ORPP logo
Image from Google Jackets

Protecting Individual Privacy in the Struggle Against Terrorists : A Framework for Program Assessment.

Material type: TextTextPublisher: Washington, D.C. : National Academies Press, 2008Copyright date: ©2008Edition: 1st edDescription: 1 online resource (376 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780309124898
Subject(s): Genre/Form: Additional physical formats: Print version:: Protecting Individual Privacy in the Struggle Against TerroristsDDC classification:
  • 363.325/163
LOC classification:
  • HV6432.P76 2008
Online resources:
Contents:
Intro -- Preface -- Acknowledgment of Reviewers -- Contents -- Executive Summary -- 1 Scoping the Issue: Terrorism, Privacy, and Technology -- 2 A Framework for Evaluating Information-Based Programs to Fight Terrorism or Serve Other Important National Goals -- 3 Conclusions and Recommendations -- Appendix A: Acronyms -- Appendix B: Terrorism and Terrorists -- Appendix C: Information and Information Technology -- Appendix D: The Life Cycle of Technology, Systems, and Programs -- Appendix E: Hypothetical and Illustrative Applications of the Framework to Various Scenarios -- Appendix F: Privacy-Related Law and Regulation: The State of the Law and Outstanding Issues -- Appendix G: The Jurisprudence of Privacy Law and the Need for Independent Oversight -- Appendix H: Data Mining and Information Fusion -- Appendix I: Illustrative Government Data Mining Programs and Activity -- Appendix J: The Total/Terrorist Information Awareness Program -- Appendix K: Behavioral-Surveillance Techniques and Technologies -- Appendix L: The Science and Technology of Privacy Protection -- Appendix M: Public Opinion Data on U.S. Attitudes Toward Government Counterterrorism Efforts -- Appendix N: Committee and Staff Biographical Information -- Appendix O: Meeting Participants and Other Contributors.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Preface -- Acknowledgment of Reviewers -- Contents -- Executive Summary -- 1 Scoping the Issue: Terrorism, Privacy, and Technology -- 2 A Framework for Evaluating Information-Based Programs to Fight Terrorism or Serve Other Important National Goals -- 3 Conclusions and Recommendations -- Appendix A: Acronyms -- Appendix B: Terrorism and Terrorists -- Appendix C: Information and Information Technology -- Appendix D: The Life Cycle of Technology, Systems, and Programs -- Appendix E: Hypothetical and Illustrative Applications of the Framework to Various Scenarios -- Appendix F: Privacy-Related Law and Regulation: The State of the Law and Outstanding Issues -- Appendix G: The Jurisprudence of Privacy Law and the Need for Independent Oversight -- Appendix H: Data Mining and Information Fusion -- Appendix I: Illustrative Government Data Mining Programs and Activity -- Appendix J: The Total/Terrorist Information Awareness Program -- Appendix K: Behavioral-Surveillance Techniques and Technologies -- Appendix L: The Science and Technology of Privacy Protection -- Appendix M: Public Opinion Data on U.S. Attitudes Toward Government Counterterrorism Efforts -- Appendix N: Committee and Staff Biographical Information -- Appendix O: Meeting Participants and Other Contributors.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.