Hi cal_maritime !!!
I was searching for not .com pages with information related to the
main subject on your project and I just found many of them. I will
list them with their URL and brief comments.
The Center for Democracy and Technology (CDT):
"The Center for Democracy and Technology works to promote democratic
values and constitutional liberties in the digital age. With expertise
in law, technology, and policy, CDT seeks practical solutions to
enhance free expression and privacy in global communications
technologies. CDT is dedicated to building consensus among all parties
interested in the future of the Internet and other new communications
media."
http://www.cdt.org/
This site offers a "Guide to online privacy" where you can find a lot
of information related to your project:
http://www.cdt.org/privacy/guide/start/
------------------------------------------------------
Yale-New Haven Teachers Institute:
"Invasion of Privacy--Has Cyber-Technology Made Privacy a Thing of the
Past?" by Valarie Arrington-Steele:
"This curriculum unit addresses the issues of online
personal-information privacy as it relates to privacy policies, online
profiling using cookies, and the position of privacy advocate
organizations versus the U.S. government's position on self-regulation
of e-commerce."
http://www.yale.edu/ynhti/curriculum/units/2000/3/00.03.01.x.html
"Electronic Surveillance: Unlawful Invasion of Privacy or Justifiable
Law Enforcement" by Willie J. Elder Jr:
"This unit is designed to make students aware of their rights as
citizens of the United States. The unit will place particular emphasis
on the rights to privacy and the fourth amendment as applied to cases
of electronic eavesdropping. Also, the unit will list cases which can
be used to view the role the Supreme Court has played in developing
procedures for the protection of rights to privacy. These cases will
give a full account of specific situations wherein issues relating to
privacy were taken up by the courts."
http://www.yale.edu/ynhti/curriculum/units/1983/4/83.04.07.x.html
---------------------------------------------------------
Privacy International (PI):
"Privacy International (PI) is a human rights group formed in 1990 as
a watchdog on surveillance by governments and corporations. PI is
based in London, England, and has an office in Washington, D.C. PI has
conducted campaigns throughout the world on issues ranging from
wiretapping and national security, to ID cards, video surveillance,
data matching, police information systems, medical privacy, and
freedom of information and expression."
http://www.privacyinternational.org/index.html
From this site the following pages will be useful:
"Technologies of Privacy":
"The report found a number of technologies were causing new concerns
about the protection of privacy. Many of these technologies were being
adopted and implemented outside legal protections."
http://www.privacyinternational.org/survey/technologies.html
"Privacy and Human Rights":
"Each year, Privacy International and the Electronic Privacy
Information Center review the state of privacy in over fifty countries
around the world. The survey examines a wide range of privacy issues
including, data protection, telephone tapping, genetic databases, ID
systems and freedom of information laws."
http://www.privacyinternational.org/survey/index.html
For example you can download this report:
http://www.privacyinternational.org/survey/phr2001/phr2001.pdf
Or search for the 2002 report:
"The 2002 edition of Privacy and Human Rights examines the impact of
government proposals after September 11, 2001 on privacy and civil
liberties. The report documents many new anti-terrorism and security
measures and identifies key trends including increased communications
surveillance, weakening of data protection regimes, and increased
profiling and identification of individuals.
The 2002 Privacy and Human Rights report finds that laws to protect
privacy in the workplace are gaining more support and that efforts to
pass new data protection laws are continuing in Eastern Europe, Asia
and Latin America. Important debates are also taking place around the
world concerning the future of new technologies for identification and
surveillance."
(Note: to download the reports go to the bottom of the page)
http://www.privacyinternational.org/survey/phr2002/
These reports are very nice pieces to work on.
------------------------------------------------------------------
Global Information Assurance Certification (GIAC):
"SANS Institute Training and the Global Information Assurance
Certification (GIAC) Programs are designed to serve the people who are
or will be responsible for managing and protecting important
information systems and networks. GIAC is an outgrowth of the SANS
Global Incident Analysis Center."
http://www.giac.org
From this site you can read the following article by Rich Gresham:
"Web Bugs: An invasion of Privacy or Better Business Assistant?"
To download:
http://www.giac.org/practical/Richard_Gresham_GSEC.rtf
Web version by Google:
http://216.239.33.100/search?q=cache:cd0FnVCnOs4C:www.giac.org/practical/Richard_Gresham_GSEC.rtf+%22invasion+of+privacy%22+technology&hl=en&ie=UTF-8
--------------------------------------------------------------
From the SANS Institute:
http://www.sans.org
"Carnivore Diagnostic Tool or Invasion of privacy?" by Mario
Figueroa:
"The FBI has developed a tool called Carnivore to "covertly search for
e-mails and other computer messages from criminal suspects" 13. They
describe this tool as a diagnostic tool, but privacy groups call it an
invasion of privacy. Many privacy groups are challenging the legality
and use of such a tool."
http://www.sans.org/rr/legal/carnivore.php
"Cookies Exploitations and Invasion of Privacy" by Randall S.
Miller:
"Cookies are data snippets used by client/server applications to help
identify and track web users. Over the years, cookies have garnered a
bad reputation as being able to scan PC hard drives, take over systems
by stealing valuable information such as passwords, and passing
viruses. These myths are untrue, but cookies have been used to collect
information on browsing habits, browser specifications, system
information, and web-based spending and viewing habits."
http://www.sans.org/rr/privacy/invasion.php
----------------------------------------------------------
The American Civil Liberties Union (ACLU):
"The American Civil Liberties Union (ACLU) is our nation's guardian of
liberty, working daily in courts, legislatures and communities to
defend and preserve the individual rights and liberties guaranteed to
all people in this country by the Constitution and laws of the United
States."
At this site you can see the "Privacy" page, that stats:
"...The United States is at risk of turning into a full-fledged
surveillance society...". At this page you have links to several pages
about Privacy Invasion topics, for example "Bigger Monster, Weaker
Chains: The Growth of an American Surveillance Society", to visit the
"Privacy" page:
http://www.aclu.org/Privacy/PrivacyMain.cfm
--------------------------------------------------------------
Electronic Privacy Information Center (EPIC):
"EPIC is a public interest research center in Washington, D.C. It was
established in 1994 to focus public attention on emerging civil
liberties issues and to protect privacy, the First Amendment, and
constitutional values."
http://www.epic.org/
At this site you find a lot of links to articles and/or sites related
to Microsoft and Privacy Invasion:
"Sign Out of Passport!"
http://www.epic.org/privacy/consumer/microsoft/
At this page read the section "FAQ on Microsoft Passport and Windows
XP" below the list of links.
-------------------------------------------------------
At the Arizona State University site I found the following article:
"A Cookie For Your Privacy: An Exploration of the Impact of Internet
Cookies on Privacy" by Nanda Grow:
http://www.public.asu.edu/~ngrow/cse200/index.html
--------------------------------------------------------
"Alliance for Nonprofit Management" website:
http://www.allianceonline.org/
See the following page, "What is our risk for an invasion of privacy
claim?":
http://www.allianceonline.org/faqs/rmfaq20.html
----------------------------------------------------------
At Term-Papers.us I found the following short essay:
"Invasion of Privacy"
http://www.term-papers.us/ts/hc/svn114.shtml
-----------------------------------------------------------
At the Ball State University site I found the following article by
Christy Dollar:
"Invasion of Privacy Issues Increases as Technology Grows"
http://nova.bsuvc.bsu.edu/~cjdollar/essay.html
------------------------------------------------------------
At the Open Directory site you will find useful this category to find
more sources:
"Human Rights and Liberties: Privacy "
http://dmoz.org/Society/Issues/Human_Rights_and_Liberties/Privacy/
-------------------------------------------------------------
If you want some advice about books see at Amazon:
"How to Be Invisible: A Step-By-Step Guide to Protecting Your Assets,
Your Identity, and Your Life"
by J. J. Luna:
http://www.amazon.com/exec/obidos/tg/detail/-/0312252501/ref=pd_bxgy_text_1/002-8752342-1844853?v=glance&s=books&st=*
"Invasion of Privacy : How to Protect Yourself in the Digital Age"
by Michael Hyatt, Michael S. Hyatt:
http://www.amazon.com/exec/obidos/tg/detail/-/0895262878/002-8752342-1844853?vi=glance
---------------------------------------------------------------
You will find more advice about books, prints and e-books at "Personal
Infomediary Center":
http://personalinfomediary.com/
"Privacy Books" page:
http://personalinfomediary.com/PrivacyBooksAtBN.htm
----------------------------------------------------------------
At Shepherd College website I found the following short essay:
"Should we sacrifice privacy?"
http://webpages.shepherd.edu/MDUNN01/Essay%208_revision.htm
----------------------------------------------------------------
Search strategy:
"invasion of privacy" technology
"invasion of privacy" technology essay
I hope this helps you in your project, but if you find this answer
insufficient and/or need a clarification or have trouble with a link
please post a request for an answer clarification.
Thank you.
Best Regards.
livioflores-ga |