Computers, Information Technology, the Internet, Ethics, Society and Human Values Philip Pecorino, Ph.D. Queensborough Community College, CUNY Chapter 6 Privacy |
|||
Resources WEBLIOGRAPHY Demonstration of snooping by computer The CDT Privacy Demonstration Page. ACLU Surveillance Campaign How bad can it get? Almost there? http://www.aclu.org/pizza/ Towards a Theory of Privacy in the Information Age – James H. Moor Private Life in Cyberspace by John Perry Barlow
"The Right to Privacy" (1890)
Samuel Warren and Louis Brandeis, Surveillance, privacy, anonymity, identity, borders, secrecy works by Gary T. Marx How Much Privacy Do You Have Online? 2020 University of Dayton’s online J.D. degree Cybersecurity Resources for 2020 provides websites, books and apps for readers to stay up to date on current cybersecurity risks and tactics to combat attacks. Top Cybersecurity blogs, organizations, and conferences E-discovery, Privacy, and Cybersecurity Law Concord Law School explains the discovery phase of the ligation and the importance of privacy and security during this process Digital Media Laws for Small Businesses PANOPTICON Net Decency & Sexuality links on Backflip The Virtual Panopticon. Describes a virtual panopticon constructed in the Internet-standard Virtual Reality Mark-up Language (VRML) and contains some background information on Jeremy Bentham's original vision. Escaping the Panopticon: Protecting Data Privacy in the Information Age. A student paper from Georgia State University College of Law. Surveillance and the Electronic Panopticon. from the Massachusetts Institute of Technology. Information Technology and Public Sector Corruption. Corruption is a major problem for many parts of the public sector. One dominant vision of corruption restraint - the panoptic vision - sees information technology (IT) as a key enabler of management control. An Examination of Surveillance Technology and the Implications for Privacy and Related Issues. This paper takes a critical look at the often murky intersection of law, technology and information. The role of information systems personnel in the provision for privacy and data protection in organisations and within information systems by Richard Howley, Simon Rogerson, N Ben Fairweather, Lawrence Pratchett Abstract - Full Paper The ETHICOMP Journal Vol. 1 No. 1, published: 2004-02-02 BIBLIOGRAPHIES The Right to Privacy. Ellen Alderman and Caroline Kennedy Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet, Smith, Robert Ellis,
"Little Brother Is
Watching You," Miriam Schulman (Cyberethics, 155-161)
Societies and Organizations www.Backgroundcheck.org\
http://www.backgroundcheck.org/the-legislation-of-privacy-new-laws-that-will-change-your-life/.
covers the
major legislation that is either in effect or stalled in committees.
Some laws are more well-known while some are hidden like California's
Social Media Act that protects employees or applicants from employers
requiring them to divulge their social media information. Privacy International (PI) is a human rights group formed in 1990 as a watchdog on surveillance and privacy invasions by governments and corporations F.A.C.T.Net Inc. (a non-profit Internet digest, news service, library, dialogue center, and archive dedicated to the promotion and defense of international free thought, free speech, and privacy rights) News on privacy Wired - Privacy Matters The Electronic Privacy Information Center The Center for Democracy and Technology The Information Commissioner of the United Kingdom The Office of the Federal Privacy Commissioner, Australia Federal Communications Commision FCC Electronic Frontier Foundation 's Blue Ribbon Campaign Center for Democracy and Technology CDT Children's Access to the Web
Guide from Privacy.net to stopping ISPs and advertisers from gathering information on children. |
|||
Web Surfer's Caveat: These are class notes, intended to comment on readings and amplify class discussion. They should be read as such. They are not intended for publication or general distribution. ppecorino@qcc.cuny.edu @copyright 2006 Philip A. Pecorino Last updated 8-2006 Return to Table of Contents |
|||