0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (118)
  • R250 - R500 (228)
  • R500+ (825)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications (Hardcover, 1st ed. 2016): Wen Ming... Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications (Hardcover, 1st ed. 2016)
Wen Ming Liu, Lingyu Wang
R3,449 Discovery Miles 34 490 Ships in 10 - 15 working days

This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R540 Discovery Miles 5 400 Ships in 10 - 15 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R968 R873 Discovery Miles 8 730 Save R95 (10%) Ships in 10 - 15 working days
Improving Information Security Practices through Computational Intelligence (Hardcover): Wasan Shaker Awad, El-Sayed M El-Alfy,... Improving Information Security Practices through Computational Intelligence (Hardcover)
Wasan Shaker Awad, El-Sayed M El-Alfy, Yousif Al-Bastaki
R5,692 Discovery Miles 56 920 Ships in 10 - 15 working days

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computation Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

E-Commerce Law in Europe and the USA (Hardcover, 2002 ed.): Gerald Spindler, Fritjof Boerner E-Commerce Law in Europe and the USA (Hardcover, 2002 ed.)
Gerald Spindler, Fritjof Boerner
R4,758 Discovery Miles 47 580 Ships in 10 - 15 working days

This unique text deals with the most important legal areas for e-commerce related business in most of the member states in Europe as well as the USA. In doing so the text takes into consideration the national law of the following countries: Belgium, France, Germany, Great Britain, Italy, Netherlands, Norway, Spain, Switzerland, and the USA. Topics that are dealt with include: contract law, consumer protection, intellectual property law, unfair competition, antitrust law, liability of providers, money transactions, privacy and data protection. The country-specific contributions follow a questionnaire which can be found in the beginning. The uniform structure of each contribution enables the reader to quickly find an answer to a legal question. All contributions have been written by experts from each member state.

From Anarchy to Power - The Net Comes of Age (Hardcover): Wendy Grossman From Anarchy to Power - The Net Comes of Age (Hardcover)
Wendy Grossman
R1,978 Discovery Miles 19 780 Ships in 10 - 15 working days

"Both newbies (newcomers to the Internet) and Netizens (old-timers) will find challenges and rewards in this witty, knowledgeable, and timely report from the electronic front."
--"Publishers Weekly"

"Vividly describes the virtual realm as a place of interconnecting communities every bitas complicated, exciting, and dangerous as any city."
--"Booklist"

"A pleasant antidote to the breathless rhetoric one finds in many books and magazines devoted to computer culture."
--"Technology Review"

"Grossman brings a wealth of professional and personal experience to the material-and a clarity of style and analysis that is a welcome relief from both the hyperbolic prose of many Net boosters and the overwrought jeremiads of cyberphobes."
--"Reason"

"There is a lot to like about this survey, especially the diligent research and reading the author has invested in it. The endnotes are vast and informative..."From Anarchy to Power" gathers strengh as it goes along."
--"The Christian Century"

"An informative exploration into many of the issues and problems that plague the Net today...From Anarchy to Power is a must read."
-- "ComputerUser.com"

companion website: http: //www.nyupress.org/fap

Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure.

In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture?

We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading.

Privacy and the Digital State - Balancing Public Information and Personal Privacy (Hardcover): Alan Charles Raul Privacy and the Digital State - Balancing Public Information and Personal Privacy (Hardcover)
Alan Charles Raul
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

Alan Charles Raul The devastating and reprehensible acts of terrorism committed against the 11, 2001 have greatly affected our lives, our United States on September livelihoods, and perhaps our way of living. The system of government embodied in our Constitution and Bill of Rights was designed to inhibit excessively efficient government. By imposing checks and balances against over-reaching governmental power, the Founders intended to promote the rule of laws, not men - and to protect the prerogatives of citizens over and above their rulers. No faction was to become so powerful that the rights and interests of any other groups or individuals could be easily trampled. Specifically, the Framers of our constitutional structure prohibited the government from suppressing speech, inhibiting the right of free association, of people, conducting unreasonable preventing (peaceful) assemblies searches and seizures, or acting without observing the dictates of due process and fair play. After September 11, there is a risk that the philosophical protections of the Constitution could appear more than a trifle "academic. " Indeed, our tradional notions of "fair play" will be sorely tested in the context of our compelling requirements for effective self-defense against brutal, evil killers who hate the very idea of America. Now that we witness the grave physical dangers that confront our families, friends, neighbors, and businesses, our commitment to limited government and robust individual liberties will of our inevitably - and understandably - be challenged.

Privacy and the Commercial Use of Personal Information (Hardcover, 2002 ed.): Paul H. Rubin, Thomas M. Lenard Privacy and the Commercial Use of Personal Information (Hardcover, 2002 ed.)
Paul H. Rubin, Thomas M. Lenard
R2,941 Discovery Miles 29 410 Ships in 10 - 15 working days

The current debate over privacy presents some of the most complex policy-making challenges we have seen in some time. While data on consumers have long been used for marketing purposes, the Internet has substantially increased the flow of personal information. This has produced great benefits, but it also has raised concerns on the part of individuals about what information is being collected, how it is being used and who has access to it. These concerns, in turn, have led to calls for new government regulation. This study focuses on the market for personal information used for advertising and marketing purposes, which is the market affected by most of the regulatory and legislative proposals now under consideration. Unfortunately, there has been little careful analysis of these proposals and their likely consequences. This book attempts to fill this gap by addressing the following basic questions: Are there failures' in the market for personal information? If market failures exist, how do they adversely affect consumers? Can such failures be remedied by government regulation? Would the benefits of government regulation exceed the costs? A/LISTA The authors find that the commercial market for information appears to be working well and is responding to consumers' privacy concerns. They conclude that regulation imposed on a medium like the Internet that is changing so rapidly would have unpredictable and costly consequences. This study is a product of The Progress & Freedom Foundation's project on Regulating Personal Information: Balancing Benefits and Costs. The Progress & Freedom Foundation studies the impact of the digital revolution and its implications for public policy. It conductsresearch in fields such as electronic commerce, telecommunications and the impact of the Internet on government, society and economic growth. It also studies issues such as the need to reform government regulation, especially in technology-intensive fields such as medical innovation, energy and environmental regulation.

Humans and Machines at Work - Monitoring, Surveillance and Automation in Contemporary Capitalism (Hardcover, 1st ed. 2018):... Humans and Machines at Work - Monitoring, Surveillance and Automation in Contemporary Capitalism (Hardcover, 1st ed. 2018)
Phoebe Moore, Martin Upchurch, Xanthe Whittaker
R4,181 Discovery Miles 41 810 Ships in 10 - 15 working days

This edited collection provides a series of accounts of workers' local experiences that reflect the ubiquity of work's digitalisation. Precarious gig economy workers ride bikes and drive taxis in China and Britain; call centre workers in India experience invasive tracking; warehouse workers discover that hidden data has been used for layoffs; and academic researchers see their labour obscured by a 'data foam' that does not benefit them. These cases are couched in historical accounts of identity and selfhood experiments seen in the Hawthorne experiments and the lineage of automation. This book will appeal to scholars in the Sociology of Work and Digital Labour Studies and anyone interested in learning about monitoring and surveillance, automation, the gig economy and the quantified self in the workplace.

PAM Mastery (Hardcover): Michael W Lucas PAM Mastery (Hardcover)
Michael W Lucas
R953 R858 Discovery Miles 8 580 Save R95 (10%) Ships in 10 - 15 working days
Privacy and Data Protection Seals (Hardcover, 1st ed. 2018): Rowena Rodrigues, Vagelis Papakonstantinou Privacy and Data Protection Seals (Hardcover, 1st ed. 2018)
Rowena Rodrigues, Vagelis Papakonstantinou
R2,382 Discovery Miles 23 820 Ships in 10 - 15 working days

The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives. It covers data protection certification in the EU (i.e., the possibilities, actors and building blocks); the Schleswig-Holstein Data Protection Seal; the French Privacy Seal Scheme; privacy seals in the USA, Europe, Japan, Canada, India and Australia; controversies, challenges and lessons for privacy seals; the potential for privacy seals in emerging technologies; and an economic analysis. This book is particularly relevant in the EU context, given the General Data Protection Regulation (GDPR) impetus to data protection certification mechanisms and the dedication of specific provisions to certification. Its coverage of practices in jurisdictions outside the EU also makes it relevant globally. This book will appeal to European legislators and policy-makers, privacy and data protection practitioners, certification bodies, international organisations, and academics. Rowena Rodrigues is a Senior Research Analyst with Trilateral Research Ltd. in London and Vagelis Papakonstantinou is a Senior Researcher at the Vrije Universiteit Brussel in Brussels.

New Dimensions of Information Warfare (Hardcover, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Hardcover, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,585 Discovery Miles 45 850 Ships in 10 - 15 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

Cyber Security - Everything an Executive Needs to Know (Hardcover): Phillip Ferraro Cyber Security - Everything an Executive Needs to Know (Hardcover)
Phillip Ferraro
R681 R608 Discovery Miles 6 080 Save R73 (11%) Ships in 10 - 15 working days
Cyber Security. Simply. Make it Happen. - Leveraging Digitization Through IT Security (Hardcover, 1st ed. 2017): Ferri... Cyber Security. Simply. Make it Happen. - Leveraging Digitization Through IT Security (Hardcover, 1st ed. 2017)
Ferri Abolhassan
R1,992 R1,513 Discovery Miles 15 130 Save R479 (24%) Ships in 10 - 15 working days

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such as: How much will IT security cost? Who will provide IT security? Can security even be fun? The book claims that digitization will increasingly pervade all areas of the economy, as well as our daily professional and personal lives. It will produce speed, agility and cost efficiency, but also increasing vulnerability in the context of public, corporate and private life. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal devices.

Cybersecurity Exposed - The Cyber House Rules (Hardcover): Raef Meeuwisse Cybersecurity Exposed - The Cyber House Rules (Hardcover)
Raef Meeuwisse
R706 Discovery Miles 7 060 Ships in 10 - 15 working days
Medical Data Privacy Handbook (Hardcover, 1st ed. 2015): Aris Gkoulalas-Divanis, Grigorios Loukides Medical Data Privacy Handbook (Hardcover, 1st ed. 2015)
Aris Gkoulalas-Divanis, Grigorios Loukides
R8,481 Discovery Miles 84 810 Ships in 10 - 15 working days

This handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information. It presents privacy-preserving methods for medical data, ranging from laboratory test results to doctors' comments. The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations. Written by world-renowned leaders in this field, each chapter offers a survey of a research direction or a solution to problems in established and emerging research areas. The authors explore scenarios and techniques for facilitating the anonymization of different types of medical data, as well as various data mining tasks. Other chapters present methods for emerging data privacy applications and medical text de-identification, including detailed surveys of deployed systems. A part of the book is devoted to legislative and policy issues, reporting on the US and EU privacy legislation and the cost of privacy breaches in the healthcare domain. This reference is intended for professionals, researchers and advanced-level students interested in safeguarding medical data.

Designing for Privacy and its Legal Framework - Data Protection by Design and Default for the Internet of Things (Hardcover,... Designing for Privacy and its Legal Framework - Data Protection by Design and Default for the Internet of Things (Hardcover, 1st ed. 2018)
Aurelia Tamo-Larrieux
R4,378 Discovery Miles 43 780 Ships in 10 - 15 working days

This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.

Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015):... Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015)
Kristin E. Heckman, Frank J Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
R3,576 R2,552 Discovery Miles 25 520 Save R1,024 (29%) Ships in 10 - 15 working days

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.

Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover): Stefan Katzenbeisser, Fabien Peticolas Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover)
Stefan Katzenbeisser, Fabien Peticolas; Fabien Petitcolas, Stefan Katzenbeisser; Edited by F. Petticolas
R2,971 Discovery Miles 29 710 Ships in 10 - 15 working days

Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,238 Discovery Miles 102 380 Ships in 10 - 15 working days
Cybersecurity All-in-One For Dummies (Paperback): Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs Cybersecurity All-in-One For Dummies (Paperback)
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
R945 Discovery Miles 9 450 Ships in 10 - 15 working days

Over 700 pages of insight into all things cybersecurity Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization. Explore the basics of cybersecurity at home and in business Learn how to secure your devices, data, and cloud-based assets Test your security to find holes and vulnerabilities before hackers do Create a culture of cybersecurity throughout an entire organization This For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.

CIPM Certified Information Privacy Manager All-in-One Exam Guide (Paperback): Peter Gregory CIPM Certified Information Privacy Manager All-in-One Exam Guide (Paperback)
Peter Gregory
R1,054 Discovery Miles 10 540 Ships in 10 - 15 working days

This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP's rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates' abilities to design, build, and run information privacy management programs. Written by a security and privacy expert and experienced author, CIPM Certified Information Privacy Manager All-in-One Exam Guide is based on proven pedagogy and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. *Provides 100% coverage of all eight objectives for the CIPM exam *Online content includes 300 practice questions in the Total Tester exam engine *Written by a security and privacy expert, educator, and experienced author

Security and Privacy in Social Networks (Hardcover, 2013 ed.): Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony,... Security and Privacy in Social Networks (Hardcover, 2013 ed.)
Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland
R2,894 Discovery Miles 28 940 Ships in 10 - 15 working days

"Security and Privacy in Social Networks" brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

Privacy and Technologies of Identity - A Cross-Disciplinary Conversation (Hardcover, 2006 ed.): Katherine J. Strandburg,... Privacy and Technologies of Identity - A Cross-Disciplinary Conversation (Hardcover, 2006 ed.)
Katherine J. Strandburg, Daniela Stan Raicu
R4,578 Discovery Miles 45 780 Ships in 10 - 15 working days

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy.

This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.

Data Power - Radical Geographies of Control and Resistance (Hardcover): Jim E. Thatcher, Craig M. Dalton Data Power - Radical Geographies of Control and Resistance (Hardcover)
Jim E. Thatcher, Craig M. Dalton
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Learn to Design a Website for Your…
Michael Nelson, David Ezeanaka Hardcover R502 Discovery Miles 5 020
Discrete Systems With Memory
Ramon Alonso-Sanz Hardcover R4,493 Discovery Miles 44 930
Whispers from the depths - The Kariba…
Liz Wickins, Mike Wickins Paperback R250 R223 Discovery Miles 2 230
Models for Capitalizing on Web…
Ghazi I. Alkhatib Hardcover R5,240 Discovery Miles 52 400
The Foundations of Chaos Revisited: From…
Christos Skiadas Hardcover R3,586 Discovery Miles 35 860
Nested algorithms for optimal reservoir…
Blagoj Delipetrev Hardcover R4,919 Discovery Miles 49 190
The History of .Net Web Development and…
Iris Classon Hardcover R512 Discovery Miles 5 120
Dam Maintenance and Rehabilitation…
M. Cabrera Hardcover R3,839 Discovery Miles 38 390
Introduction Coding - Learn Python With…
Python Accademy Hardcover R756 R662 Discovery Miles 6 620
Optimization and Chaos
Mukul Majumdar, Tapan Mitra, … Hardcover R4,619 Discovery Miles 46 190

 

Partners