Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_573649200
    Format: XXIII, 352 S. , graph. Darst. , 23 cm
    ISBN: 0309124883 , 9780309124881
    Note: Includes bibliographical references
    Additional Edition: ISBN 9780309124898
    Language: English
    Keywords: USA ; Terrorismus ; Bekämpfung ; Persönlichkeitsrecht ; Datenschutz ; Informationstechnik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_803096496
    Format: Online-Ressource (xxiii, 352 p) , ill
    Edition: Online-Ausg. [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    ISBN: 9780309124898
    Content: Intro -- Preface -- Acknowledgment of Reviewers -- Contents -- Executive Summary -- 1 Scoping the Issue: Terrorism, Privacy, and Technology -- 2 A Framework for Evaluating Information-Based Programs to Fight Terrorism or Serve Other Important National Goals -- 3 Conclusions and Recommendations -- Appendix A: Acronyms -- Appendix B: Terrorism and Terrorists -- Appendix C: Information and Information Technology -- Appendix D: The Life Cycle of Technology, Systems, and Programs -- Appendix E: Hypothetical and Illustrative Applications of the Framework to Various Scenarios -- Appendix F: Privacy-Related Law and Regulation: The State of the Law and Outstanding Issues -- Appendix G: The Jurisprudence of Privacy Law and the Need for Independent Oversight -- Appendix H: Data Mining and Information Fusion -- Appendix I: Illustrative Government Data Mining Programs and Activity -- Appendix J: The Total/Terrorist Information Awareness Program -- Appendix K: Behavioral-Surveillance Techniques and Technologies -- Appendix L: The Science and Technology of Privacy Protection -- Appendix M: Public Opinion Data on U.S. Attitudes Toward Government Counterterrorism Efforts -- Appendix N: Committee and Staff Biographical Information -- Appendix O: Meeting Participants and Other Contributors.
    Note: Includes bibliographical references , Use copy Restrictions unspecified star MiAaHDL , Scoping the issue: terrorism, privacy, and technologyA framework for evaluating information-based programs to fight terrorism or serve other important national goals -- Conclusions and recommendations -- Appendixes: A. Acronyms -- B. Terrorism and terrorists -- C. Information and information technology -- D. The life cycle of technology, systems, and programs -- E. Hypothetical and illustrative applications of the framework to various scenarios -- F. Privacy-related law and regulation: the state of the law and outstanding issues -- G. The jurisprudence of privacy law and the need for independent oversight -- H. Data mining and information fusion -- I. Illustrative government data mining programs and activity -- J. The total/terrorist information awareness program -- K. Behavioral-surveillance techniques and technologies -- L. The science and technology of privacy protection -- M. Public opinion data on U.S. attitudes toward government counterterrorism efforts -- N. Committee and staff biographical information -- Meeting participants and other contributors. , Electronic reproduction
    Additional Edition: ISBN 0309124891
    Additional Edition: ISBN 0309124883
    Additional Edition: ISBN 9780309124898
    Additional Edition: ISBN 9780309124881
    Additional Edition: Print version Protecting individual privacy in the struggle against terrorists
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780309124881?
Did you mean 9780300124798?
Did you mean 9780309124218?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages