|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The mobile threat landscape is evolving bringing about new forms of
data loss. No longer can organizations rely on security policies
designed during the PC era. Mobile is different and therefore
requires a revised approach to countermeasures to mitigate data
loss. Understanding these differences is fundamental to creating a
new defense-in-depth strategy designed for mobile. Mobile Data
Loss: Threats & Countermeasures reviews the mobile threat
landscape using a hacker mind-set to outline risks and attack
vectors that include malware, risky apps, operating system
compromises, network attacks, and user behaviours. This provides
the basis for then outlining countermeasures for defining a
holistic mobile security methodology that encompasses proactive
protections, response mechanisms, live monitoring, and incident
response. Designing a comprehensive mobile security strategy is
key. Mobile Data Loss: Threats & Countermeasures outlines the
threats and strategies for protecting devices from a plethora of
data loss vectors.
Over the course of the last year, a host of cyberattacks has been
perpetrated on a number of high profile American companies. The
high profile cyberattacks of 2014 and early 2015 appear to be
indicative of a broader trend: the frequency and ferocity of
cyberattacks are increasing, posing grave threats to the national
interests of the United States. While considerable debate exists
with regard to the best strategies for protecting America's various
cyber-systems and promoting cybersecurity, one point of general
agreement amongst cyber-analysts is the perceived need for enhanced
and timely exchange of cyber-threat intelligence both within the
private sector and between the private sector and the government.
This book examines the various legal issues that arise with respect
to the sharing of cybersecurity intelligence, with a special focus
on two distinct concepts: (1) sharing of cyber information within
the government's possession and (2) sharing of cyber-information
within the possession of the private sector. Furthermore, the
authors analyse the incentives for companies to share information
about cybersecurity breaches with other companies and the federal
government, and conclude with a discussion on several bills passed
on information sharing in cybersecurity.
What is the appropriate balance between privacy, security, and
accountability? What do we owe each other in terms of information
sharing and access? Why is privacy valuable and is it more or less
important than other values like security or free speech? Is Edward
Snowden a hero or villain? Within democratic societies, privacy,
security, and accountability are seen as important values that must
be balanced appropriately. If there is too much privacy, then there
may be too little accountability - and more alarmingly, too little
security. On the other hand, where there is too little privacy,
individuals may not have the space to grow, experiment, and engage
in practices not generally accepted by the majority. Moreover,
allowing overly limited control over access to and uses of private
places and information may itself be a threat to security. By
clarifying the moral, legal, and social foundations of privacy,
security, and accountability, this book helps determine the
appropriate balance between these contested values. Twelve
specially commissioned essays provide the ideal resource for
students and academics in information and applied ethics.
The Federal Trade Commission (FTC) has worked on privacy issues for
over forty years, and in 2000 began considering the privacy
implications raised by consumers' growing use of mobile devices.
More recently, the FTC hosted a mobile privacy panel discussion
that focused on transparency. With so many players collecting and
using consumer data, who should provide privacy information to
consumers? Given the limited screen space of mobile devices, how
can this information be conveyed? This book explores and offers
suggestions for the major participants in the mobile ecosystem as
they work to improve mobile privacy disclosures.
In this collection of essays that represent original and
interdisciplinary work, respected scholars address a number of
privacy issues. These include how governmental and private sectors
develop and deploy technologies that can pose serious compromises
to the privacy of individuals and groups; how information and
communication system designs pose threats to privacy; how we manage
private concerns (child care, job leave, and identity) as public
issues amenable to political action and shared awareness; and the
fundamental asymmetry of power that exists between individuals and
small groups on the one hand and large governmental and corporate
entities on the other. Arranged in three sections law and policy;
information technology; and information studies, history, and
sociology Privacy in America: Interdisciplinary Perspectives will
be useful to scholars, practitioners, and students in a variety of
fields, including information science, library science, and
information systems.
Matters of privacy have profoundly changed since electronic storage
of information has become the norm. Consequently, policy-makers and
legislators are trying to keep up with privacy challenges in the
workplace, in healthcare, in surveillance, and on social networking
sites. With Privacy: Defending an Illusion, Martin Dowding fills a
very important gap in policy analysis and the teaching of privacy
issues at the senior undergraduate and early graduate student
level. In the first section of this book, Dowding recounts
historical interpretations of privacy in a wide variety of
socio-cultural circumstances. In the second section, the author
addresses how information and communication technologies have
changed our conceptions about privacy and redirected our focus from
keeping information private to sharing it with many more people
than we would have even a few years ago. Dowding also examines a
variety of possible options for the future of privacy. The
appendixes include seminal readings on relevant topics that should
encourage debates about the nature of privacy and its problems.
Overall, this book provides a solid background for defining and
understanding privacy in a wide variety of contexts.
|
|