Is It Safe to Talk,Yet? The Evolution of Electronic Privacy Law

Is It Safe to Talk,Yet? The Evolution of Electronic Privacy Law

John Thomas (Quinnipiac University School of Law, USA)
DOI: 10.4018/978-1-59904-804-8.ch002
OnDemand PDF Download:
$37.50

Abstract

This chapter traces the development in the United States of legal protections of the right to privacy. It begins with the common law “right to be let alone” in the early 1900s and proceeds through the enactment of the U.S. Patriot Act in 2001 and the National Security Administration’s warrantless wire tapping program revealed to the public in 2005. It concludes with a discussion of emerging electronic threats to the security of privacy of the public and concomitant challenges to lawmakers and law enforcers.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Ramesh Subramanian
Acknowledgment
Ramesh Subramanian
Chapter 1
A. Mishra
People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private... Sample PDF
Web Privacy: Issues, Legislations, and Technological Challenges
$37.50
Chapter 2
John Thomas
This chapter traces the development in the United States of legal protections of the right to privacy. It begins with the common law “right to be... Sample PDF
Is It Safe to Talk,Yet? The Evolution of Electronic Privacy Law
$37.50
Chapter 3
Sushma Mishra, Amita Goyal Chin
Given the recent monumental events including the September 11th attack on the World Trade Center and the Pentagon as well as the Enron and MCI... Sample PDF
Assessing the Impact of Governmental Regulations on the IT Industry: A Neo Institutional Theory Perspective
$37.50
Chapter 4
Bernd Carsten Stahl
Privacy is one of the central issues in the information society. New technologies pose new threats to privacy but they may also facilitate new ways... Sample PDF
The Impact of the UK Human Rights Act 1998 on Privacy Protection in the Workplace
$37.50
Chapter 5
Madhu V. Ahluwalia, Aryya Gangopadhyay
This chapter gives a synopsis of the techniques that exist in the area of privacy preserving data mining. Privacy preserving data mining is... Sample PDF
Privacy Preserving Data Mining: Taxonomy of Existing Techniques
$37.50
Chapter 6
Yue Liu
The increasing use of biometric technology is often accompanied by grandiose claims about its ability to enhance security and the debate.over the... Sample PDF
Rational Concerns about Biometric Technology: Security and Privacy
$37.50
Chapter 7
Roger Clarke
Many categories of e-business continue to under-achieve. Their full value cannot be unlocked while key parties distrust the technology or other... Sample PDF
Business Cases for Privacy-Enhancing Technologies
$37.50
Chapter 8
Ian Allison, Craig Strangwick
The chapter discusses how one small business planned for, and implemented, the security of its data in a new enterprise-wide system. The company’s... Sample PDF
Privacy through Security: Policy and Practice in a Small-Medium Enterprise
$37.50
Chapter 9
Richard V. McCarthy, Martin Grossman
Enterprise Architecture is a relatively new concept that has been adopted by large organizations for legal, economic, and strategic reasons. It has... Sample PDF
Privacy and Security: where do they fit into the Enterprise Architecture Framework?
$37.50
Chapter 10
Frederick Ip, Yolande E. Chan
This study assists organizations and researchers in examining investments in IS security. A questionnaire was developed and administered to managers... Sample PDF
Information Systems Security: A Survey of Canadian Executives
$37.50
Chapter 11
Sue Conger
With each new technology, new ethical issues emerge that threaten both individual and household privacy. This chapter investigates issues relating... Sample PDF
Emerging Technologies, Emerging Privacy Issues
$37.50
Chapter 12
Anza A. Akram
The purpose of the chapter is to discuss the effects of information and communication technologies on democracy and focuses on the driving forces... Sample PDF
Digital Democracy: Democracy in the Light of Information and Communication Technology
$37.50
Chapter 13
Zheng Yan, Silke Holtmanns
This chapter introduces trust modeling and trust management as a means of managing trust in digital systems. Transforming from a social concept of... Sample PDF
Trust Modeling and Management: From Social Trust to Digital Trust
$37.50
Chapter 14
Dan Manson
This chapter introduces the interrelationships of security, privacy and politics in higher education. University curriculum politics are ingrained... Sample PDF
Security, Privacy, and Politics in Higher Education
$37.50
About the Contributors