skip to content
Cell phone privacy Preview this item
ClosePreview this item
Checking...

Cell phone privacy

Author: Heather C Hudak; Michel E Kabay
Publisher: Minneapolis, Minnesota : Core Library, an imprint of Abdo Publishing, [2020] ©2020
Series: Privacy in the digital age (Core Library (Firm))
Edition/Format:   Print book : Elementary and junior high school : EnglishView all editions and formats
Summary:
Most people today have cell phones. People rely on cell phones for communication. Cell phones also store a lot of personal data. Cell Phone Privacy explores how people can protect this data.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Juvenile works
Juvenile literature
Material Type: Elementary and junior high school
Document Type: Book
All Authors / Contributors: Heather C Hudak; Michel E Kabay
ISBN: 9781532118890 1532118899
OCLC Number: 1089562189
Target Audience: Ages 9-13.
Description: 48 pages : color illustrations ; 24 cm.
Contents: Stolen identity --
Handheld history --
Access to information --
Permission granted --
Security measures --
Fast facts --
Stop and think.
Series Title: Privacy in the digital age (Core Library (Firm))
Responsibility: by Heather C. Hudak ; content consultant, M.E. Kabay.

Abstract:

Most people today have cell phones. People rely on cell phones for communication. Cell phones also store a lot of personal data. Cell Phone Privacy explores how people can protect this data.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1089562189<\/a>> # Cell phone privacy<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1089562189<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/mnu<\/a>> ;\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Unknown \'gen\' value: ejh<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/information_policy<\/a>> ; # Information policy<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/juvenile_nonfiction_health_&_daily_living_safety<\/a>> ; # JUVENILE NONFICTION \/ Health & Daily Living \/ Safety<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Place\/united_states<\/a>> ; # United States.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/juvenile_nonfiction_computers_internet_&_social_media<\/a>> ; # JUVENILE NONFICTION \/ Computers \/ Internet & Social Media<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/wireless_communication_systems_security_measures<\/a>> ; # Wireless communication systems--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/identity_theft_prevention<\/a>> ; # Identity theft--Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/privacy<\/a>> ; # Privacy<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/privacy_right_of_united_states<\/a>> ; # Privacy, Right of--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/juvenile_nonfiction_technology_electricity_&_electronics<\/a>> ; # JUVENILE NONFICTION \/ Technology \/ Electricity & Electronics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/information_policy_united_states<\/a>> ; # Information policy--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/cell_phones_security_measures<\/a>> ; # Cell phones--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/privacy_right_of<\/a>> ; # Privacy, Right of<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/cell_phone_calls<\/a>> ; # Cell phone calls<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Person\/hudak_heather_c_1975<\/a>> ; # Heather C. Hudak<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contentRating<\/a> \"Ages 9-13.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Person\/kabay_michel_e<\/a>> ; # Michel E. Kabay<\/span>\n\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2020<\/span>\" ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2020<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Most people today have cell phones. People rely on cell phones for communication. Cell phones also store a lot of personal data. Cell Phone Privacy explores how people can protect this data.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Stolen identity -- Handheld history -- Access to information -- Permission granted -- Security measures -- Fast facts -- Stop and think.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/8964285747<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Juvenile works<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Series\/privacy_in_the_digital_age_core_library_firm<\/a>> ; # Privacy in the digital age (Core Library (Firm))<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Series\/privacy_in_the_digital_age<\/a>> ; # Privacy in the digital age<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cell phone privacy<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1089562189<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781532118890<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1089562189<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Person\/hudak_heather_c_1975<\/a>> # Heather C. Hudak<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1975<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Hudak<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Heather C.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Heather C. Hudak<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Person\/kabay_michel_e<\/a>> # Michel E. Kabay<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Kabay<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Michel E.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Michel E. Kabay<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Place\/united_states<\/a>> # United States.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Series\/privacy_in_the_digital_age<\/a>> # Privacy in the digital age<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1089562189<\/a>> ; # Cell phone privacy<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy in the digital age<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Series\/privacy_in_the_digital_age_core_library_firm<\/a>> # Privacy in the digital age (Core Library (Firm))<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1089562189<\/a>> ; # Cell phone privacy<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy in the digital age (Core Library (Firm))<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/cell_phone_calls<\/a>> # Cell phone calls<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cell phone calls<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/cell_phones_security_measures<\/a>> # Cell phones--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cell phones--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/identity_theft_prevention<\/a>> # Identity theft--Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Identity theft--Prevention<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/information_policy<\/a>> # Information policy<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information policy<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/information_policy_united_states<\/a>> # Information policy--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information policy--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/juvenile_nonfiction_computers_internet_&_social_media<\/a>> # JUVENILE NONFICTION \/ Computers \/ Internet & Social Media<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"JUVENILE NONFICTION \/ Computers \/ Internet & Social Media<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/juvenile_nonfiction_health_&_daily_living_safety<\/a>> # JUVENILE NONFICTION \/ Health & Daily Living \/ Safety<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"JUVENILE NONFICTION \/ Health & Daily Living \/ Safety<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/juvenile_nonfiction_technology_electricity_&_electronics<\/a>> # JUVENILE NONFICTION \/ Technology \/ Electricity & Electronics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"JUVENILE NONFICTION \/ Technology \/ Electricity & Electronics<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/privacy<\/a>> # Privacy<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/privacy_right_of<\/a>> # Privacy, Right of<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy, Right of<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/privacy_right_of_united_states<\/a>> # Privacy, Right of--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy, Right of--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964285747#Topic\/wireless_communication_systems_security_measures<\/a>> # Wireless communication systems--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Wireless communication systems--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/mnu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"mnu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781532118890<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1532118899<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781532118890<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n