Ebook319 pages8 hours
Confidential Information Sources: Public and Private
Rating: 0 out of 5 stars
()
About this ebook
This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and purchase from reliable vendors. Carroll also examines troubling issues of ethics, accuracy, and privacy in our age of electronic information transfer.
- Discusses the way the nation collects, stores, and uses personal information
- Addresses the ethical questions about how personal data should be used
- Highlights the changes in information collection brought about by computers
Author
John M. Carroll
John M. Carroll is Professor of Computer Science, Education, and Psychology, and Director of the Center for Human-Computer Interaction, at Virginia Tech. He has written more than 250 technical papers, more than 25 conference plenary addresses, and 12 books. He serves on 10 editorial boards for journals and handbooks, has won the Rigo Career Achievement Award from ACM, received the Silver Core Award from IFIP, and is a member of the CHI Academy.
Read more from John M. Carroll
Usability Engineering: Scenario-Based Development of Human-Computer Interaction Rating: 4 out of 5 stars4/5Computer Security Rating: 0 out of 5 stars0 ratings
Related to Confidential Information Sources
Related ebooks
Identity Theft and Fraud: Evaluating and Managing Risk Rating: 0 out of 5 stars0 ratingsYour Right To Know: How to Use the Law to Get Government Secrets Rating: 0 out of 5 stars0 ratingsNaked in Cyberspace: How to Find Personal Information Online Rating: 4 out of 5 stars4/5Your Right To Privacy: Minimize Your Digital Footprint Rating: 0 out of 5 stars0 ratingsDon't Pay for a Promise!: A Survivor's Guide to Swindles and Deceptive Practices Rating: 0 out of 5 stars0 ratingsUnderstanding the Function and Responsibilities of ICE Rating: 0 out of 5 stars0 ratingsThe Target Defendant Rating: 0 out of 5 stars0 ratingsKnockout Punch for the Identity Thief -7 Secrets to Online Security for Stay at Home Moms On the Go Rating: 5 out of 5 stars5/5App Gangster Rating: 0 out of 5 stars0 ratingsThe Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity Rating: 0 out of 5 stars0 ratingsHousing Desegregation and Federal Policy Rating: 0 out of 5 stars0 ratingsWas Frankenstein Really Uncle Sam? Vol Ix: Notes on the State of the Declaration of Independence Rating: 0 out of 5 stars0 ratingsRights and Contracts; What YOU Need to Know About Copyright, Rights, ISBNs, and Contracts Rating: 5 out of 5 stars5/5Real Estate Escapes: True tales of getting out of contracts, leases, prosecutions and legal liability Rating: 0 out of 5 stars0 ratingsHow to Make Crime Pay: Holmes Will Get You Home Rating: 0 out of 5 stars0 ratingsHow to Legally Steal With Lawsuits!: Or the ABCs of Suitability Rating: 0 out of 5 stars0 ratingsMemoirs of a Fraudster: Confessions Rating: 0 out of 5 stars0 ratingsFamily Child Care Legal and Insurance Guide: How to Protect Yourself from the Risks of Running a Business Rating: 0 out of 5 stars0 ratingsImprisonment: Based On Truth Rating: 0 out of 5 stars0 ratingsHow To Set Up a Legal Defense Fund for False Imprisonment or Wrongful Workplace Termination [Article] Rating: 0 out of 5 stars0 ratingsReady Set Bail Rating: 0 out of 5 stars0 ratingsThe Contractor’S Home Purchase Guide Rating: 0 out of 5 stars0 ratingsHow To Learn Entrepreneurship From A Retired Drug Dealer Rating: 0 out of 5 stars0 ratingsDepartment of Student Loans, Kidnap & Ransom Rating: 0 out of 5 stars0 ratingsCity Officials Legal Handbook: 2019 Edition Rating: 0 out of 5 stars0 ratingsBasic Income and Sovereign Money: The Alternative to Economic Crisis and Austerity Policy Rating: 0 out of 5 stars0 ratingsHow to Build Credit If You Have No Credit Rating: 0 out of 5 stars0 ratingsConstitution of the State of Florida Rating: 0 out of 5 stars0 ratingsTaxation and Representation? Rating: 0 out of 5 stars0 ratingsDeath Grip: Loosening the Law's Stranglehold over Economic Liberty Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Rating: 0 out of 5 stars0 ratingsThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5
Reviews for Confidential Information Sources
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Confidential Information Sources - John M. Carroll
Enjoying the preview?
Page 1 of 1