Protect Your Privacy: Survival Skills for the Information Age. paper 480 p.
Cady, Glee Harrah, McGregor, Pat. 著
内容
目次
Introduction. I. SETTING THE STAGE: PRIVACY IN THE INFORMATION AGE.1. Protecting Your Privacy in the 21st Century. How Perceptions of PrivacyHave Changed Since the Rise of the Internet. Why Do Other People Care AboutYour Privacy? Why Are People Collecting This Information Anyway? Profiling.We Need Healthy Skepticism and Informed Consent. 2. What Is Privacy in aDigital World? The Right to Be Left Alone... Information About Us Is NotAcquired by Others. The Protection Given to Information. The Ability toProtect Ourselves from Being Judged Out of Context. The Right Not to BeSurprised. Finally, It Comes Down to Control. Fair Information PracticesProtect Your Rights. Understanding What Privacy Means to You. II. BECOMINGAWARE: PRIVACY AND THE INDIVIDUAL. 3. Who Wants to Know What about Whom?We All Want to Know about Other People. Celebrities Can Educate, Too. Freedomof or Freedom from the Press. Learning to Like New Things. It's All AboutTrust. 4. Threats to Your Children's Privacy. Are Your Kids in Danger onthe Net? What Are the Risks? Your Tone Sets the Stage. What More Can You Do?Discover Your Resources and Options. What Help do Parents Have in ProtectingTheir Kids? What Companies Must Do. Now You Have All the Tools. 5. OnlineDisclosures and That Barn Door. Defensive Internet Travels. InformationYou Share on Purpose. E-mail and Chat Can be Information Collectors, Too.Love Online: A Special Case for Privacy. Urban Legends and "Hi, I'm fromNigeria and..." Safety Tips for Giving Out information About Yourself.Information You Might Not Know You Are Sharing. Polly Wants a Cookie. ThisSite Brought to You By... Tracking Your Invisibly. What If I Don't Understandthe Privacy Policies? Watching You at Home and Work. So, You Always Wanted toLive in a Spy Novel. What If the Police and Courts Get Involved? 6.Broadband: Always on, Always Connected, Always Exposed. Once Connected,Always Connected. What is Broadband? Broadband: Connecting the World. The BigQuestion Is Not "What Do I Have to Hide?"- It's "Who's in Control?" SomeQuestions to Ask Your (Potential) Broadband Provider. Keep Your Eyes Open;Keep Your Guard Up. 7. Privacy over the Airwaves. Understanding CellularTechnology. The Wireless Spectrum. There's Gold in Those Profiles. Technologyto the Rescue? 8. Do the Walls Have Ears? Other Devices That Can AffectPrivacy. We Can Pick You Out in a Crowd of Strangers. By Air, by Land, orby Sea-GPS Isn't Just for Planes and Fish Anymore. No More Waiting inLine-We'll Bill You. Just Wave Your Fob at the Register. Check Yourself Out.Stop or We'll Shoot (Your Picture, That Is). Glitches Mean Tickets TossedOut. What Happens When You Add It All Up? III. TAKING CONTROL. 9. Takingan Inventory of Your Personal Information. Where Are Youuuu? Whooo AreYouuu? Finding You at Home. What's the Point? Where Am I From? Uncle Sam (andHis Younger Cousins) Lists You! Our Conclusions? 10. The Least You Should Doto Guard Your Privacy When Online. Keeping Your Data Private. Some KeyConcepts. Files. Getting Rid of Files and Data. Summary for the Most PrivacyConscious. Online Session Privacy. Protecting Against Malicious Attacks.E-mail Privacy. What About Macs? Putting It All Together. Some GeneralSecurity Resources. 11. How to Secure Your Internet Transactions. Can YouLet Your Fingers Do the Shopping? Look For and Read the Privacy and SecurityPolicies. Seal Organizations. Practice Safe Shopping. Don't Let Anyone StealYour Good Name. Safe Surfing. Using E-mail and Chatting Online Safely.Remember: You Can Stay in Control. 12. What Can I Do If My Privacy IsCompromised? Telephone and Similar Listings. Toss the Spam. But Don't Tossthe Privacy Notices. Buying Items that Don't Exist and Similar Mistakes. I AmNot Me: Identity Theft. Invasions Can Be Harmful to Your Health. IV. WHATYOU NEED TO KNOW ABOUT LEGAL PROTECTIONS FOR PRIVACY. 13. Privacy and theLaw: 2001. What Is the Law? Is Privacy a Right? What U.S. Federal LawApplies. What Is the Law within the Several States? If We've Got All TheseLaws, Why Would We Need More?(The Regulatory Climate: 2001). Laws Around theWorld. What About Laws that Don't Exist Yet? Be Your Own Advocate. Privacyand Security Legislation in Congress. Do I Need to Go to the Capitol Myself?Other Influences on Legislation. 14. Canaries in the Coal Mine. The ACLU:The Granddaddy of Canaries. CDT: Washington-based Songs. CPSR: Folk Songs ofFreedom. EFF: Western Songs. EPIC: Strong Songs. Privacy International: Songsfrom the Old Country. Privacy.org: A Duet. Global Internet Liberty Campaign:Songs Around the World. Global Internet Policy Initiative: InternationalSongs of Liberty. Junkbusters: Catchy Jingles. Privacy Rights Clearinghouse:Teaching Songs. Singing Along Together. 15. Self-Regulation and Privacy.What Self-Regulation Is and How It Works. Privacy Policies. Today'sSelf-Regulatory Leaders. Seal Organizations. Wrapping It Up and Sealing Itfor You. V. PRIVACY AND THE FUTURE. 16. Internet Voting: Don't Try This atHome Yet... How We Do It Now. Should We Change? Where We Might Go. HowMight We Get There? Toward Improved Elections for All. 17. Where Are WeGoing? Your Behavior Can Make a Big Difference. Corporate and MarketingPractices. Technology Helps and Hurts. Legislation and Regulation. Taking theSingle Step. Eternal Vigilance Is the Price of Liberty. 18. Can You ReallyBe Anonymous? Work Qualifications Need Records, Too. Can You Avoid A PaperTrail? The Urge to Make Lists. Does the Pattern Add Up Correctly? The Urge toNot Be Noticed. VI. APPENDIXES. Appendix A: Glossary. Appendix B:Expanded Privacy Checklist. Personally Identifiable Information. Notice.Choice. Access. Security. What Am I Revealing about Myself? Appendix C: Listof Privacy Bills in the States in 2001. Appendix D: Our Co-Conspirators.Appendix E: Privacy-Related Web sites. Personal Web Sites. OrganizationalSites. Technology Sites. Index.