skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Privacy rights in the Digital Age Preview this item
ClosePreview this item
Checking...

Privacy rights in the Digital Age

Author: Jane E Kirtley; Michael Shally-Jensen
Publisher: Amenia, NY : Grey House Publishing, [2019] ©2019
Edition/Format:   Print book : English : Second editionView all editions and formats
Summary:
Discusses the practical, political, psychological, and philosophical challenges of technological advances have changed the landscape of traditional notions of privacy.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Encyclopedias
Document Type: Book
All Authors / Contributors: Jane E Kirtley; Michael Shally-Jensen
ISBN: 9781642650778 1642650773
OCLC Number: 1048934378
Description: xxxiv, 754 pages : illustrations ; 29 cm
Contents: Publisher's Note --
Contributors --
Editor's Introduction --
Cross-Cultural Perspectives on Privacy --
Abortion --
Administrative searches --
Airport security systems --
Amazon --
American Civil Liberties Union (ACLU) --
Anonymity and anonymizers --
Anti-Forensics --
APEC Cross Border Privacy Rules System --
Apple, Inc --
Apps --
Assange, Julian --
Automated teller machines (ATMs) --
Background checks --
Bartnicki et ano v. Vopper, et al., 532 U.S. 514 (2001) --
Beliefs, privacy of --
Big data --
Bioethics --
Biometric Center of Excellence --
Biometric Optical Surveillance System --
Biometrics --
Blockchain technologies --
Body, privacy of the --
Border Security, Immigration Reform, and Privacy --
Bots --
Boundless Informant --
Brain-computer interfacing (BCI) --
Brandeis, Louis Dembitz --
Caller ID --
Cantrell v. Forest City Publishing Company, 419 U.S. 245 (1974) --
Cellphones --
Center for Democracy and Technology (CDT) --
Central Security Service --
Children's Online Privacy Protection Act, 15 U.S.C. 6501-6508 --
Children's right to privacy --
City of Ontario, Cal. v. Quon, 506 U.S. 746 (2010) --
City of Sherman v. Otis Henry, 928 S.W.2d 464 (1996) --
Cloud computing --
Computer Fraud and Abuse Act (CFAA) --
Computer harvesting --
Computers and privacy --
Confidential informants --
Confidential Information Protection and Statistical Efficiency Act of 2002 --
Consent --
Constitutional law --
Consumer privacy --
Cookies --
Cox Broadcasting Corporation v. Cohn, 420 U.S. 469 (1975) --
Credit and debit cards --
Credit reporting agencies (CRAs) --
Criminal justice (criminal procedure) --
Cruzan v. Director, Missouri Department of Health, 497 U.S. 261 (1990) --
Customer proprietary network information (CPNI) --
The Cyber Intelligence Sharing and Protection Act (CISPA) H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress) --
Cybersecurity --
Dark web --
Data Breach Notification Laws --
Data breaches --
Data brokers --
Data harvesting --
Data protection regimes --
Data science --
Debt collection --
Defence and Security Media Advisory Committee (DSMA Committee) --
Descartes, Rene --
DNA databases --
Do-not-track legislation --
Douglas, William Orville --
Doxing --
Driver's Privacy Protection Act of 1994 (DDPA), 18 U.S.C. 2271-2725 --
Drones --
Drug and alcohol testing --
Economic arguments for privacy rights --
Education Data Exchange Network (EDEN) --
Educational setting, privacy in an --
Electoral interference and privacy --
Electronic Communications Privacy Act (ECPA), 18 U.S.C. 2510 et seq --
Electronic Frontier Foundation --
Electronic Privacy Information Center (EPIC) --
Electronic surveillance --
Email --
Employment eligibility verification systems --
End-of-life care --
The Enlightenment --
Espionage Act --
Facebook --
Facial recognition technology --
Fair Credit Reporting Act --
Fair information practice principles --
Family Educational Rights and Privacy Act --
Federal Communications Commission --
Federal Communications Commission v. AT&T Inc., 562 U.S. 397 (2011) --
Federal Trade Commission --
Financial information, privacy rights in --
First Amendment to the U.S. Constitution --
Florida Star v. B.J.F., 491 U.S. 524 (1989) --
Foreign Intelligence Surveillance Act of 1978 --
Foreign Intelligence Surveillance Court --
Fourth Amendment to the U.S. Constitution --
Freedom of Information Act --
Genome sequencing --
General Data Protection Regulation --
Global positioning system (GPS) tracking --
Godkin, Edwin Lawrence (1831-1902) --
Gonzaga University v. Doe, 536 U.S. 273 (2002) --
Google --
Government Communications Headquarters (GCHQ) --
Gramm-Leach-Bliley Act --
Greenwald, Glenn (1967-) --
Griswold v. State of Connecticut 381 U.S. 479 (1965) --
Hacking, computer --
Harassment --
Health care information --
Health Insurance Portability and Accountability Act --
HIV testing --
Home, privacy of the --
Homeland Security, U.S. Department of --
Homeless people, right to privacy of --
Hustler Magazine v. Falwell, 485 U.S. 46 (1988) --
Identity theft --
In re iPhone Application Litigation, 844 F.Supp.2d 1040 (E.D. Cal. 2012) --
Information Awareness Office (IAO) --
Informative asymmetries --
Instagram --
Integrated Automated Fingerprint Identification System (IAFIS) --
Intellectual property --
International Center for Information Ethics (ICIE) --
Internet cafes --
Internet Service Providers and privacy --
Interrogations --
Invasion of privacy --
Journalism and the protection of sources --
Katz v. United States, 389 U.S. 347 (1967) --
Kyllo v. United States, 533 U.S. 27 (2001) --
Law enforcement --
Lawrence v. Texas, 539 U.S. 558 (2003) --
Legal evolution of privacy rights in the United States --
License plate reader system --
Locke, John (1632-1704) --
Magic Lantern --
Malware --
Manning, Chelsea Elizabeth --
Mapp v. Ohio, 367 U.S. 495 (1961) --
Marketing --
Mass media --
Medical confidentiality, privacy right to --
Metadata --
Meyer v. Nebraska, 262 U.S. 390 (1923) --
Migrants and refugees in the United States, privacy rights of --
Mobile devices --
Model legislation on privacy --
National Archives and Records Aministration v. Favish, 541 U.S. 157 (2004) --
National Instant Criminal Background Check System (NICS) --
National Security Agency (NSA) --
New Jersey v. TLO, 469 U.S. 325 (1985) --
New York Times Co. v. Sullivan, Abernathy, et. al., 376 U.S. 254 (1964) --
New leaks --
Next Generation Identification (NGI) --
Obscenity --
Official Secrets Act --
Olmstead v. United States, 277 U.S. 438 (1928) --
Online privacy and protection --
Open data movement --
Open source --
Patient Safety and Quality Improvement Act of 2005 (PSQIA) --
Personal autonomy --
Philosophical basis of privacy --
The Plame Affair --
Poitras, Laura --
Pornography --
PRISM --
Privacy Act of 1974 --
Privacy and Civil Liberties Oversight Board (PCLOB) --
Privacy laws, federal --
Privacy laws, state --
Privacy Protection Act, 42 U.S.C. section aa et seq --Privacy settings --
Privacy torts --
Privacy sphere --
Prosser, William Lloyd (1898-1972) --
Protect America Act of 2007 --
Public morality --
Public records --
Publicity, right of --
Reno v. Condon, 528 U.S. 141 (2000) --
Repository for Individuals of Special Concern (RICS) --
Right to be forgotten --
Right to be let alone --
Riley v. California, 134 S. Ct. 2473 (2014) --
Safe Harbor --
Scientific and medical data sharing --
Search engines --
Search warrants --
Security flaws, computers --
September 11 --
Sexting --
Sexual orientation --
Smart moves --
Smartphones --
Snapchat --
Snooper's Charter --
Snowden, Edward Joseph --
Social media --
Social media profiling --
Social networking technologies --
Social Security numbers --
(SSNs) --
Sorrell v. IMS Health, 131 S. Ct. 2653 (2011) --
Spam --
Spyware --
Stalking --
Stanley v. Georgia, 394 U.S. 557 (1969) --
Stop and frisk policy --
Stored Communications Act (SCA) --
Subpoenas --
Supreme Court of the United States --
Surveillance cameras --
Telephones --
Tempora --
Terrorism and privacy --
Text messaging ---
Theoretical basis for privacy --
Time, Inc. v. Hill, 385 U.S. 374 (1967) --
Twitter --
U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) --
U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) --
Unenumerated constitutional right, privacy as an --
United States v. Jones, 132 S. Ct. 945 (2012) --
USA FREEDOM Act, Pub. L No. 114-23 --
USA PATRIOT Act, Pub. L. No. 107-52 --
Video Privacy Protection Act (18 USCA section 2710) --
Voting and privacy rights --
Warren, Earl --
Washington v. Glucksberg, 521 U.S. 702 (1997) --
"We are watching you" Act --
Wearable technology --
Whistleblowers --
WikiLeaks --
Wikipedia --
Wilson v. Layne, 526 U.S. 603 (1999) --
Wiretapping --
Workplace, privacy in the --
Zacchini v. Scripps-Howard Broadcasting Co., 433 U.S. 562 (1977).
Responsibility: editors, Jane E. Kirtley, Michael Shally-Jensen.

Abstract:

Discusses the practical, political, psychological, and philosphical challenges we face as technological advances have changed the landscape of traditional notions of privacy.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1048934378<\/a>> # Privacy rights in the Digital Age<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1048934378<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/privacy_right_of<\/a>> ; # Privacy, Right of<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/electronic_surveillance_united_states<\/a>> ; # Electronic surveillance--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/electronic_government_information_access_control_united_states<\/a>> ; # Electronic government information--Access control--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/classification\/KF1263<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Place\/united_states<\/a>> ; # United States.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/computer_security_united_states<\/a>> ; # Computer security--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/electronic_surveillance<\/a>> ; # Electronic surveillance<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/data_protection<\/a>> ; # Data protection<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/electronic_government_information_access_control<\/a>> ; # Electronic government information--Access control<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/data_protection_united_states<\/a>> ; # Data protection--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/privacy_right_of_united_states<\/a>> ; # Privacy, Right of--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/342.730858\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"Second edition.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Obscenity -- Official Secrets Act -- Olmstead v. United States, 277 U.S. 438 (1928) -- Online privacy and protection -- Open data movement -- Open source -- Patient Safety and Quality Improvement Act of 2005 (PSQIA) -- Personal autonomy -- Philosophical basis of privacy -- The Plame Affair -- Poitras, Laura -- Pornography -- PRISM -- Privacy Act of 1974 -- Privacy and Civil Liberties Oversight Board (PCLOB) -- Privacy laws, federal -- Privacy laws, state -- Privacy Protection Act, 42 U.S.C. section aa et seq --Privacy settings -- Privacy torts -- Privacy sphere -- Prosser, William Lloyd (1898-1972) -- Protect America Act of 2007 -- Public morality -- Public records -- Publicity, right of -- Reno v. Condon, 528 U.S. 141 (2000) -- Repository for Individuals of Special Concern (RICS) -- Right to be forgotten -- Right to be let alone -- Riley v. California, 134 S. Ct. 2473 (2014) -- Safe Harbor -- Scientific and medical data sharing -- Search engines -- Search warrants -- Security flaws, computers -- September 11 -- Sexting -- Sexual orientation -- Smart moves -- Smartphones -- Snapchat -- Snooper\'s Charter -- Snowden, Edward Joseph -- Social media -- Social media profiling -- Social networking technologies -- Social Security numbers -- (SSNs) -- Sorrell v. IMS Health, 131 S. Ct. 2653 (2011) -- Spam -- Spyware -- Stalking -- Stanley v. Georgia, 394 U.S. 557 (1969) -- Stop and frisk policy -- Stored Communications Act (SCA) -- Subpoenas -- Supreme Court of the United States -- Surveillance cameras -- Telephones -- Tempora -- Terrorism and privacy -- Text messaging --- Theoretical basis for privacy -- Time, Inc. v. Hill, 385 U.S. 374 (1967) -- Twitter --<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Publisher\'s Note -- Contributors -- Editor\'s Introduction -- Cross-Cultural Perspectives on Privacy -- Abortion -- Administrative searches -- Airport security systems -- Amazon -- American Civil Liberties Union (ACLU) -- Anonymity and anonymizers -- Anti-Forensics -- APEC Cross Border Privacy Rules System -- Apple, Inc -- Apps -- Assange, Julian -- Automated teller machines (ATMs) -- Background checks -- Bartnicki et ano v. Vopper, et al., 532 U.S. 514 (2001) -- Beliefs, privacy of -- Big data -- Bioethics -- Biometric Center of Excellence -- Biometric Optical Surveillance System -- Biometrics -- Blockchain technologies -- Body, privacy of the -- Border Security, Immigration Reform, and Privacy -- Bots -- Boundless Informant -- Brain-computer interfacing (BCI) -- Brandeis, Louis Dembitz -- Caller ID -- Cantrell v. Forest City Publishing Company, 419 U.S. 245 (1974) -- Cellphones -- Center for Democracy and Technology (CDT) -- Central Security Service -- Children\'s Online Privacy Protection Act, 15 U.S.C. 6501-6508 -- Children\'s right to privacy -- City of Ontario, Cal. v. Quon, 506 U.S. 746 (2010) -- City of Sherman v. Otis Henry, 928 S.W.2d 464 (1996) -- Cloud computing -- Computer Fraud and Abuse Act (CFAA) -- Computer harvesting -- Computers and privacy -- Confidential informants -- Confidential Information Protection and Statistical Efficiency Act of 2002 -- Consent -- Constitutional law -- Consumer privacy -- Cookies -- Cox Broadcasting Corporation v. Cohn, 420 U.S. 469 (1975) -- Credit and debit cards -- Credit reporting agencies (CRAs) -- Criminal justice (criminal procedure) -- Cruzan v. Director, Missouri Department of Health, 497 U.S. 261 (1990) --<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Customer proprietary network information (CPNI) -- The Cyber Intelligence Sharing and Protection Act (CISPA) H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress) -- Cybersecurity -- Dark web -- Data Breach Notification Laws -- Data breaches -- Data brokers -- Data harvesting -- Data protection regimes -- Data science -- Debt collection -- Defence and Security Media Advisory Committee (DSMA Committee) -- Descartes, Rene -- DNA databases -- Do-not-track legislation -- Douglas, William Orville -- Doxing -- Driver\'s Privacy Protection Act of 1994 (DDPA), 18 U.S.C. 2271-2725 -- Drones -- Drug and alcohol testing -- Economic arguments for privacy rights -- Education Data Exchange Network (EDEN) -- Educational setting, privacy in an -- Electoral interference and privacy -- Electronic Communications Privacy Act (ECPA), 18 U.S.C. 2510 et seq -- Electronic Frontier Foundation -- Electronic Privacy Information Center (EPIC) -- Electronic surveillance -- Email -- Employment eligibility verification systems -- End-of-life care -- The Enlightenment -- Espionage Act -- Facebook -- Facial recognition technology -- Fair Credit Reporting Act -- Fair information practice principles -- Family Educational Rights and Privacy Act -- Federal Communications Commission -- Federal Communications Commission v. AT&T Inc., 562 U.S. 397 (2011) -- Federal Trade Commission -- Financial information, privacy rights in -- First Amendment to the U.S. Constitution -- Florida Star v. B.J.F., 491 U.S. 524 (1989) -- Foreign Intelligence Surveillance Act of 1978 -- Foreign Intelligence Surveillance Court -- Fourth Amendment to the U.S. Constitution -- Freedom of Information Act --<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Genome sequencing -- General Data Protection Regulation -- Global positioning system (GPS) tracking -- Godkin, Edwin Lawrence (1831-1902) -- Gonzaga University v. Doe, 536 U.S. 273 (2002) -- Google -- Government Communications Headquarters (GCHQ) -- Gramm-Leach-Bliley Act -- Greenwald, Glenn (1967-) -- Griswold v. State of Connecticut 381 U.S. 479 (1965) -- Hacking, computer -- Harassment -- Health care information -- Health Insurance Portability and Accountability Act -- HIV testing -- Home, privacy of the -- Homeland Security, U.S. Department of -- Homeless people, right to privacy of -- Hustler Magazine v. Falwell, 485 U.S. 46 (1988) -- Identity theft -- In re iPhone Application Litigation, 844 F.Supp.2d 1040 (E.D. Cal. 2012) -- Information Awareness Office (IAO) -- Informative asymmetries -- Instagram -- Integrated Automated Fingerprint Identification System (IAFIS) -- Intellectual property -- International Center for Information Ethics (ICIE) -- Internet cafes -- Internet Service Providers and privacy -- Interrogations -- Invasion of privacy -- Journalism and the protection of sources -- Katz v. United States, 389 U.S. 347 (1967) -- Kyllo v. United States, 533 U.S. 27 (2001) -- Law enforcement -- Lawrence v. Texas, 539 U.S. 558 (2003) -- Legal evolution of privacy rights in the United States -- License plate reader system -- Locke, John (1632-1704) -- Magic Lantern -- Malware -- Manning, Chelsea Elizabeth -- Mapp v. Ohio, 367 U.S. 495 (1961) -- Marketing -- Mass media -- Medical confidentiality, privacy right to -- Metadata -- Meyer v. Nebraska, 262 U.S. 390 (1923) -- Migrants and refugees in the United States, privacy rights of -- Mobile devices -- Model legislation on privacy -- National Archives and Records Aministration v. Favish, 541 U.S. 157 (2004) -- National Instant Criminal Background Check System (NICS) -- National Security Agency (NSA) -- New Jersey v. TLO, 469 U.S. 325 (1985) -- New York Times Co. v. Sullivan, Abernathy, et. al., 376 U.S. 254 (1964) -- New leaks -- Next Generation Identification (NGI) --<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) -- U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) -- Unenumerated constitutional right, privacy as an -- United States v. Jones, 132 S. Ct. 945 (2012) -- USA FREEDOM Act, Pub. L No. 114-23 -- USA PATRIOT Act, Pub. L. No. 107-52 -- Video Privacy Protection Act (18 USCA section 2710) -- Voting and privacy rights -- Warren, Earl -- Washington v. Glucksberg, 521 U.S. 702 (1997) -- \"We are watching you\" Act -- Wearable technology -- Whistleblowers -- WikiLeaks -- Wikipedia -- Wilson v. Layne, 526 U.S. 603 (1999) -- Wiretapping -- Workplace, privacy in the -- Zacchini v. Scripps-Howard Broadcasting Co., 433 U.S. 562 (1977).<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Discusses the practical, political, psychological, and philosophical challenges of technological advances have changed the landscape of traditional notions of privacy.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:editor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Person\/kirtley_jane_e<\/a>> ; # Jane E. Kirtley<\/span>\n\u00A0\u00A0\u00A0\nschema:editor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Person\/shally_jensen_michael<\/a>> ; # Michael Shally-Jensen<\/span>\n\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/2853347870<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Encyclopedias<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy rights in the Digital Age<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1048934378<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781642650778<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1048934378<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/342.730858\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Person\/kirtley_jane_e<\/a>> # Jane E. Kirtley<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Kirtley<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jane E.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Jane E. Kirtley<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Person\/shally_jensen_michael<\/a>> # Michael Shally-Jensen<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Shally-Jensen<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Michael<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Michael Shally-Jensen<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Place\/united_states<\/a>> # United States.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/computer_security_united_states<\/a>> # Computer security--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/data_protection<\/a>> # Data protection<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data protection<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/data_protection_united_states<\/a>> # Data protection--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data protection--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/electronic_government_information_access_control<\/a>> # Electronic government information--Access control<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Electronic government information--Access control<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/electronic_government_information_access_control_united_states<\/a>> # Electronic government information--Access control--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Electronic government information--Access control--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/electronic_surveillance<\/a>> # Electronic surveillance<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Electronic surveillance<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/electronic_surveillance_united_states<\/a>> # Electronic surveillance--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Electronic surveillance--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/privacy_right_of<\/a>> # Privacy, Right of<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy, Right of<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2853347870#Topic\/privacy_right_of_united_states<\/a>> # Privacy, Right of--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy, Right of--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/classification\/KF1263<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nyu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781642650778<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1642650773<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781642650778<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n