Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your privacy can be violated. Two veteran journalists, authorities on how information is handled in the digital age, have written a definitive guide to minimize your digital footprint, protect your vital information and prevent it ......
Privacy, in human history, is a relatively recent concept. Nobody had much privacy in the Middle Ages. Even kings and queens lacked privacy: it was an age when crowds watched a queen give birth, and the king received visitors while on the chamber pot. Technology and concepts of privacy grew up together--as both friends and enemies. For example, ......
This book examines our basic understandings of privacy as they are challenged by modern technology, changing social mores, and evolving legal understandings that both reflect and reinforce underlying changes in society.
California's Legal Efforts Impacting Free Press Rights
This book is an ethnographic, First Amendment critique of the state's privacy and anti-harassment laws. It provides the reader with a firsthand look at whether paparazzi comply with the laws and how these restrictions have impacted the celebrity photography industry.
In a society of strangers, there develops what can be called crimes of mobility -- forms of criminality rare in traditional societies: bigamy, the confidence game, and blackmail, for example. What they have in common is a kind of fraudulent role-playing, which the new society makes possible. This book explores the social and legal consequences of ......
In a society of strangers, there develops what can be called crimes of mobility -- forms of criminality rare in traditional societies: bigamy, the confidence game, and blackmail, for example. What they have in common is a kind of fraudulent role-playing, which the new society makes possible.
Privacy, Mass Surveillance, and the Struggle to Reform the NSA
America's mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration's own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: ......