns loom over a data-sharing pact to protect privacy of Europeans
  • Natalia Drozdiak and Sam Schechner
  • Trump's FCC pick quickly targets net neutrality rules
  • Cecelia Kang
  • Now it's much easier for government agencies to get NSA surveillance data
  • Robyn Greene
  • The personal data dimension
  • The risks of sending secret messages in the White House
  • Kaveh Waddell
  • New challenges to privacy
  • Cyberthreats of today and tomorrow
  • The privacy threat from always-on microphones like the Amazon Echo
  • Jay Stanley
  • Incentives need to change for firms to take cyber-security more seriously
  • Hacking, cryptography, and the countdown to quantum computing
  • Alex Hutchinson
  • The Dyn DDoS attack and the changing balance of online cyber power
  • How to protect your digital privacy in the era of public shaming
  • Kalev Leetaru
  • The internet of things is a cyberwar nightmare
  • James Stavridis
  • The biggest security threats coming in 2017
  • Wired staff
  • Why does our privacy really matter?
  • Evan Selinger
  • Internet news and accountability
  • Internet news and the fight for legitimacy
  • Fake news expert on how false stories spread and why people believe them
  • Julia Angwin
  • Who controls your Facebook feed
  • Will Oremus
  • The very real consequences of fake news stories and why your brain can't ignore them
  • Nsikan Akpan
  • Why do we fall for fake news?
  • Shyam Sundar
  • The Trump administration plays right into Russia's information warfare strategy
  • David Fidler
  • The power and influence of technology
  • Black hats and white hats : the hacking phenomenon
  • Passing the email privacy act has never been more urgent
  • The perfect weapon : how Russian cyberpower invaded the U.S.
  • Eric Lipton, David E. Sanger, and Scott Shane
  • Hacking the attention economy
  • Danah Boyd
  • Partisan politics and the Russia hacking imbroglio
  • Jonah Goldberg
  • Feds : we can read all your email, and you'll never know
  • Clark D. Cunningham
  • Lobbying muscle may help tech titans "trump" Trump
  • Allan Holmes and Jared Bennett
  • Andy Greenberg
  • Reboot the world
  • Paul Ford
  • Practicing good personal cybersecurity isn't just about protecting yourself
  • Josephine Wolff
Dimensions
26 cm.
Extent
xiii, 216 pages
Isbn
9781682174524
Isbn Type
(pbk)
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations

Library Locations

    • George F. Johnson Memorial LibraryBorrow it
      1001 Park St, Endicott, NY, 13760, US
      42.098657 -76.050865
Processing Feedback ...