Logo

Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World

Large book cover: Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World

Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
by

Publisher: AU Press
ISBN/ASIN: 192683626X
Number of pages: 264

Description:
Who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.

Home page url

Download or read it online for free here:
Download link
(3.1MB, PDF)

Similar books

Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9997 views)
Book cover: Underground: Tales of hacking, madness, and obsessionUnderground: Tales of hacking, madness, and obsession
by - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(14512 views)
Book cover: The Transnational Dimension of Cyber Crime and TerrorismThe Transnational Dimension of Cyber Crime and Terrorism
by - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(12798 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18746 views)