Skip to content
You are not logged in |Login  

LEADER 00000cam  2200505Mi 4500 
001    ocn892871202 
003    OCoLC 
005    20160518075404.4 
006    m     o  d         
007    cr ||||||||||| 
008    141002r20142008enk     ob    001 0 eng d 
016 7  016887183|2Uk 
019    891446069 
020    9781780747347|q(ePub electronic bk.) 
020    1780747349|q(ePub electronic bk.) 
035    (OCoLC)892871202|z(OCoLC)891446069 
040    UKMGB|beng|epn|erda|cUKMGB|dOCLCO|dEBLCP|dTEFOD|dN$T
       |dDEBSZ|dOCLCO|dTEFOD|dOCLCQ|dOCLCO 
049    GTKE 
050  4 TK7882 .E2 
082 04 323.448|223 
100 1  O'Hara, Kieron,|eauthor. 
245 14 The spy in the coffee machine :|bthe end of privacy as we 
       know it /|cKieron O'Hara and Nigel Shadbolt. 
264  1 Richmond :|bOneworld,|c2014. 
300    1 online resource (pages cm) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
500    Previously issued in print: 2008. 
504    Includes bibliographical references and index. 
505 0  Cover; Title; Copyright; Contents; Preface; 1. The case of
       the disappearing body; 2. The surveillance society; 3. 
       Computer security meets human idiocy: privacy enhancing 
       technologies and their limits; 4. The power of power: 
       Moore's Law and practical obscurity; 5. It's the links, 
       stupid: the Internet, the World Wide Web and privatised 
       spaces; 6. Man's best friend is his blog: Web 2.0; 7. They
       snoop to conquer: censorship, decisional privacy and 
       ideological privacy; 8. Where dust is smart and reality 
       mixed: pervasive computing; 9. Get ready, the panopticon's
       here; Endnotes; Index. 
520    What do you know about the new surveillance state that has
       been created in the wake of pervasive computing and#x96; 
       that is, the increasing use of very small and simple 
       computers in all sorts of host and#x96; from your computer
       to your coat? Well, these little computers can communicate
       via the web and form powerful networks whose emergent 
       behaviour can be very complex, intelligent, and invasive. 
       The question is: how much of an infringement on privacy 
       are they? Could these intelligent networks be used by 
       governments, criminals or terrorists to undermine privacy 
       or commit crimes? From CCTVs to blogging, fro. 
588 0  CIP data; resource not viewed. 
650  0 Privacy. 
650  0 Privacy, Right of. 
650  0 Electronic surveillance. 
650  0 Privacy|xSocial aspects. 
650  0 Privacy, Right of|xSocial aspects. 
650  0 Electronic surveillance|xSocial aspects. 
650  7 SOCIAL SCIENCE|xGeneral.|2bisacsh 
700 1  Shadbolt, Nigel,|d1956-|eauthor. 
776 08 |iPrint version|z9781851685547 
914    ocn892871202 
994    93|bGTK 
Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO