Connexions Durchsuchen



Connexions Archiv

Artikel, Bücher, Dokumente, Zeitschriften, Audio-Visuelle Medien


Titelindex

Autorenindex

Fachgebiete Index

Chronologischer Index

Format Index

Dewey-System Index

Library of Congress Classes


Connexions Verzeichnis
von Verbänden & Nichtstaatlichen Organisationen

Fachgebiete Index

Verbände Index

Ausgesuchte Artikel nach
Fachgebiete

Spenden oder Ehrenamtliche Mitarbeit

Ihre Spenden machen unsere Arbeit möglich. Bitte spenden Sie noch heute

Ehrenamtliche Mitarbeit und Praktika

Donate to Connexions
Search engine optimization

Privatsph„re
Das Connexions Archiv

Um weitere Informationen Anzuzeigen, wie Herausgeber, Erscheinungsdatum, Identifikationsnummer, usw. anzuzeigen, klicken Sie auf einen Titel. Für die meisten Einträge ist eine Inhaltsangabe vorhanden und zusätzlich ein Link, wenn der vollständige Text Online zur Verfügung steht. Einige Einträge enthalten ebenfalls Links zu verwandten Fachgebieten und Einträge im Themenindex. Besonders empfehlenswerte Titel sind mit dem roten Connexions Logo gekennzeichnet.

  1. Big Brother's Getting Bigger
    Resource Type: Article
    First Published: 2012
    Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years.
  2. Connexions
    Volume 4, Number 1 - February 1979 - National Security/Securite Nationale

    Resource Type: Serial Publication (Periodical)
    First Published: 1979
  3. Connexions
    Volume 5, Number 1 - January 1980 - Literacy/Alphabetisation

    Resource Type: Serial Publication (Periodical)
    First Published: 1980
  4. Connexions
    Volume 7, Number 1 - March 1982

    Resource Type: Serial Publication (Periodical)
    First Published: 1982
  5. Connexions
    Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social

    Resource Type: Serial Publication (Periodical)
    First Published: 1984
  6. Connexions Annual Resource and Reading List
    Resource Type: Article
    First Published: 1989   Published: 1994
    A short and selective list of resources on issues addressed in the Connexions Annual, such as environment, education, peace, interntional development, women's issues, urban issues, housing, human rights, civil liberties, social change.
  7. Connexions Digest
    Issue 54 - February 1992- A Social Change Sourcebook

    Resource Type: Serial Publication (Periodical)
    First Published: 1992
  8. Connexions Library: Human Rights and Civil Liberties Focus 
    Resource Type: Website
    Selected articles, books, websites and other resources on civil liberties and human rights.
  9. Continuous Excursions
    Politics and Personal Life

    Resource Type: Book
    First Published: 1982
    Colman looks at the idea that 'the personal is political'. He looks at personal life in pre-capitalist societies, the nature of politics and social relations, patriarchy and sexual relations, intimacy and personal life, indviduality and public life.
  10. Corporate Coercion and the Drive to Eliminate Buying with Cash
    Resource Type: Article
    First Published: 2018
    Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobile phones and perhaps even through facial recognition technology.
  11. The Corporate State of Surveillance
    Opting Out

    Resource Type: Article
    First Published: 2013
    America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy rights. We find ourselves in the midst of an all-out invasion on what’s-none-of-their-business and its coming from both government and corporate sources. Snooping and data collection have become big business. Nothing is out of their bounds anymore.
  12. Data Mining You
    How the Intelligence Community Is Creating a New American World

    Resource Type: Article
    First Published: 2012
    Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington.
  13. Edward Snowden's Warning to Canada
    Resource Type: Article
    First Published: 2015
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  14. The End of Privacy
    How Total Surveillance Is Becoming a Reality

    Resource Type: Book
    First Published: 1999
    Whitaker argues that we live in a surveillance society; in order to get rewards and privileges, we have to give up our personal privacy to the government and corporations.
  15. The Face Off: Law Enforcement Use of Face Recognition Technology
    Resource Type: Article
    First Published: 2018
    Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies like these is occurring without meaningful oversight, without proper accuracy testing of the systems as they are actually used in the field, and without the enactment of legal protections to prevent internal and external misuse.
  16. Fifteen minutes of online anonymity
    Resource Type: Article
    First Published: 2013
    Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 minutes of online anonymity.
  17. For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching Too
    Resource Type: Article
    First Published: 2019
    Amazon's Ring security cameras have a history of lax, sloppy oversight when it comes to deciding who has access to some of the most precious, intimate data belonging to any person: a live, high-definition feed from around -and perhaps inside- their house.
  18. Four Trends That Scare the Hell Out of Me
    Resource Type: Article
    First Published: 1989
    To paraphrase H.G. Wells, modern history has become a race between education and miseducation. There are very few people around who really don't know anything, but there are multitudes who know many things that don't happen to be true.
  19. Die Globale Teleueberwachung des 21. Jahrhunderts
    Resource Type: Article
    Es entsteht zur Zeit eine globale Teleuberwachung, die sich von allen ethischen oder diplomatischen Voreingenomenheiten freimacht.
  20. Google keeps tracking you even when you specifically tell it not to: Maps, Search won't take no for an answer
    Resource Type: Article
    First Published: 2018
    Google has admitted that its option to "pause" the gathering of your location data doesn't apply to its Maps and Search apps – which will continue to track you even when you specifically choose to halt such monitoring.
  21. Improve your privacy and security on the Internet using Tor
    Resource Type: Article
    First Published: 2013
    This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
  22. India's UID And The Fantasy Of Dataveillance
    Resource Type: Article
    First Published: 2009
    The perils of establishing nationwide identity systems have always been a hot topic of debate in countries that attach great value to privacy and human rights of its citizens. In India, there is not even a whimper of protest from politicians and civil society groups.
  23. IntelligentSearch.ca
    Resource Type: Website
    First Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  24. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    First Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  25. Just because they hunt witches doesn't mean we have
    Resource Type: Article
    First Published: 2010
    The Big Brother defence of WikiLeaks is that if everyone had a camera upon them, society would be a better place. This is a view that fails to distinguish between the need to control those who possess power, and the need to prevent those who possess power from controlling us.
  26. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    First Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  27. Medical Privacy Under Threat in the Age of Big Data
    Resource Type: Article
    First Published: 2015
    Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect their medical data can come externally, from data breaches; internally, from "rogue employees" and others with access; or through loopholes in regulations.
  28. Metadata - your files talk for you
    Resource Type: Article
    First Published: 2013
    Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history.
  29. Mistaking Omniscience for Omnipotence 
    In a World Without Privacy, There Are No Exemptions for Our Spies

    Resource Type: Article
    First Published: 2013
    Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasonable supposition that, before the Snowden revelations hit, America's spymasters had made just that mistake. If the drip-drip-drip of Snowden’s mother of all leaks -- which began in June and clearly won’t stop for months to come -- has taught us anything, however, it should be this: omniscience is not omnipotence. At least on the global political scene today, they may bear remarkably little relation to each other. In fact, at the moment Washington seems to be operating in a world in which the more you know about the secret lives of others, the less powerful you turn out to be.
  30. A More Perfect Union
    Why Straight America Must Stand Up for Gay Rights

    Resource Type: Book
    Mohr uses lively examples and historical cases to explore both private and public issues affecting the gay and lesbian community.
  31. The Naked Society
    Resource Type: Book
    First Published: 1964
    An expose of the forces which are increasingly depriving Americans of their right to privacy.
  32. The New Police Surveillance State
    The Rising Price of Political Assembly

    Resource Type: Article
    First Published: 2012
    Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
  33. No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
    Resource Type: Article
    First Published: 2015
    Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
  34. The No-Nonsense Guide to Global Media
    Resource Type: Book
    First Published: 2004
    Peter Steven aims to make readers realize the power and influence of dominant media but, at the same time, also understand that they are not "omnipotent" and that there are alternative forms available.
  35. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
    Resource Type: Article
    First Published: 2015
    The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
  36. Nobody's Business
    The Paradoxes of Privacy

    Resource Type: Book
    First Published: 1990
  37. 'Not a Good Answer': Privacy Advocates Reject Democratic Proposal for 'Technological Wall' With Expanded Border Surveillance
    'More surveillance' has become the default answer to far too many difficult policy questions

    Resource Type: Article
    First Published: 2019
    Digital rights advocates called on Democratic lawmakers to expand their fight against the wall into a fight for all human and constitutional rights-instead of suggesting alternative "border security" proposals that would infringe on civil liberties.
  38. NSA and GCHQ target Tor network that protects anonymity of web users
    Resource Type: Article
    First Published: 2013
    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
  39. The Obliteration of Privacy
    Snowden and the NSA

    Resource Type: Article
    First Published: 2014
    It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t care if the government is listening to what I say. And if they catch some terrorists, so much the better.”
  40. On Locational Privacy, and How to Avoid Losing it Forever
    Resource Type: Article
    First Published: 2009
    Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to see such systems now, and there will be many more in the near future.
  41. Online Rights for Online Workers - Privacy at Work
    Resource Type: Website
    Deals with workers' right to privacy in the face of online surveillance by employers.
  42. Open Marriage 
    A New Life Style for Couples

    Resource Type: Book
    First Published: 1972
    The authors propose open marriage as a way to help couples realize that there can be both relatedness and freedom in marriage, and that freedom, with the growth and responsibility it entails, can be the basis for intimacy and love.
  43. OptOut
    Resource Type: Website
    Steve Gibson's campaign against Internet spyware used by companies to extract information from Internet users' computers without their knowledge or consent.
  44. The Other Police State
    Private Cops vs. the Public Good

    Resource Type: Article
    First Published: 2013
    A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security state. It details how some companies use the security apparatus, including questionable espionage tactics, against anyone who challenges their authority.
  45. Other Voices: The Connexions Newsletter - December 5, 2015
    Ecosocialism, environment, and urban gardening

    Resource Type: Serial Publication (Periodical)
    First Published: 2015
    This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urban gardening, the destruction of olive trees, and how the police are able to use Google's timeline feature to track you every move, now and years into the past.
  46. Other Voices: The Connexions Newsletter - July 22, 2017
    Secrecy and Power

    Resource Type: Serial Publication (Periodical)
    First Published: 2017
    Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
  47. A practical guide to protecting your identity and security when using mobile phones
    Resource Type: Article
    First Published: 2013
    Many activists have been tracked via their mobile phones. Assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your community have experienced.
  48. Preparing for a Digital 9/11
    Resource Type: Article
    First Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  49. Privacy!
    How to get it .... How to enjoy it

    Resource Type: Book
    First Published: 1977
  50. Privacy For Sale
    How Computerization Has Made Everyone's Private Life an Open Secret

    Resource Type: Book
    First Published: 1992
  51. Privacy for the other five billion
    Resource Type: Article
    First Published: 2013
    Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
  52. Privacy Journal
    Resource Type: Serial Publication (Periodical)
    First Published: 1978
    A monthly newsletter that is, "...filled with American and Canadian news about the confidentiality of personal information." It describes, "...record-keeping in government and business, new invasions of privacy, new legislation, and (alerts) citizens to ways they can protect their personal privacy."
  53. Privacy and the Right to Strike in Canada
    Resource Type: Article
    First Published: 2013
    The neoliberal assault on labour has now entered its fourth decade. Equally concerning for the labour movement has been the long assault on the post-war labour freedoms to organize, bargain, and strike.
  54. Privacy tapped out
    Resource Type: Article
    First Published: 2013
    For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, and the surveillance is out of control.
  55. The Puritanical Glee Over the Ashley Madison Hack
    Resource Type: Article
    First Published: 2015
    High school students have long read The Scarlet Letter, the 1850 novel by Nathaniel Hawthorne set in a Puritanical Massachusetts town in the mid-17th century. As The Atlantic noted in 1886, "the punishment of the scarlet letter is a historical fact." To see just how current is the mentality driving the scarlet letter, observe the reaction to the Ashley Madison hack.
  56. Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' Rights
    Resource Type: Article
    First Published: 2015
    Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal in Atlanta. Some of the more dangerous threats to the public's rights to free expression, access to knowledge, and privacy online are contained in the copyright provisions in the Intellectual Property (IP) chapter. Now that the entire agreement is published, we can see how other chapters of the agreement contain further harmful rules that undermine our rights online and over our digital devices and content.
  57. Sending encrypted emails using Thunderbird and PGP
    Resource Type: Article
    First Published: 2013
    There are easy ways to ensure your Internet activities remain confidential.
  58. Six Tips to Protect Your Search Privacy
    Resource Type: Article
    First Published: 2006
    Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
  59. The Soft Cage
    Surveillance in America from Slavery to the War on Terror

    Resource Type: Book
    First Published: 2004
    Parenti explores the history of American surveillance from colonial times to the present. What this historical evidence clearly reveals is a continuum of the culture of surveillance. The weakest, most disenfranchised and most alienated groups are subjected first, and then the surveillance regime slowly spreads toward the mainstream.
  60. Someone's Watching You!
    From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It

    Resource Type: Book
    First Published: 2011
    An expose and explanation of the little-known secret surveillance programs run by both the public and private sectors, including practical steps on how to keep your private life private.
  61. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    First Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  62. Spying on Democracy
    Government Surveillance, Corporate Power, and Public Resistance

    Resource Type: Book
    First Published: 2013
    Heidi Boghosian documents the disturbing increase in surveillance of ordinary citizens and the danger it poses to our privacy, our civil liberties, and to the future of democracy itself.
  63. Surveillance Self-Defense 
    Resource Type: Website
    First Published: 2018
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  64. Tails: The amnesic Incognito Live System
    Resource Type: Article
    First Published: 2013
    Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy.
  65. Think the Left Won the Culture War? Think Again
    Resource Type: Article
    First Published: 2015
    With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
  66. Thirteen Ways Government Tracks Us
    Resource Type: Article
    First Published: 2012
    Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens. Here are thirteen examples of how some of the biggest government agencies and programs track people.
  67. Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
    Resource Type: Article
    First Published: 2015
    A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone app to access user's locations at all times, and to send advertisements to user's contact lists.
  68. Virtual Private Network (VPN)
    Resource Type: Article
    First Published: 2013
    This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users.
  69. Vodafone Reveals Existence of Secret Wires that Allow State Surveillance
    Resource Type: Article
    First Published: 2014
    Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
  70. Wanted: A Hackers' Charter
    Resource Type: Article
  71. The Watchers
    The Rise of America's Surveillance State

    Resource Type: Book
    First Published: 2010
    An exploration of how and why the American government increasingly spies on its own citizens.
  72. We need to think about Toilets
    New Internationalist August 2008 - #414

    Resource Type: Serial Publication (Periodical)
    First Published: 2008
    A look at the history and facts about toilets. A look at sanitation and employment opportunities surrounding toilets.
  73. Who Knows
    Safegurding Your Privacy in a Networked World

    Resource Type: Book
    First Published: 1995

Experts on Privatsph„re in the Sources Directory

  1. Article 19
  2. Connexions

    Connexions Information Sharing Services

Connexions Archiv

Ein Katalog mit mehr als 7000 Büchern, Artikeln, Filmen, Zeitschriften, Webseiten und anderen Quellen.
Sortiert nach Autor, Titel, Format, Fachgebiet, Dewey-System Nummer, Library of Congress Systematik, Erscheinungsjahr.
Connexions Verzeichnis Verbände und nichstaatliche Organisationen die sich mit sozialen und ökologischen Themen beschäftigen — A-Z Index oder Fachgebiete Index.
Für Fachleute und Medienvertreter, besuchen Sie auch das Sources Verzeichnis und den umfangreichen Sources Fachgebiete Index.
Links Ausgesuchte Internet-Quellen mit Informationen über Alternativen.
Kalender Veranstaltungen in ganz Kanada. Siehe auch: Sources Kalender and Pressemeldungen.
Öffentlichkeitsarbeit und Medien Quellen, Publikationen und Artikel die Ihnen helfen die Aufmerksamkeit der Medien zu bekommen und das Bewusstsein für Ihr Anliegen zu schärfen. Außerdem: Verzeichnis von Namen & Nummern aus der kanadischen Medienwelt, ein Verzeichnis von Namen & Nummern aus dem kanadischen Parlament, und Adressenlisten.
Spenden Connexions freut sich über Ihre Unterstützung. Ihre Spenden machen unsere Arbeit möglich. Ehrenamtliche Mitarbeiter sind stets Willkommen.
Mission Connexions ist gedacht für die Unterstützung von Personen und Gruppen, die sich für Freiheit und Soziale Gerechtigkeit einsetzen. Unser anliegen ist es die Aufzeichnungen vom wirken von Menschen und deren Kampf gegen Unterdrückung und für gesellschaftlichen Wandel zur Verfügung zu stellen. Wir glauben daran, dass je mehr wir über die Konflikte, Siege und Niederlagen der Vergangenheit und über diejenigen die daran Teilgenommen haben wissen, desto besser sind wir dazu in der Lage eine neue Welt zu gestallten. Connexions verfügt sowohl über einen Bestand an Büchern und Dokumenten und ist außerdem bemüht das bereits bestehende digitale Archiv an Dokumenten weiter auszubauen. Wir arbeiten daran einen weiten Themenbereich abzudecken, der eine Vielzahl von unterschiedlichen Ansichten und Herangehensweisen für Gesellschaftlichen Wandel umfasst, alles mit dem Grundsätzlichen anliegen der Unterstützung der Demokratie, Bürgerrechte, freie Meinungsäußerung, Menschenrechen, Säkularität, Gleichheit, wirtschaftlichen Gerechtigkeit, ökologisches Verantwortungsbewusstsein und dem erschaffen und dem erhalt von Gemeinschaft. Wir sind International orientiert, allerdings haben wir als kanadisches Projekt eine besonders große Auswahl an kanadischen Dokumenten und Informationen über kanadische Organisationen.