Logo

What If Crime Were Impossible?

Small book cover: What If Crime Were Impossible?

What If Crime Were Impossible?
by

Publisher: Univ. of Texas San Antonio
Number of pages: 303

Description:
Imagine societies with better planning, tighter control, more interference, and at the same time with openness and privacy. What if we made full use of computer technology, to enhance our security and our lives? Indeed, what if crime were impossible?

Home page url

Download or read it online for free here:
Download link
(1.1MB, PDF)

Similar books

Book cover: Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked WorldControlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
by - AU Press
Who controls our access to information, and who decides what others have a right to know about us? Lorna Stefanick offers a user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.
(9245 views)
Book cover: Global Survey on Internet Privacy and Freedom of ExpressionGlobal Survey on Internet Privacy and Freedom of Expression
by - UNESCO
This book identifies the relationship between freedom of expression and Internet privacy, assessing where they support each other in different circumstances. The book maps out the issues in the current regulatory landscape of Internet privacy ...
(7013 views)
Book cover: The Future of Reputation: Gossip, Rumor, and Privacy on the InternetThe Future of Reputation: Gossip, Rumor, and Privacy on the Internet
by - Yale University Press
A fascinating account of how the Internet is transforming gossip and our ability to protect our own reputations. The author shows that the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom.
(16484 views)
Book cover: Underground: Tales of hacking, madness, and obsessionUnderground: Tales of hacking, madness, and obsession
by - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(14338 views)