|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
This title is meant to convey the emphasis which is now placed on the valuable contents of the safe (the information) rather than just on the safe in which those contents are stored (the computer).
It should also convey to potential readers the impact of information communication technologies on the law, the increasing importance of telecommunications law and legal aspects of electronic commerce and the convergence between these fields and IT law.
The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created, which is threatening democracy and human rights.
Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals: ‘Thousands of people in Europe owe their lives to hundreds of our company employees’, they declared in 2019. That may be true – but the Pegasus system doesn’t just catch bad guys.
Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists. Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known.
This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. They received a leaked list of 50,000 mobile phone numbers, but they needed to prove NSO’s involvement. After a dangerous and secretive investigation spanning the globe, their findings shook the world. Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.
This Research Handbook is an insightful overview of the key rules,
concepts and tensions in privacy and data protection law. It
highlights the increasing global significance of this area of law,
illustrating the many complexities in the field through a blend of
theoretical and empirical perspectives. Providing an excellent
in-depth analysis of global privacy and data protection law, it
explores multiple regional and national jurisdictions, bringing
together interdisciplinary international contributions from Europe
and beyond. Chapters cover critical topics in the field, including
key features of the General Data Protection Regulation (GDPR),
border surveillance, big data, artificial intelligence, and
biometrics. It also investigates the relationship between privacy
and data protection law and other fields of law, such as consumer
law and competition law. With its detailed exploration and insights
into privacy and data protection, this Research Handbook will prove
a useful resource for information and media law students as well as
academics researching fields such as data protection and privacy
law and surveillance or security studies.
Informed by the latest theoretical developments in studies of the
social impacts of digital technology, Smart-Tech Society provides
an empirically grounded and conceptually informed analysis of the
impacts and paradoxes of smart-technology. While making life more
convenient, smart-tech has also been associated with a loss of
privacy and control over decision-making autonomy. Mark Whitehead
and William Collier provide a critical analysis of the lived
experience of smart-technology, presenting stories of varied social
engagements with digital platforms and devices. Chapters explore
the myriad contexts in and through which smart-tech insinuates
itself within everyday life, the benefits it brings, and the
processes through which it is being resisted. Detailed case studies
explore the impacts of smart-technology across a broad range of
fields including personal health, work, social life, urban
management, and politics. Presenting new empirical evidence and
analytical perspectives on the relationships between humans and
smart-tech, this book will be of interest to academics and students
in the fields of sociology, political science, human geography, and
technology studies.
As the COVID-19 pandemic surged in 2020, questions of data privacy,
cybersecurity, and ethics of the surveillance technologies centred
an international conversation on the benefits and disadvantages of
the appropriate uses and expansion of cyber surveillance and data
tracking. This timely book examines and answers these important
concerns. Pandemic Surveillance frames and defines digital privacy
and security in the context of emerging surveillance technologies,
providing informed dialogue on international conversations
regarding pandemic surveillance. The book examines the challenges
of regulating pandemic surveillance technologies across diverse
geographical settings, including Europe and Latin America, along
with comparative analysis of social credit systems in China and the
United States. Margaret Hu and her impressive selection of
contributors explore the legal, scientific and ethical challenges
in a world with a growing data surveillance architecture, providing
policy recommendations and forward-looking solutions, including the
importance of ethical frameworks, to minimise potential misuse and
abuse of surveillance technologies. Delivering a well-rounded
examination of pandemic surveillance and data-tracking
technologies, this book is a crucial read for researchers and
scholars focused on information security and data privacy,
including specialists in the area of cyber ethics and data ethics.
Students and academics interested in health policy and bioethics
will also benefit from the insights in this text.
Revealing the politics underlying the rapid globalization of facial
recognition technology (FRT), this topical book provides a
cutting-edge, critical analysis of the expanding global market for
FRT, and the rise of the transnational social movement that opposes
it. With the use of FRT for policing, surveillance, and business
steadily increasing, this book provides a timely examination of
both the benefits of FRT, and the threats it poses to privacy
rights, human rights, and civil liberties. Interviews with analysts
and activists with expertise in FRT find that the anti-FRT movement
is highly uneven, with disproportionate influence in Western
democracies and relatively little influence in authoritarian states
and low-income countries in the developing world. Through a global
analysis of the uptake and regulation of FRT, chapters create a
holistic understanding of the politics behind this technology.
Concluding with a look towards the future prospects of FRT in the
face of the growing size, reach, and power of its opposition, the
book reflects more broadly on the power of transnational social
movements and civil society activism to prevent the globalization
and normalization of new technologies. A visionary exploration of
FRT, this book will be invaluable to students and scholars of
politics and policy, alongside activists, stakeholders, and policy
makers interested in the growing power of social movements to
resist new technology.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.
Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
In recent years, falsification and digital modification of video
clips, images, as well as textual contents have become widespread
and numerous, especially when deepfake technologies are adopted in
many sources. Due to adopted deepfake techniques, a lot of content
currently cannot be recognized from its original sources. As a
result, the field of study previously devoted to general multimedia
forensics has been revived. The Handbook of Research on Advanced
Practical Approaches to Deepfake Detection and Applications
discusses the recent techniques and applications of illustration,
generation, and detection of deepfake content in multimedia. It
introduces the techniques and gives an overview of deepfake
applications, types of deepfakes, the algorithms and applications
used in deepfakes, recent challenges and problems, and practical
applications to identify, generate, and detect deepfakes. Covering
topics such as anomaly detection, intrusion detection, and security
enhancement, this major reference work is a comprehensive resource
for cyber security specialists, government officials, law
enforcement, business leaders, students and faculty of higher
education, librarians, researchers, and academicians.
A Wall Street Journal Bestseller 'IT SHOULD BE READ BY ANYONE
TRYING TO MAKE SENSE OF GEOPOLITICS TODAY' FINANCIAL TIMES Three of
our most accomplished and deep thinkers come together to explore
Artificial Intelligence (AI) and the way it is transforming human
society - and what it means for us all. An AI learned to win chess
by making moves human grand masters had never conceived. Another AI
discovered a new antibiotic by analysing molecular properties human
scientists did not understand. Now, AI-powered jets are defeating
experienced human pilots in simulated dogfights. AI is coming
online in searching, streaming, medicine, education, and many other
fields and, in so doing, transforming how humans are experiencing
reality. In The Age of AI, three leading thinkers have come
together to consider how AI will change our relationships with
knowledge, politics, and the societies in which we live. The Age of
AI is an essential roadmap to our present and our future, an era
unlike any that has come before.
In Online Predators, An Internet Insurgency: A Field Manual for
Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings
his ten plus years' experience in the fight against online child
exploitation to bear in an easy to follow guide for all with a
stake in the life of a child. This book equips parents, guardians,
extended family, and educational professionals with practical
strategies to help keep kids safe in a technology connected world.
Instead of focusing on ever changing technology, Lee proposes a key
fundamental change in the fight against online predation-to develop
an insatiable curiosity about their child's online life, then get
in the front lines and stay there.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
The security of information and communication technology is a high
priority for any organization. By examining the current problems
and challenges this domain is facing, more efficient strategies can
be established to safeguard personal information against invasive
pressures. Security and Privacy Management, Techniques, and
Protocols is a critical scholarly resource that examines emerging
protocols and methods for effective management of information
security at organizations. Featuring coverage on a broad range of
topics such as cryptography, secure routing protocols, and wireless
security, this book is geared towards academicians, engineers, IT
specialists, researchers, and students seeking current research on
security and privacy management.
In recent years, technological advances have led to significant
developments within a variety of business applications. In
particular, data-driven research provides ample opportunity for
enterprise growth, if utilized efficiently. Privacy and Security
Policies in Big Data is a pivotal reference source for the latest
research on innovative concepts on the management of security and
privacy analytics within big data. Featuring extensive coverage on
relevant areas such as kinetic knowledge, cognitive analytics, and
parallel computing, this publication is an ideal resource for
professionals, researchers, academicians, advanced-level students,
and technology developers in the field of big data.
The notion of surveillance has become increasingly more crucial in
public conversation as new tools of observation are obtained by
many different players. The traditional notion of "overseeing" is
being increasingly replaced by multi-level surveillance where many
different actors, at different levels of hierarchy, from the child
surveilling the parent to the state surveilling its citizens, are
entering the surveillance theater. This creates a unique
surveillance ecosystem where the individual is observed not only as
an analog flesh-and-blood body moving through real spaces such as a
shopping mall, but also tracked as a data point where the volume of
data is perpetually and permanently expanding as the digital life
story is inscribed in the digital spaces. The combined narrative of
the individual is now under surveillance. Modern Day Surveillance
Ecosystem and Impacts on Privacy navigates the reader through an
understanding of the self as a narrative element that is open for
observation and analysis. This book provides a broad-based and
theoretically grounded look at the overall processes of
surveillance in a global system. Covering topics including
commodity, loss of privacy, and big data, this text is essential
for researchers, government officials, policymakers, security
analysts, lawmakers, teachers, professors, graduate and
undergraduate students, practitioners, and academicians interested
in communication, technology, surveillance, privacy, and more.
|
You may like...
Eclipsed
Bremen
Vinyl record
R342
R299
Discovery Miles 2 990
The Car
Arctic Monkeys
CD
R407
Discovery Miles 4 070
Flex
Dizzee Rascal
CD
R41
Discovery Miles 410
|