Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
by Lorna Stefanick
Publisher: AU Press 2011
ISBN/ASIN: 192683626X
Number of pages: 264
Description:
Who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.
Download or read it online for free here:
Download link
(3.1MB, PDF)
Similar books
The Transnational Dimension of Cyber Crime and Terrorism
by Abraham D. Sofaer, Seymour E. Goodman - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(12581 views)
by Abraham D. Sofaer, Seymour E. Goodman - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(12581 views)
Open Source Security Tools: Practical Guide to Security Applications
by Tony Howlett - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(16971 views)
by Tony Howlett - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(16971 views)
Security and Privacy: Global Standards for Ethical Identity Management
by John Kleinig, et al. - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(7731 views)
by John Kleinig, et al. - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(7731 views)
Forensic Discovery
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18424 views)
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18424 views)