Protecting Individual Privacy in the Struggle Against Terrorists : A Framework for Program Assessment.
Protecting Individual Privacy in the Struggle Against Terrorists : A Framework for Program Assessment.
- 1st ed.
- 1 online resource (376 pages)
Intro -- Preface -- Acknowledgment of Reviewers -- Contents -- Executive Summary -- 1 Scoping the Issue: Terrorism, Privacy, and Technology -- 2 A Framework for Evaluating Information-Based Programs to Fight Terrorism or Serve Other Important National Goals -- 3 Conclusions and Recommendations -- Appendix A: Acronyms -- Appendix B: Terrorism and Terrorists -- Appendix C: Information and Information Technology -- Appendix D: The Life Cycle of Technology, Systems, and Programs -- Appendix E: Hypothetical and Illustrative Applications of the Framework to Various Scenarios -- Appendix F: Privacy-Related Law and Regulation: The State of the Law and Outstanding Issues -- Appendix G: The Jurisprudence of Privacy Law and the Need for Independent Oversight -- Appendix H: Data Mining and Information Fusion -- Appendix I: Illustrative Government Data Mining Programs and Activity -- Appendix J: The Total/Terrorist Information Awareness Program -- Appendix K: Behavioral-Surveillance Techniques and Technologies -- Appendix L: The Science and Technology of Privacy Protection -- Appendix M: Public Opinion Data on U.S. Attitudes Toward Government Counterterrorism Efforts -- Appendix N: Committee and Staff Biographical Information -- Appendix O: Meeting Participants and Other Contributors.
9780309124898
Terrorism--United States--Prevention.
Surveillance detection--United States.
Privacy, Right of--United States.
Technological innovations--Law and legislation--United States.
Electronic books.
HV6432.P76 2008
363.325/163
Intro -- Preface -- Acknowledgment of Reviewers -- Contents -- Executive Summary -- 1 Scoping the Issue: Terrorism, Privacy, and Technology -- 2 A Framework for Evaluating Information-Based Programs to Fight Terrorism or Serve Other Important National Goals -- 3 Conclusions and Recommendations -- Appendix A: Acronyms -- Appendix B: Terrorism and Terrorists -- Appendix C: Information and Information Technology -- Appendix D: The Life Cycle of Technology, Systems, and Programs -- Appendix E: Hypothetical and Illustrative Applications of the Framework to Various Scenarios -- Appendix F: Privacy-Related Law and Regulation: The State of the Law and Outstanding Issues -- Appendix G: The Jurisprudence of Privacy Law and the Need for Independent Oversight -- Appendix H: Data Mining and Information Fusion -- Appendix I: Illustrative Government Data Mining Programs and Activity -- Appendix J: The Total/Terrorist Information Awareness Program -- Appendix K: Behavioral-Surveillance Techniques and Technologies -- Appendix L: The Science and Technology of Privacy Protection -- Appendix M: Public Opinion Data on U.S. Attitudes Toward Government Counterterrorism Efforts -- Appendix N: Committee and Staff Biographical Information -- Appendix O: Meeting Participants and Other Contributors.
9780309124898
Terrorism--United States--Prevention.
Surveillance detection--United States.
Privacy, Right of--United States.
Technological innovations--Law and legislation--United States.
Electronic books.
HV6432.P76 2008
363.325/163