Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.
The subjects of this volume are more relevant than ever, especially in light of the raft of electoral scandals concerning voter profiling. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the twelfth annual International Conference on Computers, Privacy and Data Protection, CPDP, held in Brussels in January 2019. The book explores the following topics: dataset nutrition labels, lifelogging and privacy by design, data protection iconography, the substance and essence of the right to data protection, public registers and data protection, modelling and verification in data protection impact assessments, examination scripts and data protection law in Cameroon, the protection of children's digital rights in the GDPR, the concept of the scope of risk in the GDPR and the ePrivacy Regulation. This interdisciplinary book has been written at a time when the scale and impact of data processing on society - not only on individuals, but also on social systems - is becoming ever starker. It discusses open issues as well as daring and prospective approaches, and will serve as an insightful resource for readers with an interest in computers, privacy and data protection.
If you think Bitcoin is just an alternative currency for geeks, it's time to think again. Grokking Bitcoin opens up this powerful distributed ledger system, exploring the technology that enables applications both for Bitcoin-based financial transactions and using the blockchain for registering physical property ownership. With this fully illustrated, easy-to-read guide, you'll finally understand how Bitcoin works, how you can use it, and why you can trust the blockchain. Grokking Bitcoin explains why Bitcoin’s supporters trust it so deeply, and why you can too. This approachable book will introduce you to Bitcoin’s groundbreaking technology, which is the key to this world-changing system. This illustrated, easy-to-read guide prepares you for a new way of thinking with easy-to-follow diagrams and exercises. You’ll discover how Bitcoin mining works, how to accept Bitcoin, how to participate in the Bitcoin network, and how to set up a digital wallet.
View the Table of Contents. aThis comprehensive analysis of privacy in the information age
challenges traditional assumptions that breeches of privacy through
the development of electronic dossiers involve the invasion of
oneas private space.a "The Digital Person challenges the existing ways in which law
and legal theory approach the social, political, and legal
implications of the collection and use of personal information in
computer databases. Solove's book is ambitious, and represents the
most important publication in the field of information privacy law
for some years." "Anyone concerned with preserving privacy against technology's
growing intrusiveness will find this book enlightening." "Solove . . . truly understands the intersection of law and
technology. This book is a fascinating journey into the almost
surreal ways personal information is hoarded, used, and abused in
the digital age." "Daniel Solove is one of the most energetic and creative
scholars writing about privacy today. The Digital Person is an
important contribution to the privacy debate, and Solove's
discussion of the harms of what he calls 'digital dossiers' is
invaluable." "Powerful theme." "This is not only a book you should read, but you should make
sure your friends read it." "Solove offers a book that is both comprehensive and easy to
understand, discussing the changes that technology has brought to
our concept of privacy. An excellentstarting point for much needed
discussion." "An unusually perceptive discussion of one of the most vexing
problems of the digital age--our loss of control over our personal
information. It's a fascinating journey into the almost surreal
ways personal information is hoarded, used, and abused in the
digital age. I recommend his book highly." "Solove's book is the best exposition thus far about the threat
that computer databases containing personal data about millions of
Americans poses for information privacy." "Solove drives his points home through considerable
reconfiguration of the basic argument. Rather than casting blame or
urging retreat to a precomputer database era, the solution is seen
in informing individuals, challenging data collectors, and bringing
the law up-to-date." "If you want to find out what a mess the law of privacy is, how
it got that way, and whether there is hope for the future, then
read this book." "Solove evaluates the shortcomings of current approaches to
privacy as well as some useful and controversial ideas for striking
a new balance. Anyone who deals with privacy matters will find a
lot ot consider." "Solove's treatment of this particular facet is thoughtful,
thorough, concise, and occasionally laced with humor. The present
volume gives us reason to look forward to his future
contributions." "Solove's book is useful, particularly as an overview on how
these private and governmentdatabases grew in sophistication and
now interact with one another." "A far-reaching examination of how digital dossiers are shaping
our lives. Daniel Solove has persuasively reconceptualized privacy
for the digital age. A must-read." "The Digital Person is a detailed and approachable resource on
privacy issues and the laws that affect them." Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases--which Daniel J. Solove calls "digital dossiers"--has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy. The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world. The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY
Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.
The Federal Trade Commission (FTC) has worked on privacy issues for over forty years, and in 2000 began considering the privacy implications raised by consumers' growing use of mobile devices. More recently, the FTC hosted a mobile privacy panel discussion that focused on transparency. With so many players collecting and using consumer data, who should provide privacy information to consumers? Given the limited screen space of mobile devices, how can this information be conveyed? This book explores and offers suggestions for the major participants in the mobile ecosystem as they work to improve mobile privacy disclosures.
There is no comprehensive federal privacy statute that protects personal information. Instead, a patchwork of federal laws and regulations govern the collection and disclosure of personal information and has been addressed by Congress on a sector-by-sector basis. Some contend that this patchwork of laws and regulations is insufficient to meet the demands of today's technology. Congress, the Obama Administration, businesses, public interest groups and citizens are all involved in the discussion of privacy solutions. This book examines some of these efforts with respect to the protection of personal information and provides a brief overview of selected recent developments in the area of federal privacy law.
The disturbing reality of contemporary life is that technology has
laid bare the private facts of most people's lives. Email, cell
phone calls, and individual purchasing habits are no longer secret.
Individuals may be discussed on a blog, victimized by an inaccurate
credit report, or have their email read by an employer or
government agency without their knowledge. Government policy, mass
media, and modern technology pose new challenges to privacy rights,
while the law struggles to keep up with the rapid changes.
A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks work Computers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more about us than we should be comfortable with. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world? In this updated edition of Understanding the Digital World, Brian Kernighan explains how computer hardware, software, and networks work. Topics include how computers are built and how they compute; what programming is; how the Internet and web operate; and how all of these affect security, privacy, property, and other important social, political, and economic issues. Kernighan touches on fundamental ideas from computer science and some of the inherent limitations of computers, and new sections in the book explore Python programming, big data, machine learning, and much more. Numerous color illustrations, notes on sources for further exploration, and a glossary explaining technical terms and buzzwords are included. Understanding the Digital World is a must-read for readers of all backgrounds who want to know more about computers and communications.
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.
The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the tenth annual International Conference on Computers, Privacy and Data Protection, CPDP 2017, held in Brussels in January 2017. The book explores Directive 95/46/EU and the GDPR moving from a market framing to a 'treaty-base games frame', the GDPR requirements regarding machine learning, the need for transparency in automated decision-making systems to warrant against wrong decisions and protect privacy, the riskrevolution in EU data protection law, data security challenges of Industry 4.0, (new) types of data introduced in the GDPR, privacy design implications of conversational agents, and reasonable expectations of data protection in Intelligent Orthoses. This interdisciplinary book was written while the implications of the General Data Protection Regulation 2016/679 were beginning to become clear. It discusses open issues, and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in computers, privacy and data protection.
Media reform plays an increasingly important role in the struggle for social justice. As battles are fought over the future of investigative journalism, media ownership, spectrum management, speech rights, broadband access, network neutrality, the surveillance apparatus, and digital literacy, what effective strategies can be used in the pursuit of effective media reform? Prepared by thirty-three scholars and activists from more than twenty-five countries, Strategies for Media Reform focuses on theorizing media democratization and evaluating specific projects for media reform. This edited collection of articles offers readers the opportunity to reflect on the prospects for and challenges facing campaigns for media reform and gathers significant examples of theory, advocacy, and activism from multinational perspectives.
For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create "world order." Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.
|
You may like...
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud
Paperback
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R3,937
Discovery Miles 39 370
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, …
Hardcover
R6,101
Discovery Miles 61 010
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R738
Discovery Miles 7 380
|