Search (2 results, page 1 of 1)

  • × subject_ss:"Freedom of information"
  1. Information ethics : privacy, property, and power (2005) 0.05
    0.05485584 = product of:
      0.10971168 = sum of:
        0.035240363 = weight(_text_:social in 2392) [ClassicSimilarity], result of:
          0.035240363 = score(doc=2392,freq=6.0), product of:
            0.1847249 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046325076 = queryNorm
            0.19077215 = fieldWeight in 2392, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.07447132 = sum of:
          0.052280862 = weight(_text_:aspects in 2392) [ClassicSimilarity], result of:
            0.052280862 = score(doc=2392,freq=8.0), product of:
              0.20938325 = queryWeight, product of:
                4.5198684 = idf(docFreq=1308, maxDocs=44218)
                0.046325076 = queryNorm
              0.2496898 = fieldWeight in 2392, product of:
                2.828427 = tf(freq=8.0), with freq of:
                  8.0 = termFreq=8.0
                4.5198684 = idf(docFreq=1308, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
          0.022190453 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
            0.022190453 = score(doc=2392,freq=4.0), product of:
              0.16222252 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046325076 = queryNorm
              0.13679022 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
      0.5 = coord(2/4)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    LCSH
    Communication / Moral and ethical aspects
    Information technology / Social aspects
    Subject
    Communication / Moral and ethical aspects
    Information technology / Social aspects
  2. Morozov, E.: ¬The net delusion : the dark side of internet freedom (2011) 0.04
    0.042979553 = product of:
      0.08595911 = sum of:
        0.056384586 = weight(_text_:social in 4952) [ClassicSimilarity], result of:
          0.056384586 = score(doc=4952,freq=6.0), product of:
            0.1847249 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046325076 = queryNorm
            0.30523545 = fieldWeight in 4952, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.03125 = fieldNorm(doc=4952)
        0.029574523 = product of:
          0.059149045 = sum of:
            0.059149045 = weight(_text_:aspects in 4952) [ClassicSimilarity], result of:
              0.059149045 = score(doc=4952,freq=4.0), product of:
                0.20938325 = queryWeight, product of:
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.046325076 = queryNorm
                0.28249177 = fieldWeight in 4952, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.03125 = fieldNorm(doc=4952)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    "The revolution will be Twittered!" declared journalist Andrew Sullivan after protests erupted in Iran. But as journalist and social commentator Evgeny Morozov argues in "The Net Delusion," the Internet is a tool that both revolutionaries and authoritarian governments can use. For all of the talk in the West about the power of the Internet to democratize societies, regimes in Iran and China are as stable and repressive as ever. Social media sites have been used there to entrench dictators and threaten dissidents, making it harder--not easier--to promote democracy. In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder-not easier-to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the reality is that "digital diplomacy" requires just as much oversight and consideration as any other kind of diplomacy. Marshalling a compelling set of case studies, " The Net Delusion" shows why the cyber-utopian stance that the Internet is inherently liberating is wrong, and how ambitious and seemingly noble initiatives like the promotion of "Internet freedom" are misguided and, on occasion, harmful.
    LCSH
    Internet / Political aspects
    Subject
    Internet / Political aspects