Indices1
Patriotic Information Systems

Patriotic Information Systems

Copyright: © 2008 |Pages: 272
ISBN13: 9781599045948|ISBN10: 159904594X|EISBN13: 9781599045962|ISBN13 Softcover: 9781616926809
DOI: 10.4018/978-1-59904-594-8
Cite Book Cite Book

MLA

Loendorf, Todd , and G. David Garson, editors. Patriotic Information Systems. IGI Global, 2008. https://doi.org/10.4018/978-1-59904-594-8

APA

Loendorf, T. & Garson, G. D. (Eds.). (2008). Patriotic Information Systems. IGI Global. https://doi.org/10.4018/978-1-59904-594-8

Chicago

Loendorf, Todd , and G. David Garson, eds. Patriotic Information Systems. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-594-8

Export Reference

Mendeley
Favorite Full-Book Download

Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects ever layer of society: from individuals to households to local governments, and is a consuming issue in US government's stance on privacy, security, and technology.

Patriotic Information Systems discusses how, with its non-participatory enforcement ethos, its inherent bias against freedom of information, and its massive claims on IT budget resources, the information technology security system of the future may be even less hospitable to the democratic visions which some theorists once anticipated would be among the most important contributions of information technology to society.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Introduction  (pages 12-12)
Introduction
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Freedom of Information and Access
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Security, Technology, and Democracy
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Conclusion  (pages 225-225)
Conclusion
This content has been removed at the discretion of the publisher and the editors.
Back Materials
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.