Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
This title is meant to convey the emphasis which is now placed on the valuable contents of the safe (the information) rather than just on the safe in which those contents are stored (the computer). It should also convey to potential readers the impact of information communication technologies on the law, the increasing importance of telecommunications law and legal aspects of electronic commerce and the convergence between these fields and IT law.
The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created, which is threatening democracy and human rights. Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals: ‘Thousands of people in Europe owe their lives to hundreds of our company employees’, they declared in 2019. That may be true – but the Pegasus system doesn’t just catch bad guys. Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists. Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known. This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. They received a leaked list of 50,000 mobile phone numbers, but they needed to prove NSO’s involvement. After a dangerous and secretive investigation spanning the globe, their findings shook the world. Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.
As the COVID-19 pandemic surged in 2020, questions of data privacy, cybersecurity, and ethics of the surveillance technologies centred an international conversation on the benefits and disadvantages of the appropriate uses and expansion of cyber surveillance and data tracking. This timely book examines and answers these important concerns. Pandemic Surveillance frames and defines digital privacy and security in the context of emerging surveillance technologies, providing informed dialogue on international conversations regarding pandemic surveillance. The book examines the challenges of regulating pandemic surveillance technologies across diverse geographical settings, including Europe and Latin America, along with comparative analysis of social credit systems in China and the United States. Margaret Hu and her impressive selection of contributors explore the legal, scientific and ethical challenges in a world with a growing data surveillance architecture, providing policy recommendations and forward-looking solutions, including the importance of ethical frameworks, to minimise potential misuse and abuse of surveillance technologies. Delivering a well-rounded examination of pandemic surveillance and data-tracking technologies, this book is a crucial read for researchers and scholars focused on information security and data privacy, including specialists in the area of cyber ethics and data ethics. Students and academics interested in health policy and bioethics will also benefit from the insights in this text.
Informed by the latest theoretical developments in studies of the social impacts of digital technology, Smart-Tech Society provides an empirically grounded and conceptually informed analysis of the impacts and paradoxes of smart-technology. While making life more convenient, smart-tech has also been associated with a loss of privacy and control over decision-making autonomy. Mark Whitehead and William Collier provide a critical analysis of the lived experience of smart-technology, presenting stories of varied social engagements with digital platforms and devices. Chapters explore the myriad contexts in and through which smart-tech insinuates itself within everyday life, the benefits it brings, and the processes through which it is being resisted. Detailed case studies explore the impacts of smart-technology across a broad range of fields including personal health, work, social life, urban management, and politics. Presenting new empirical evidence and analytical perspectives on the relationships between humans and smart-tech, this book will be of interest to academics and students in the fields of sociology, political science, human geography, and technology studies.
This Research Handbook is an insightful overview of the key rules, concepts and tensions in privacy and data protection law. It highlights the increasing global significance of this area of law, illustrating the many complexities in the field through a blend of theoretical and empirical perspectives. Providing an excellent in-depth analysis of global privacy and data protection law, it explores multiple regional and national jurisdictions, bringing together interdisciplinary international contributions from Europe and beyond. Chapters cover critical topics in the field, including key features of the General Data Protection Regulation (GDPR), border surveillance, big data, artificial intelligence, and biometrics. It also investigates the relationship between privacy and data protection law and other fields of law, such as consumer law and competition law. With its detailed exploration and insights into privacy and data protection, this Research Handbook will prove a useful resource for information and media law students as well as academics researching fields such as data protection and privacy law and surveillance or security studies.
A Wall Street Journal Bestseller 'IT SHOULD BE READ BY ANYONE TRYING TO MAKE SENSE OF GEOPOLITICS TODAY' FINANCIAL TIMES Three of our most accomplished and deep thinkers come together to explore Artificial Intelligence (AI) and the way it is transforming human society - and what it means for us all. An AI learned to win chess by making moves human grand masters had never conceived. Another AI discovered a new antibiotic by analysing molecular properties human scientists did not understand. Now, AI-powered jets are defeating experienced human pilots in simulated dogfights. AI is coming online in searching, streaming, medicine, education, and many other fields and, in so doing, transforming how humans are experiencing reality. In The Age of AI, three leading thinkers have come together to consider how AI will change our relationships with knowledge, politics, and the societies in which we live. The Age of AI is an essential roadmap to our present and our future, an era unlike any that has come before.
Revealing the politics underlying the rapid globalization of facial recognition technology (FRT), this topical book provides a cutting-edge, critical analysis of the expanding global market for FRT, and the rise of the transnational social movement that opposes it. With the use of FRT for policing, surveillance, and business steadily increasing, this book provides a timely examination of both the benefits of FRT, and the threats it poses to privacy rights, human rights, and civil liberties. Interviews with analysts and activists with expertise in FRT find that the anti-FRT movement is highly uneven, with disproportionate influence in Western democracies and relatively little influence in authoritarian states and low-income countries in the developing world. Through a global analysis of the uptake and regulation of FRT, chapters create a holistic understanding of the politics behind this technology. Concluding with a look towards the future prospects of FRT in the face of the growing size, reach, and power of its opposition, the book reflects more broadly on the power of transnational social movements and civil society activism to prevent the globalization and normalization of new technologies. A visionary exploration of FRT, this book will be invaluable to students and scholars of politics and policy, alongside activists, stakeholders, and policy makers interested in the growing power of social movements to resist new technology.
The path forward to rein in online surveillance, AI, and tech monopolies. Technology is a gift and a curse. The five Big Tech companies―Meta, Apple, Amazon, Microsoft, and Google―have built innovative products that improve many aspects of our lives. But their intrusiveness and our dependence on them have created pressing threats to our civil rights, economy, and democracy. Coming from an extensive background building Silicon Valley-based tech startups, Tom Kemp eloquently and precisely weaves together the threats posed by Big Tech:
This richly detailed book exposes the consequences of Big Tech's digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices. It offers actionable solutions to these problems and a clear path forward for individuals and policymakers to advocate for change. By containing the excesses of Big Tech, we will ensure our civil rights are respected and preserved, our economy is competitive, and our democracy is protected.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
Digital Forensics and Cyber Investigation equips students, law enforcement officers, government employees, business employees, and cybersecurity practitioners with the competencies and fundamental knowledge base they need to tackle issues involving cybercrime and cyber investigations. The book introduces readers to process of conducting successful forensic examinations of digital devices and computer networks through hands-on practice and comprehensive exploration of cyber-investigation techniques. Over the course of 15 chapters, readers gain foundational knowledge on cybercrime-focused digital forensics and develop their ability to apply this knowledge to cybercrime cases. Opening chapters examine computer ethics in cybercrime investigation and cybersecurity practice, the basics of information technology, mobile forensics, and email evidence and analysis. In additional chapters, students learn about electronic vandalism, phishing scams, geo-localization and cyberspace detection, and dark web investigation. They are provided with historical overviews and proven frameworks for developing strategic plans to counter cybersecurity and cyberterrorism attempts and attacks. Providing readers with essential, timely knowledge, Digital Forensics is an ideal resource for students and practitioners in the fields of digital forensics and cybercrime investigation.
In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.
Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online - a man who became a spy, a whistleblower, and, in exile, the Internet's conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
In Online Predators, An Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings his ten plus years' experience in the fight against online child exploitation to bear in an easy to follow guide for all with a stake in the life of a child. This book equips parents, guardians, extended family, and educational professionals with practical strategies to help keep kids safe in a technology connected world. Instead of focusing on ever changing technology, Lee proposes a key fundamental change in the fight against online predation-to develop an insatiable curiosity about their child's online life, then get in the front lines and stay there.
Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.
Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.
The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.
The notion of surveillance has become increasingly more crucial in public conversation as new tools of observation are obtained by many different players. The traditional notion of "overseeing" is being increasingly replaced by multi-level surveillance where many different actors, at different levels of hierarchy, from the child surveilling the parent to the state surveilling its citizens, are entering the surveillance theater. This creates a unique surveillance ecosystem where the individual is observed not only as an analog flesh-and-blood body moving through real spaces such as a shopping mall, but also tracked as a data point where the volume of data is perpetually and permanently expanding as the digital life story is inscribed in the digital spaces. The combined narrative of the individual is now under surveillance. Modern Day Surveillance Ecosystem and Impacts on Privacy navigates the reader through an understanding of the self as a narrative element that is open for observation and analysis. This book provides a broad-based and theoretically grounded look at the overall processes of surveillance in a global system. Covering topics including commodity, loss of privacy, and big data, this text is essential for researchers, government officials, policymakers, security analysts, lawmakers, teachers, professors, graduate and undergraduate students, practitioners, and academicians interested in communication, technology, surveillance, privacy, and more. |
You may like...
Privacy and Security Policies in Big…
Sharvari Tamane, Vijender Kumar Solanki, …
Hardcover
R5,523
Discovery Miles 55 230
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, …
Hardcover
R2,977
Discovery Miles 29 770
Deaver on Cybersecurity - An irreverent…
Frederic Scott Deaver
Hardcover
R1,782
Discovery Miles 17 820
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R3,937
Discovery Miles 39 370
Security Issues and Privacy Threats in…
Parikshit N. Mahalle, Gitanjali R. Shinde, …
Hardcover
R4,907
Discovery Miles 49 070
Handbook of Reinforcement Learning and…
Kyriakos G. Vamvoudakis, Yan Wan, …
Hardcover
R6,343
Discovery Miles 63 430
Cyber Warfare and Terrorism - Concepts…
Information Reso Management Association
Hardcover
R10,926
Discovery Miles 109 260
|