An analysis of the people and groups who have emerged to challenge the increasingly intrusive ways personal information is captured, processed, and disseminated. Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web...
Related Subjects
Business & Management Civil Rights Civil Rights & Liberties Computer Science Computers Computers & Technology Constitutional Law Culture Digital Law Law Network Security Networking Networking & Cloud Computing Political Science Politics & Government Politics & Social Sciences Science & Math Social Sciences Specific Topics Technology Textbooks