Select language, opens an overlay
0 messages from the library
  • Topic Guide
  • Staff-Created List

Keep It Private - Data Privacy

Everything you do online generates data. Discover how your data is used and steps you can take to control how it is shared and used. Gain an understanding of the privacy/convenience tradeoff around online data, how to manage your privacy online, and steps you can take to protect your online data. #indypladults #techlearningteam

User from The Indianapolis Public Library

33 items

  • Beyond Data

    Reclaiming Human Rights at the Dawn of the Metaverse

    Renieris, Elizabeth M.,
    This accessible and insightful book makes the case for how human rights are intertwined with the effects and dangers of the digital world and surveillance capitalism. The author provides a comprehensive history of how laws and policies enacted in…
    Book, 2023Cambridge, Massachusetts : The MIT Press, [2023] — 302.231 REN
  • This collection of essays on the challenges and risks of designing algorithms and platforms for children collectively places an emphasis on algorithmic justice, learning, and equity. This book includes essays that touch on topics including AI…
    Book, 2023Cambridge, Massachusetts : The MIT Press, [2023] — 004.083 ALG
  • The Fight for Privacy

    Protecting Dignity, Identity, and Love in the Digital Age

    Citron, Danielle Keats, 1968-
    As a distinguished professor of law at the University of Virginia and civil rights advocate, Danielle Citron has spent decades working with lawmakers and stakeholders worldwide to protect what she calls intimate privacy. She reframes privacy in a…
    Book, 2022New York, N.Y. : W.W. Norton & Company, [2022] — 342.730858 CIT
  • 200+ Ways to Protect Your Privacy

    Simple Ways to Prevent Hacks and Protect Your Privacy--on and Offline

    Rogers, Jeni,
    This book is filled with tips to help you reflect on your daily habits and notice any weak spots where your privacy is at risk. This goes for both digital and real-world privacy: using a firewall, keeping your home physically protected, how to store…
    Book, 2019New York : Adams Media, 2019. — 005.8 ROG
  • "I Have Nothing to Hide"

    and 20 Other Myths About Surveillance and Privacy

    Boghosian, Heidi,
    This book explains why commonly believed misconceptions about technology and surveillance have led to public indifference about these important issues. The author details how surveillance methods have historically been used to quash dissent and…
    Book, 2021Boston : Beacon Press, [2021] — 363.1063 BOG
  • Privacy

    What Everyone Needs to Know

    Francis, Leslie, 1946-
    Part of the What Everyone Needs to Know series, this book is written in a question and answer format and provides a detailed introduction to the complex topic of privacy. This book will provide insight to the implications of what privacy means for…
    Book, 2017New York, NY : Oxford University Press, [2017] — 342.730858 FRA
  • This informative narrative explains what data harvesting and data mining are and how they are carried out. The importance of privacy is covered, as well as two of the most common applications of data harvesting and data mining: the selling of…
    Book, 2020New York : Rosen YA, 2020. — SHARED SYSTEM
  • Privacy Is Power

    Why and How You Should Take Back Control of Your Data

    Véliz, Carissa,
    This book advocates for reclaiming control of the many ways we give away information about ourselves to many companies and organizations every day. The author argues that a relaxed attitude toward the collection and use of our personal data is bad…
    Book, 2021Brooklyn, NY : Melville House, [2021] — 005.8 VEL
  • This LinkedIn Learning course runs about an hour and covers all kinds of beginner's level cybersecurity topics. It focuses on Windows computers, though there is helpful material that applies to any kind of device.
    Online Learning, 2022Carpenteria, C : linkedin.com, 2022.
  • This course is over three and a half hours but don't let that scare you away! This is a fantastic go-to resource for everything digital security. Use the panel on the left to navigate by topic and learn some great practical tips.
    Online Learning, 2018Carpenteria, C : linkedin.com, 2018.
  • From the same instructor of the "Security Tips" course, intermediate learners can add to their knowledge base with this course on protecting your sensitive info. This will cover encryption, VPNs, email, secure Internet connections, cloud storage,…
    Online Learning, 2021Carpenteria, C : linkedin.com, 2021.
  • This easy-to-read book reveals how companies use personal data they collect online to sell more products. Images and helpful context will provide readers with a solid understanding of the topic. This book can be especially useful to those looking…
    Book, 2020Minneapolis, Minnesota : Core Library, an imprint of Abdo Publishing, [2020] — SHARED SYSTEM
  • Data is being collected from surveillance cameras, smartphones, Internet use, and beyond. This video from Great Courses will show how an individual is tracked through daily life and what kinds of privacy issues that raises for the everyday person.
    Streaming Video, 2014The Great Courses, 2014. — EVIDEO KANOPY
  • The Art of Invisibility

    the World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

    Mitnick, Kevin, 1963-2023
    Find useful real-world advice in this book, written by the "FBI's most wanted hacker" according to Wired. Learn how to leave no trace when it comes to being online. What better source than this is there to learn how to keep your data safe?
    Book, 2017New York : Little, Brown and Company, 2017. — 005.8 MIT
  • The Known Citizen

    a History of Privacy in Modern America

    Igo, Sarah E., 1969-
    Explore the history of privacy in America in this well-researched and thoroughly referenced analysis. From the introduction to social security numbers to big data, uncover how modern American history is intertwined with evolving discussions of a…
    Book, 2018Cambridge, Massachusetts : Harvard University Press, 2018. — 323.448 IGO
  • The Identity Trade

    Selling Privacy and Reputation Online

    Draper, Nora A.,
    In this investigative work, the author examines the complex relationship between privacy, online identity, and self-preservation. Through interviews with industry figures, this book details the efforts of companies to sell privacy protection and…
    Book, 2019New York : New York University Press, [2019] — 323.448 DRA
  • Exploding Data

    Reclaiming Our Cyber Security in the Digital Age

    Chertoff, Michael, 1953-
    The author of this book was the Secretary of Homeland Security from 2005-2009. In this book, he argues that losing control of information about ourselves is a major threat to our own freedom and that current laws and policies regarding the…
    Book, 2018New York : Atlantic Monthly Press, 2018. — 343.73 CHE
  • Privacy Is Hard and Seven Other Myths

    Achieving Privacy Through Careful Design

    Hoepman, Jaap-Henk,
    In this book, the author makes the case that as much as technology can be used to invade our privacy, it can just as easily be used to protect it. By building privacy into the the design of systems from the beginning, we could create a…
    Book, 2021Cambridge, Massachusetts : The MIT Press, [2021] — 005.8 HOE
  • Cyber Privacy

    Who Has Your Data and Why You Should Care

    Doss, April Falcon, 1967-
    Privacy expert and former NSA and Senate lawyer, April Falcon Doss, explores the types of data most commonly collected about individuals today, how it is being used by whom, and what individuals can do about it. In this book, she explains trends in…
    Book, 2020Dallas, TX : BenBella Books, Inc., [2020] — 323.448 DOS
  • In the United States and many other countries, there are laws in place that are supposed to protect privacy. However, the laws have not kept up with technology and this leaves many kinds of online communication and users' digital footprints…
    Book, 2016Minneapolis : Twenty-First Century Books, [2016] — TEEN 323.448 JAN