rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781851096305

Invasion of Privacy : A Reference Handbook

by Keenan, Kevin M.
  • ISBN13:

    9781851096305

  • ISBN10:

    1851096302

  • Format: Hardcover
  • Copyright: 2005-09-15
  • Publisher: Abc-Clio Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $64.00 Save up to $20.80
  • Rent Book $43.20
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Invasion of Privacy : A Reference Handbook [ISBN: 9781851096305] for the semester, quarter, and short term or search our site for other textbooks by Keenan, Kevin M.. Renting a textbook can save you up to 90% from the cost of buying.

Summary

An authoritative analysis of one of the most revered rights of peoples and cultures around the world-privacy.

Table of Contents

Preface, xi
Acknowledgments, xvii
1 Background and History, 1(40)
What Is the Legal Right to Privacy?,
1(3)
Origins of the Right to Privacy,
4(4)
Privacy in Modern Times,
8(8)
Formal Recognition of the Right to Privacy in the United States and Development of the Right Worldwide,
16(5)
The Value of Privacy,
21(9)
Natural and Psychological Benefits,
22(2)
Creative Benefits,
24(1)
Protective Benefits,
24(3)
Social Benefits,
27(3)
Democratic Benefits,
30(1)
Arguments against the Value of Privacy,
30(6)
Privacy Is Too Amorphous,
31(1)
Privacy Laws' Infringement of Other Rights,
32(1)
Privacy Restrictions Cost Too Much,
33(1)
Privacy May Serve to Protect the Status Quo of Male Dominance,
34(2)
References,
36(5)
2 Surveillance and Databasing around the World, 41(48)
High-Tech Surveillance,
41(5)
Echelon and the Interception of International Communications,
41(3)
Government Wiretapping,
44(2)
Identification and Tracking Technologies,
46(11)
High-Tech National ID Cards,
48(2)
Swipe Cards and Black Boxes,
50(1)
GPS,
51(2)
Radio Frequency Identity Tags,
53(4)
Cameras,
57(10)
Traffic Cameras,
61(1)
Facial-Recognition Cameras,
62(1)
Thermal-Imaging Cameras (Infrared),
63(2)
X-Ray and Through-the-Wall Technologies,
65(2)
Collecting Personal Data,
67(18)
DNA Databases,
67(4)
Carnivore,
71(1)
"Total Information": Government Data Merging for Efficiency, Prediction,...and Control?,
72(3)
"Audience Targeting": Merging for Marketing, Convenience, and Electioneering,
75(3)
Airline Travel and Databasing,
78(1)
No-Fly Lists,
79(3)
Public-Private Cooperation in Privacy Invasion: The Specter of a Surveillance-Industrial Complex,
82(3)
References,
85(4)
3 Privacy in Post-9/11, Post-Columbine, Gene-Mapped America, 89(82)
Privacy in the Wake of September 11,
90(26)
September 11, 2001,
90(1)
The U.S. Response to September 11,
91(8)
Public Resistance to the Erosion of Privacy,
99(2)
Rationales for Post-9/11 Reductions in Privacy,
101(1)
The Privacy Wall between Criminal and Intelligence Investigations,
102(5)
Privacy at Fault for the September 11 Attacks?,
107(3)
Missed Opportunities,
110(4)
Other Culprits,
114(2)
The Privacy Rights of Young People,
116(12)
Youth Privacy in the Era of Criminalized Youth and Fortified Schools,
116(5)
Searches by Police and School Officials,
121(3)
Drug Tests at School,
124(3)
Security and Surveillance in School and at Home,
127(1)
Bodily and Sexual Privacy in a Genetic Age,
128(30)
The Privacy Rights of Sexual Minorities,
129(5)
Contraception,
134(3)
Abortion,
137(3)
Maternal-Fetal Relations,
140(2)
Our Genetic Makeup, Our Essence, Our Privacy,
142(2)
DNA Identification,
144(4)
DNA Dragnets,
148(5)
Genes and Public Health,
153(5)
Privacy Solutions,
158(5)
Using Technology to Protect Privacy,
159(2)
Using or Changing the Law to Better Protect Privacy,
161(2)
References,
163(8)
4 Chronology, 171(10)
5 Biographical Sketches, 181(14)
John Ashcroft (1942—),
181(1)
William Baird (1933—),
182(1)
Roger Baldwin (1884-1981),
182(1)
Robert Bork (1927—),
183(1)
Louis Brandeis (1856-1941),
183(1)
James Buckley (1923—),
184(1)
Morris L. Ernst (1888-1976),
184(1)
John Marshall Harlan (1899-1971),
185(1)
J. Edgar Hoover (1895-1972),
186(1)
John Locke (1632-1704),
186(1)
Catharine MacKinnon (1946—),
187(1)
George Orwell (1903-1950),
187(1)
Anthony Romero (1966—),
188(1)
Eleanor Roosevelt (1884-1962),
189(1)
Jeffrey Rosen (1964—),
189(1)
Marc Rottenberg (1963—),
190(1)
Margaret Sanger (1879-1966),
190(1)
Barry Steinhardt (1953—),
191(1)
Alan Westin (1929—),
191(1)
Byron White (1917-2002),
192(1)
John Wilkes (1725-1797),
192(1)
References,
193(2)
6 Important Privacy Documents, 195(20)
7 Directory of Organizations and Government Agencies, 215(10)
Organizations,
215(5)
Government Agencies,
220(5)
8 Movies, Books, and Internet News Sources, 225(16)
Movies,
225(5)
Books,
230(7)
Internet News Sources,
237(2)
References,
239(2)
Index, 241(18)
About the Author, 259

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program