Computer Ethics Institute

Providing a moral compass for the ocean of information technology

Home

About CEI

What is CEI?

CEI's History

Historical Timeline

Supporters

Events

2007

2004

2003

1996

1995

1994

1993

1992

1990

1986

Publications

Protecting What Matters

Ten Commandments

White Papers

CEI in the Press

Protecting What Matters

Table of Contents

Foreword--by Ramon Barquin and Jane Fishkin
Acknowledgments

PART I. Introduction: Security and Liberty in the Twenty-first Century

1. Providing Security and Protecting Liberty--by Clayton Northouse
2. How the Public Sees the Security-versus-Liberty Debate--by Alan F. Westin

PART II. Protecting Security and Liberty: Information Technology's Role

3. Information Technology and the New Security Challenges--by James Steinberg
4. Building a Trusted Information-Sharing Environment--by Zoe Baird and James Barksdale
5. Security and Liberty: How Technology Can Bridge the Divide--by Gilman Louie and Gayle von Eckartsberg
6. Policies and Procedures for Protecting Security and Liberty--by Bruce Berkowitz

PART III. Technology, Security and Liberty: The Legal Framework

7. Communications Assistance for Law Enforcement Act: Facing the Challenge of New Technologies
8. Security, Privacy, and Government Access to Commercial Data--by Jerry Berman
9. Foreign Intelligence Surveillance Act: Has the Solution Become a Problem?--by Beryl A. Howell
10. Why You Should Like the PATRIOT Act--by Jon Kyl
11. Why I Oppose the PATRIOT Act--by Russ Feingold

Liberty and Security Timeline
Further Resources
Contributors
Index



Computer Ethics Institute · 888 17th Street NW · Suite 215 · Washington DC 20006 · 202-296-7147 
E-mail: info@computerethicsinstitute.org