Search
Type
Format
Sort
Location

Chertoff, Michael

Summary: "Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information...

Format: text

Publisher / Publication Date: Atlantic Monthly Press 2018

Sorry, no copies available

Place a hold to request this item.

Lennex, Amy

Summary: Discusses the importance of personal data management, including securing social security cards, understanding the Family Educational Rights and Privacy Act, and creating strong passwords.

Format: text

Publisher / Publication Date: Cherry Lake Publishing 2018

Copies Available at Woodmere

1 available in Juvenile Nonfiction, Call number: J 005.8 LEN

Mitnick, Kevin D. (Kevin David)

Summary: "Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he...

Format: text

Publisher / Publication Date: Little, Brown and Company 2017

Sorry, no copies available

Place a hold to request this item.

Smith, Jeremy N.

Summary: When she arrived at MIT in the 1990s, Alien wanted to study aerospace engineering, but she was soon drawn to the school's venerable tradition of high-risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead, two others were on trial, and two had been institutionalized. And Alien's adventures were only just beginning. After a stint at the storied, secretive...

Format: sound recording-nonmusical

Publisher / Publication Date: 2019

Copies Available at Woodmere

2 available in Compact Disc Audio Book, Call number: CD 921 ALIEN SMI

Currie, Stephen

Summary: Discusses issues regarding the right to privacy and the impact of the internet, including information on identity theft, cyberbullying, secret data collection, hacking, and security breaches.

Format: text

Publisher / Publication Date: ReferencePoint Press 2014

Copies Available at Woodmere

1 available in Juvenile Nonfiction, Call number: J 004.67 CUR

Summary: Computers hold our treasured photographs, private emails, and all of our personal information. This data is precious, and cybercriminals want it. From the sleuths who decoded the world's most advanced cyber weapon to scientists who believe they can store a password in your unconscious brain, NOVA investigates how a new global geek squad is harnessing cutting-edge science, all to stay one step...

Format: moving image

Publisher / Publication Date: 2014

Copies Available at Woodmere

1 available in E-TV DVDs, Call number: DVD E-TV RIS

Summary: Computer bugs are no mere prank. A disruption of global communications networks by today's sophisticated worms and viruses is costing companies billions and can do lasting damage to the world's economic health. This NewsHour program begins by defining these binary invaders and then examines the escalating security challenges of keeping networks free of infection. Members of the Computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: Most people learn traditional standards of behavior and respect for others by the time they are teenagers-but many don't realize that those rules are just as valid in cyberspace. This program helps students take the high road on the information superhighway and avoid the temptations of the fast lane, pointing the way toward an ethically sound Internet presence and lifestyle. Guidelines for the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Most companies spend more money on coffee than they do on security, says Ralph Echemendia, lead instructor at Chicago's Hacker Academy. As this program demonstrates, such flagrant corporate carelessness is a gold mine for digital criminals. With disturbing insight into the hacker underworld, the program shows how crippling database invasions can be launched from almost any computer, grabbing...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2008

View online at AVOD

Summary: How do advertisers get your telephone number or e-mail address? Do they have your social security number too? This timely video addresses your concerns about keeping personal information private. We hear from experts following this important issue and learn what steps we can take to safeguard our privacy. You will find out just how much information is already legally available to people who...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: What is spam? How do spammers get their unwanted offers into your in-box? And how can the flow of electronic junk mail be stopped? Filmed in news report style, this program explains how shady advertisers send spam and then presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation with real teeth, and greater...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: In this Fred Friendly Seminar moderated by Harvard Law School's Arthur Miller, panelists such as U.S. Supreme Court Justice Stephen Breyer; Nadine Strossen, president of the ACLU; Jamie Gorelick, of the U.S. Department of Justice; Professor Stephen Carter, of Yale Law School; and others examine the fine balance between the power of the government and the rights of the individual in a fictional...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: Bouncing between Canada and the U.S., Sc@mmed exposes an urgent problem of global proportions: phishing, the illegal gathering of others' personal information online in order to steal all their money-and even their identities. Through the cautionary stories of two people who got burned, this program shows how cybercriminals use scam spam and spoof Web sites to trick people into willingly giving...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Civil liberties advocates have warned against government surveillance for decades. Today, corporations use technology to monitor employees and customers. Is big business the new big brother? This program addresses the growing debate about our "surveillance society" and its erosion of privacy and anonymity-which could become casualties of the war for market supremacy as well as the war on...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Judee Sibbitt's company, AmberSAFE, uses GPS bracelets to track the whereabouts of children and seniors. In this program, Sue Abu-Hakima, co-founder and CEO of a wireless emergency notification system for schools and government agencies called Amika Mobile Corporation, and Peter Martin, a crisis management and risk assessment expert whose firm, AFI International Group, provides security for...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

Summary: Americans have grown used to being watched at ATMs, in lobbies, and even while driving. Now they are being tracked by satellite if they rent a car or make a cellular phone call and timed if they use an electronic pass to pay a toll. In this program, ABC News anchor Ted Koppel and correspondent John Donvan survey the increasing intrusion-real or perceived-of technology into Americans' privacy....

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Schwartau, Winn.

Format: text

Publisher / Publication Date: Thunder's Mouth Press 2000

Sorry, no copies available

Place a hold to request this item.

Summary: Few think of it in these terms, but logging onto the Web can be like letting strangers walk into your living room. Hosted by Dan Rather, this program explores the very real dangers of the Internet through a number of eye-opening examples, including coverage of Operation Blue Ridge Thunder, a task force that patrols the Internet for pedophiles; the tragic story of Amy Boyer, a 21-year-old woman...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: Compact and portable, digitized information is an attractive alternative to bulky books, analog media, and emulsion-based photographs-but can it stand the test of time? In this program, Stewart Brand, co-inventor of the TCP/IP Internet protocol, and others in the know assess the rapid proliferation of digitization; confront the alarming risk of massive data loss through technology obsolescence,...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: The consequences of lax Internet security are severe! Use Securing the Web to awaken your students to the very real dangers posed by online security threats. In this video, a couldn't-care-less computer user is transported into his PC where he learns firsthand about phishing and pharming, spyware and adware, viruses and Trojans, and denial-of-service attacks and zombie networks. Weapons in the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

Summary: In today's information-starved and fear-driven society, surveillance technology seems to be deployed almost everywhere-and a surveillance mind-set is just as ubiquitous. This program introduces students to the concept of a "surveillance society" and shows how cutting-edge tools are being developed to identify, monitor, and track both people and objects. Viewers are empowered to explore the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2010

View online at AVOD

Summary: The Internet offers vast possibilities for learning, making a living, and having fun-but it can also destroy reputations, empty bank accounts, and ruin lives. This program cautions students about potential hazards to their computers-not to mention their careers, finances, and futures-that exist online. Highlighting the importance of setting up a firewall and keeping one's operating system...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Digital technology plays an increasingly significant-and, many believe, unethical and intrusive-role in the lives of Americans. This CNBC program examines the rapidly growing data-mining and surveillance industries and brings examples of dubious and hurtful information-sharing to light. Case studies include a man whose cell phone records were acquired by his former employer, a woman whose...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2008

View online at AVOD