The Locator -- [(subject = "Computer crimes--United States--Sources")]

2 records matched your query       


Record 1 | Previous Record | Long Display | Next Record
05217aam a2200433Ii 4500
001 88D8D3EA774811E7923FA1BEDAD10320
003 SILO
005 20231202014008
008 170316t20172017nyua     b    001 0 eng d
020    $a 1682174522
020    $a 9781682174524
035    $a (OCoLC)980294459
040    $a DON $b eng $e rda $c DON $d OCLCO $d MNM $d WSU $d ZLM $d CSA $d LMR $d R2A $d OCLCF $d MOU $d GTA $d CGN $d IBI $d SGB $d YDX $d SOI $d IWA $d SILO
043    $a n-us---
050 14 $a HV6773.2 I58x 2017
245 00 $a Internet abuses and privacy rights / $c [compiled by] H. W. Wilson, a division of EBSCO Information Services.
264  1 $a Amenia, New York : $b Grey House Publishing, $c 2017.
300    $a xiii, 216 pages : $b illustrations ; $c 25 cm.
490 1  $a The reference shelf ; $v volume 89, number 2
504    $a Includes bibliographical references and index.
505 0  $a Personal cybersecurity : The personal data dimension: How to protect your digital privacy in the era of public shaming / Julia Angwin ; Passing the email privacy act has never been more urgent / Andy Greenberg ; Practicing good personal cybersecurity isn't just about protecting yourself / Josephine Wolff ; The watchers: assaults on privacy in America / Jonathan Shaw ; Open technology : values, compromises, and ownership / Brynne Morris, Georgia Bullen, Steph Alarcon, Fernanda Lavalle, Nat Meysenberg, and Chris Ritzo -- Net neutrality and government surveillance : Cyberpolitics : neutrality, privacy, and security: Follow Obama's lead on cybersecurity / Robert Knake ; Consumers are going to love the end of net neutrality - at first / Christopher Mims ; Government's privacy rights don't exceed the public's / Noah Feldman ; Documents show AT&T secretly sells customer data to law enforcement / Nicky Woolf ; Concerns loom over a data-sharing pact to protect privacy of Europeans / Natalia Drozdiak and Sam Schechner ; Trump's FCC pick quickly targets net neutrality rules / Cecelia Kang ; Now it's much easier for government agencies to get NSA surveillance data / Robyn Greene ; The risks of sending secret messages in the White House / Kaveh Waddell -- New challenges to privacy : Cyberthreats of today and tomorrow: The privacy threat from always-on microphones like the Amazon Echo / Jay Stanley ; Incentives need to change for firms to take cyber-security more seriously : Hacking, cryptography, and the countdown to quantum computing / Alex Hutchinson ; The Dyn DDoS attack and the changing balance of online cyber power / Kalev Leetaru ; The internet of things is a cyberwar nightmare / James Stavridis ; The biggest security threats coming in 2017 / Wired staff ; Why does our privacy really matter? / Evan Selinger -- Internet news and accountability : Internet news and the fight for legitimacy: Fake news expert on how false stories spread and why people believe them ; Who controls your Facebook feed / Will Oremus ; The very real consequences of fake news stories and why your brain can't ignore them / Nsikan Akpan ; Why do we fall for fake news? / Shyam Sundar ; The Trump administration plays right into Russia's information warfare strategy / David Fidler -- The power and influence of technology : Black hats and white hats: the hacking phenomenon ; The perfect weapon: how Russian cyberpower invaded the U.S. / Eric Lipton, David E. Sanger, and Scott Shane ; Hacking the attention economy / Danah Boyd ; Partisan politics and the Russia hacking imbroglio / Jonah Goldberg ; Feds: we can read all your email, and you'll never know / Clark D. Cunningham ; Lobbying muscle may help tech titans "trump" Trump / Allan Holmes and Jared Bennett ; Reboot the world / Paul Ford.
520    $a From the controversy surrounding Edward Snowden's security leak of classified information, to hacked email accounts of prominent political candidates, internet privacy and cyber security present major ethical issues in today's technology-centric society. Countries are challenged to find the right balance in securing personal data and how to regulate the sale and exchange of information obtained on the internet. Innovative technologies and data collection that enable novel modes of interaction and new opportunities for knowledge can also be abused to invade people's privacy, provide new tools of discrimination, and harm individuals and communities. This title will address both sides of this complex topic. -- Amazon.com
650  0 $a Computer crimes $z United States $v Sources.
650  0 $a Internet $z United States $v Sources.
650  0 $a Privacy, Right of $z United States $v Sources.
650  0 $a Network neutrality $z United States $v Sources.
650  0 $a Electronic surveillance $z United States $v Sources.
650  0 $a Computer security $z United States $v Sources.
710 2  $a H.W. Wilson Company.
830  0 $a Reference shelf ; $v v. 89, no. 2.
941    $a 6
952    $l USUX851 $d 20230405012535.0
952    $l HYAX325 $d 20230316154510.0 $m HYAX325
952    $l N2AX314 $d 20210728020714.0
952    $l GEPG771 $d 20210722054443.0
952    $l PYAX423 $d 20191001012649.0
952    $l IBAX173 $d 20180307030035.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=88D8D3EA774811E7923FA1BEDAD10320
994    $a C0 $b IWA

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.