Logo

What If Crime Were Impossible?

Small book cover: What If Crime Were Impossible?

What If Crime Were Impossible?
by

Publisher: Univ. of Texas San Antonio
Number of pages: 303

Description:
Imagine societies with better planning, tighter control, more interference, and at the same time with openness and privacy. What if we made full use of computer technology, to enhance our security and our lives? Indeed, what if crime were impossible?

Home page url

Download or read it online for free here:
Download link
(1.1MB, PDF)

Similar books

Book cover: The Future of Reputation: Gossip, Rumor, and Privacy on the InternetThe Future of Reputation: Gossip, Rumor, and Privacy on the Internet
by - Yale University Press
A fascinating account of how the Internet is transforming gossip and our ability to protect our own reputations. The author shows that the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom.
(14074 views)
Book cover: Security and Privacy: Global Standards for Ethical Identity ManagementSecurity and Privacy: Global Standards for Ethical Identity Management
by - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(6372 views)
Book cover: Privacy on the Line: The Politics of Wiretapping and EncryptionPrivacy on the Line: The Politics of Wiretapping and Encryption
by - The MIT Press
An insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world. Authors strip away the hype surrounding the policy debate over privacy to examine the national security, commercial and civil liberties issues.
(2620 views)
Book cover: How to Become Anonymous, Secure and Free OnlineHow to Become Anonymous, Secure and Free Online
by - Smashwords
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources.
(2197 views)