Catalog Search Results
2) Crosstalk
Author
Formats
Description
Science fiction icon Connie Willis brilliantly mixes a speculative plot, the wit of Nora Ephron, and the comedic flair of P. G. Wodehouse in Crosstalk-- a genre-bending novel that pushes social media, Smartphone technology, and twenty-four-hour availability to hilarious and chilling extremes as one young woman abruptly finds herself with way more connectivity than she ever desired. In the not-too-distant future, a simple outpatient procedure to increase...
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Description
Be prepared: Value of HIPAA risk assessment. A comprehensive security risk assessment is an important and necessary strategy for health care organizations to identify gaps in their privacy and security environments. While risk assessments alone do not directly mitigate data breaches, risk exposure decreases significantly when an organization knows exactly where protected health information (PHI) resides and how it is handled. We will cover reasons...
Author
Description
Who is watching you… and why? Written for middle-grade and older readers, Eyes and Spies looks at the way information and data about us is collected and used by individuals, governments, companies, and organizations. Each chapter covers one aspect of the subject, from data collection to computer surveillance to personal privacy. Arguments for both increased security and increased privacy are offered, which encourages readers to think critically...
Author
Description
The death of a former British head of intelligence triggers an all-out resistance movement led by the Bell Ringers against an out-of-control, security-obsessed state.
After her husband, a former head of intelligence, is killed, Kate Lockhart inherits his dangerous secrets, all having to do with the Orwellian reality this near-future England has become, and she soon finds herself on the run from the security-obsessed state.
Description
Examining its subject through the lens of Fourth Amendment rights, this text focuses on technological advances that now gather personal data on an unprecedented scale, whether by monitoring social media, tracking cell phones, or using thermal imaging to watch people's movement. It also examines the possible impact of the widespread gathering of such data by law enforcement and security agencies and by private corporations such as Google.
Author
Formats
Description
Never before in human history have people been able to share so much about themselves so quickly. Neither have they ever been so exposed to forces that want to take advantage of that capability. This course will open eyes to the surprising extent of that exposure and will discuss options for keeping personal data as safe as possible, help to determine personal privacy profile, and understand the current U.S. laws and proposed state laws regarding...
Author
Description
Casting Light on the Dark Web: A Guide for Safe Exploration is an easy-to-read and comprehensive guide to understanding how the dark web works and why you should be using it! Readers will be led on a tour of this elusive technology, from how to download the platform for personal or public use to how it can best be used for finding information. This guide busts myths and informs readers while remaining entertaining. Casting Light on the Dark Web is...
Description
"Many have argued that at least since the 9/11 terrorist attacks, the United States has become a surveillance state. Others have countered that the government has the public's best interest in mind. But what is the truth? How does a government and its law enforcement prioritize the safety of its citizens without infringing on their privacy? The diverse viewpoints in this volume address the questions of whether the United States is operating under...
Author
Description
"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by...
Author
Formats
Description
On a remote, dusty road forty miles outside of Austin, Texas, FBI agent Joe Grant and a confidential informant are killed in a deadly shootout. Left to pick up the pieces is Mary Grant, Joe's young wife and mother of their two daughters. The official report places blame for the deaths on Joe's shoulders ... but the story just doesn't add up and Mary has too many troubling questions that need answers.
Author
Description
"The true story of a revolutionary-but-doomed Silicon Valley start-up, by a Pulitzer Prize-winning reporter. Their idea was simple. Four NYU undergrads wanted to build a social network that would allow users to control their personal data, instead of surrendering it to big businesses like Facebook. They called it "Diaspora." In days, they raised $200,000, and reporters, venture capitalists, and the digital community's most legendary figures were soon...
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request