Ebook319 pages8 hours
Confidential Information Sources: Public and Private
Rating: 0 out of 5 stars
()
About this ebook
This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and purchase from reliable vendors. Carroll also examines troubling issues of ethics, accuracy, and privacy in our age of electronic information transfer.
- Discusses the way the nation collects, stores, and uses personal information
- Addresses the ethical questions about how personal data should be used
- Highlights the changes in information collection brought about by computers
Author
John M. Carroll
John M. Carroll is Professor of Computer Science, Education, and Psychology, and Director of the Center for Human-Computer Interaction, at Virginia Tech. He has written more than 250 technical papers, more than 25 conference plenary addresses, and 12 books. He serves on 10 editorial boards for journals and handbooks, has won the Rigo Career Achievement Award from ACM, received the Silver Core Award from IFIP, and is a member of the CHI Academy.
Read more from John M. Carroll
Usability Engineering: Scenario-Based Development of Human-Computer Interaction Rating: 4 out of 5 stars4/5Computer Security Rating: 0 out of 5 stars0 ratings
Related to Confidential Information Sources
Related ebooks
Your Right To Know: How to Use the Law to Get Government Secrets Rating: 0 out of 5 stars0 ratingsIdentity Theft and Fraud: Evaluating and Managing Risk Rating: 0 out of 5 stars0 ratingsDepartment of Student Loans, Kidnap & Ransom Rating: 0 out of 5 stars0 ratingsHow to Legally Steal With Lawsuits!: Or the ABCs of Suitability Rating: 0 out of 5 stars0 ratingsWhere Credit is Due: Bringing Equity to Credit and Housing After the Market Meltdown Rating: 0 out of 5 stars0 ratingsForeclosure Survival Guide, The: Keep Your House or Walk Away With Money in Your Pocket Rating: 0 out of 5 stars0 ratingsWas Frankenstein Really Uncle Sam? Vol Ix: Notes on the State of the Declaration of Independence Rating: 0 out of 5 stars0 ratingsAll About Identity Theft Rating: 0 out of 5 stars0 ratingsUnderstanding the Function and Responsibilities of ICE Rating: 0 out of 5 stars0 ratingsCity Officials Legal Handbook: 2019 Edition Rating: 0 out of 5 stars0 ratingsBorrowed Money Rating: 0 out of 5 stars0 ratingsDon't Pay for a Promise!: A Survivor's Guide to Swindles and Deceptive Practices Rating: 0 out of 5 stars0 ratingsThe Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity Rating: 0 out of 5 stars0 ratingsOur Virtuous Republic: The Forgotten Clause in the American Social Contract Rating: 0 out of 5 stars0 ratingsThe U.S. Constitution and Related Documents Rating: 0 out of 5 stars0 ratingsUnderstanding Your Right to Freedom from Searches Rating: 0 out of 5 stars0 ratingsThe Crypto Debit Card: A Checking Account that Pays 9% Interest: MFI Series1, #170 Rating: 0 out of 5 stars0 ratingsThe Layman's Guide to Consumer Bankruptcy Law in Michigan Rating: 0 out of 5 stars0 ratingsInheritance Law And The Evolving Family Rating: 0 out of 5 stars0 ratingsReal Estate Escapes: True tales of getting out of contracts, leases, prosecutions and legal liability Rating: 0 out of 5 stars0 ratingsThe Declaration of Independence: A Play for Many Readers Rating: 0 out of 5 stars0 ratingsPersonal Liability of Public Officials in Virginia’s Local Governments and Its Impact on Their Willingness to Serve Rating: 0 out of 5 stars0 ratingsUnderstanding the Jurisdiction Battle Between the States and the Federal Government Rating: 0 out of 5 stars0 ratingsBasic Income and Sovereign Money: The Alternative to Economic Crisis and Austerity Policy Rating: 0 out of 5 stars0 ratingsAmerican Kleptocracy: How the U.S. Created the World's Greatest Money Laundering Scheme in History Rating: 4 out of 5 stars4/5How to Complain: The Essential Consumer Guide to Getting Refunds, Redress and Results! Rating: 0 out of 5 stars0 ratingsThe Law (in Plain English) for Small Business (Sixth Edition) Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5
Reviews for Confidential Information Sources
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Confidential Information Sources - John M. Carroll
Enjoying the preview?
Page 1 of 1