You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these new and emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in an environment that increasingly automates the collection of personal information and uses surveillance to reduce ...
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enha...
The best stories of the year: here is a collection of the year's best fantasy stories, by some of the genre's greatest authors, and selected by Rich Horton, a contributing reviewer to many of the field's most respected magazines. In this volume you'll find stories Peter Beagle, Paul Di Filippo, Neil Gaiman, Theodora Goss, Kelly Link, Gene Wolfe and many more! Complete contents: PIP AND THE FAIRIES, by Theodora Goss COMBER, by Gene Wolfe THREE URBAN FOLK TALES, by Eric Schaller WAX, by Elizabeth Bear THE EMPEROR OF GONDWANALAND, by Paul Di Filippo COMMCOMM, by George Saunders FIVE WAYS JANE AUSTEN NEVER DIED, by Samantha Henderson FANCY BREAD, by Gregory Feeley SUNBIRD, by Neil Gaiman THE SECRET OF BROKEN TICKERS, by Joe Murphy ON THE BLINDSIDE, by Sonya Taaffe JANE, by Marc Laidlaw IS THERE LIFE AFTER REHAB? by Pat Cadigan TWO HEARTS, Peter S. Beagle SUPER-VILLAINS, Michael Canfield EMPTY PLACES, by Richard Parks INVISIBLE, by Steve Rasnic Tem BY THE LIGHT OF TOMORROW’S SUN, by Holly Phillips THE GIST HUNTER, by Matthew Hughes
A wayward son is sent to Change' lunar station to redeem himself, but Jonah has other plans. Yesha is desperate to escape her domineering Uncle. Their lives collide in a perfect storm for Jonah as he is swept into the raging undercurrent of the Moon's racial tensions and politics where no one is safe and freedom is at risk.
The contours of privacy—its particular forms and our reasons for valuing it—are numerous and varied. This book explores privacy’s contours in a series of essays on such themes as the relationship between privacy and social accountability, privacy in and beyond anonymity, the psychology of privacy, and the privacy concerns of emerging information technologies. The book’s international and multidisciplinary group of contributors provides rich insights about privacy that will be of great interest not only to the scholarly privacy community at large but also to professionals, academics, and laypersons who understand that the contours of privacy weave themselves throughout wide swaths of life in present-day society. The stylistically accessible yet scholarly rigorous nature of The Contours of Privacy, along with the diversity of perspectives it offers, set it apart as one of the most important additions to the privacy literature on the contemporary scene.
None
Although most Canadians are familiar with surveillance cameras and airport security, relatively few are aware of the extent to which the potential for surveillance is now embedded in virtually every aspect of our lives. We cannot walk down a city street, register for a class, pay with a credit card, hop on an airplane, or make a telephone call without data being captured and processed. Where does such information go? Who makes use of it, and for what purpose? Is the loss of control over our personal information merely the price we pay for using social media and other forms of electronic communication, or should we be wary of systems that make us visible—and thus vulnerable—to others as n...
None
Matters of privacy have profoundly changed since electronic storage of information has become the norm. Consequently, policy-makers and legislators are trying to keep up with privacy challenges in the workplace, in healthcare, in surveillance, and on social networking sites. With Privacy: Defending an Illusion, Martin Dowding fills a very important gap in policy analysis and the teaching of privacy issues at the senior undergraduate and early graduate student level. In the first section of this book, Dowding recounts historical interpretations of privacy in a wide variety of socio-cultural circumstances. In the second section, the author addresses how information and communication technologi...