0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (231)
  • R500+ (812)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Privacy, Security and Accountability - Ethics, Law and Policy (Paperback): Adam D Moore Privacy, Security and Accountability - Ethics, Law and Policy (Paperback)
Adam D Moore
R1,470 Discovery Miles 14 700 Ships in 18 - 22 working days

What is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability - and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.

Mobile Privacy Disclosures - Recommendations of the Federal Trade Commission (Paperback): Julie C Hartell Mobile Privacy Disclosures - Recommendations of the Federal Trade Commission (Paperback)
Julie C Hartell
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

The Federal Trade Commission (FTC) has worked on privacy issues for over forty years, and in 2000 began considering the privacy implications raised by consumers' growing use of mobile devices. More recently, the FTC hosted a mobile privacy panel discussion that focused on transparency. With so many players collecting and using consumer data, who should provide privacy information to consumers? Given the limited screen space of mobile devices, how can this information be conveyed? This book explores and offers suggestions for the major participants in the mobile ecosystem as they work to improve mobile privacy disclosures.

Privacy in America - Interdisciplinary Perspectives (Paperback): William Aspray, Philip Doty Privacy in America - Interdisciplinary Perspectives (Paperback)
William Aspray, Philip Doty
R2,636 Discovery Miles 26 360 Ships in 18 - 22 working days

In this collection of essays that represent original and interdisciplinary work, respected scholars address a number of privacy issues. These include how governmental and private sectors develop and deploy technologies that can pose serious compromises to the privacy of individuals and groups; how information and communication system designs pose threats to privacy; how we manage private concerns (child care, job leave, and identity) as public issues amenable to political action and shared awareness; and the fundamental asymmetry of power that exists between individuals and small groups on the one hand and large governmental and corporate entities on the other. Arranged in three sections law and policy; information technology; and information studies, history, and sociology Privacy in America: Interdisciplinary Perspectives will be useful to scholars, practitioners, and students in a variety of fields, including information science, library science, and information systems.

Privacy - Defending an Illusion (Paperback): Martin Dowding Privacy - Defending an Illusion (Paperback)
Martin Dowding
R1,862 Discovery Miles 18 620 Ships in 18 - 22 working days

Matters of privacy have profoundly changed since electronic storage of information has become the norm. Consequently, policy-makers and legislators are trying to keep up with privacy challenges in the workplace, in healthcare, in surveillance, and on social networking sites. With Privacy: Defending an Illusion, Martin Dowding fills a very important gap in policy analysis and the teaching of privacy issues at the senior undergraduate and early graduate student level. In the first section of this book, Dowding recounts historical interpretations of privacy in a wide variety of socio-cultural circumstances. In the second section, the author addresses how information and communication technologies have changed our conceptions about privacy and redirected our focus from keeping information private to sharing it with many more people than we would have even a few years ago. Dowding also examines a variety of possible options for the future of privacy. The appendixes include seminal readings on relevant topics that should encourage debates about the nature of privacy and its problems. Overall, this book provides a solid background for defining and understanding privacy in a wide variety of contexts.

Social Security Numbers & ID Theft (Hardcover, New): Felipe D. Sorrells Social Security Numbers & ID Theft (Hardcover, New)
Felipe D. Sorrells
R2,361 Discovery Miles 23 610 Ships in 10 - 15 working days

This book explores the use of Social Security Numbers (SSN) and Identity Theft. The SSN was created in 1936 for the purpose of tracking workers' earnings for benefits purposes. Since that time, however, SSN usage has expanded to encompass a myriad of purposes well beyond the operation of the Social Security system. This book describes how criminals acquire SSNs and how they use them to commit identity theft. How organisations such as financial institutions, insurers, universities, health care entities, government agencies, and innumerable other organisations use this nine-digit sequence as a default identifier is also examined. Furthermore, existing statutes, regulations and private sector efforts designed to protect SSNs are looked at, including data security and data breach notification laws. This book concludes with specific FTC recommendations, which address both the supply and demand aspects of the SSN problem by proposing actions that would make SSNs less available to identify thieves, and would make it more difficult for them to misuse those SSNs they are able to obtain. This is an edited, excerpted and augmented edition of a Federal Trade Commission and GAO publication.

Privacy in the Information Age (Paperback): Fred H Cate Privacy in the Information Age (Paperback)
Fred H Cate
R719 Discovery Miles 7 190 Ships in 18 - 22 working days

Electronic information networks offer extraordinary advantages to business, government, and individuals in terms of power, capacity, speed, accessibility, and cost. But these same capabilities present substantial privacy issues. With an unprecedented amount of data available in digital format--which is easier and less expensive to access, manipulate, and store--others know more about you than ever before.

Consider this: data routinely collected about you includes your health, credit, marital, educational, and employment histories; the times and telephone numbers of every call you make and receive; the magazines you subscribe to and the books your borrow from the library; your cash withdrawals; your purchases by credit card or check; your electronic mail and telephone messages; where you go on the World Wide Web. The ramifications of such a readily accessible storehouse of information are astonishing.

Governments have responded to these new challenges to personal privacy in a wide variety of ways. At one extreme, the European Union in 1995 enacted sweeping regulation to protect personal information; at the other extreme, privacy law in the United States and many other countries is fragmented, inconsistent, and offers little protection for privacy on the internet and other electronic networks.

For all the passion that surrounds discussions about privacy, and the recent attention devoted to electronic privacy, surprisingly little consensus exists about what privacy means, what values are served--or compromised--by extending further legal protection to privacy, what values are affected by existing and proposed measures designed to protect privacy, and what principles should undergird a sensitive balancing of those values.

In this book, Fred Cate addresses these critical issues in the context of computerized information. He provides an overview of the technologies that are provoking the current privacy debate and discusses the range of legal issues that these technologies raise. He examines the central elements that make up the definition of privacy and the values served, and liabilities incurred, by each of those components. Separate chapters address the regulation of privacy in Europe and the United States. The final chapter identifies four sets of principles for protecting information privacy. The principles recognize the significance of individual and collective nongovernmental action, the limited role for privacy laws and government enforcement of those laws, and the ultimate goal of establishing multinational principles for protecting information privacy.

Privacy in the Information Age involves questions that cut across the fields of business, communications, economics, and law. Cate examines the debate in provocative, jargon-free, detail.

Regulating Privacy - Data Protection and Public Policy in Europe and the United States (Paperback, New): Colin J. Bennett Regulating Privacy - Data Protection and Public Policy in Europe and the United States (Paperback, New)
Colin J. Bennett
R1,541 Discovery Miles 15 410 Ships in 18 - 22 working days

The information revolution has brought with it the technology for easily collecting personal information about individuals, a facility that inherently threatens personal privacy. Colin J. Bennett here examines political responses to the data protection issue in four Western democracies, comparing legislation that the United States, Britain, West Germany, and Sweden forged from the late 1960's to the 1980's to protect citizens from unwanted computer dissemination of personal information. Drawing on an extensive body of interviews and documentary evidence, Bennett considers how the four countries, each with different cultural traditions and institutions, formulated fair information policy. He finds that their computer regulatory laws are based on strikingly similar statutory principles, but that enforcement of these principles varies considerably: the United States relies on citizen initiative and judicial enforcement; Britain uses a registration system; Germany has installed an ombudsman; and Sweden employs a licensing system. Tracing the impact of key social, political, and technological factors on the ways different political systems have controlled the collection and communication of information, Bennett also deepens our understanding of policymaking theory. Regulating Privacy will be welcomed by political sciences-especially those working in comparative public policy, American politics, organization theory, and technology and politics-political economists, information systems analysts, and others concerned with issues of privacy.

Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Hardcover, Second... Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Hardcover, Second Edition)
Theresa Payton, Ted Claypoole
R958 Discovery Miles 9 580 Ships in 18 - 22 working days

A thorough update to a classic in the field of privacy and big data. We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet. The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people's sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year. People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end. These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of "contactless everything" became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don't know how. The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future. While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven't in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.

Freedom to Think - The Long Struggle to Liberate Our Minds (Hardcover, Main): Susie Alegre Freedom to Think - The Long Struggle to Liberate Our Minds (Hardcover, Main)
Susie Alegre
R545 Discovery Miles 5 450 Ships in 10 - 15 working days

BOOKS TO LOOK OUT FOR IN 2022, NEW STATESMAN & CITY AM Chosen as one of the Financial Time's Best Summer Books of 2022 Longlisted for the Moore Prize for Human Rights Writing 'Compelling, powerful and necessary.' Shoshana Zuboff, author of The Age of Surveillance Capitalism 'Fascinating' Guardian Without a moment's pause, we share our most intimate thoughts with trillion-dollar tech companies. Their algorithms categorize us and jump to troubling conclusions about who we are. They also shape our everyday thoughts, choices and actions - from who we date to whether we vote. But this is just the latest front in an age-old struggle. Part history and part manifesto, Freedom to Think explores how the powerful have always sought to influence how we think and what we buy. Connecting the dots from Galileo to Alexa, human rights lawyer Susie Alegre charts the history and fragility of our most important human right: freedom of thought. Filled with shocking case-studies across politics, criminal justice, and everyday life, this ground-breaking book shows how our mental freedom is under threat like never before. Bold and radical, Alegre argues that only by recasting our human rights for the digital age can we safeguard our future.

How to Disappear - Erase Your Digital Footprint, Leave False Trails, And Vanish Without A Trace (Paperback): Frank Ahearn,... How to Disappear - Erase Your Digital Footprint, Leave False Trails, And Vanish Without A Trace (Paperback)
Frank Ahearn, Eileen Horan
R500 Discovery Miles 5 000 Ships in 18 - 22 working days

For the first time in paperback we bring you the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who's ever entertained the fantasy of disappearing-whether actually dropping out of sight or by eliminating the traceable evidence of their existence. Written by the world's leading experts on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker. Frank Ahearn and Eileen Horan provide field-tested methods for maintaining privacy, as well as tactics and strategies for protecting personal information and preventing identity theft. They explain and illustrate key tactics such as misinformation (destroying all the data known about you); disinformation (creating fake trails); and, finally, reformation-the act of getting you from point A to point B without leaving clues. Ahearn illustrates every step with real-life stories of his fascinating career, from undercover work to nab thieving department store employees to a stint as a private investigator; and, later, as a career "skip tracer" who finds people who don't want to be found. In 1997, when news broke of President Bill Clinton's dalliance with a White House intern, Ahearn was hired to find her. When Oscar statuettes were stolen in Beverly Hills, Ahearn pinpointed a principal in the caper to help solve the case. When Russell Crowe threw a telephone at a hotel clerk in 2005, Ahearn located the victim and hid him from the media. An indispensable resource not just for those determined to become utterly anonymous, but also for just about anyone in the brave new world of on-line information, How to Disappear sums up Ahearn's dual philosophy: Don't break the law, but know how to protect yourself.

Privacy and the Media (Paperback): Andrew McStay Privacy and the Media (Paperback)
Andrew McStay
R1,283 Discovery Miles 12 830 Ships in 18 - 22 working days

Questions of privacy are critical to the study of contemporary media and society. When we're more and more connected to devices and to content, it's increasingly important to understand how information about ourselves is being collected, transmitted, processed, and mediated. Privacy and the Media equips students to do just that, providing a comprehensive overview of both the theory and reality of privacy and the media in the 21st Century. Offering a rich overview of this crucial and topical relationship, Andy McStay: Explores the foundational topics of journalism, the Snowden leaks, and encryption by companies such as Apple Considers commercial applications including behavioural advertising, big data, algorithms, and the role of platforms such as Google and Facebook Introduces the role of the body with discussions of emotion, wearable media, peer-based privacy, and sexting Encourages students to put their understanding to work with suggestions for further research, challenging them to explore how privacy functions in practice. Privacy and the Media is not a polemic on privacy as 'good' or 'bad', but a call to assess the detail and the potential implications of contemporary media technologies and practices. It is essential reading for students and researchers of digital media, social media, digital politics, and the creative and cultural industries. 'Privacy and the Media is a thoughtful survey of the privacy landscape. McStay reviews the intricate tensions and seeming contradictions to offer an accessible book for anyone curious about the contemporary debates in privacy.' - danah boyd, author of It's Complicated and founder of Data & Society 'McStay's great achievement here is to confront many of the pertinent and complex questions about media and privacy in a style that is both authoritative and easy to read... His book will prove an excellent companion for all students of this fascinating and crucial topic.' - Mireille Hildebrandt, Vrije Universiteit Brussel 'Clearly and accessibly written, this book is a great resource for anyone interested in the broad range of ways in which privacy and contemporary media are entangled and in the big picture of privacy/media relations today... I will definitely be assigning it for my students.' - Helen Kennedy, University of Sheffield

Strategic Cyber Deterrence - The Active Cyber Defense Option (Paperback): Scott Jasper Strategic Cyber Deterrence - The Active Cyber Defense Option (Paperback)
Scott Jasper
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors' advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors' objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.

Analyzing and Securing Social Networks (Hardcover): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Hardcover)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R3,703 Discovery Miles 37 030 Ships in 10 - 15 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Student Data Privacy - Building a School Compliance Program (Paperback): Linnette Attai Student Data Privacy - Building a School Compliance Program (Paperback)
Linnette Attai
R918 Discovery Miles 9 180 Ships in 18 - 22 working days

Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Categories of Symmetries and…
Yu A. Neretin Hardcover R7,211 Discovery Miles 72 110
Research Developments in Wood…
Alfredo Aguilera, J. Paulo Davim Hardcover R4,192 Discovery Miles 41 920
ROMANSY 18 - Robot Design, Dynamics and…
Werner Schiehlen, Vincenzo Parenti-Castelli Hardcover R5,228 Discovery Miles 52 280
Handbook of Recycled Concrete and…
Fernando Pacheco Torgal, Yining Ding Hardcover R5,082 Discovery Miles 50 820
Approximation Methods in Science and…
Reza N. Jazar Hardcover R4,788 Discovery Miles 47 880
The Indian Paleogene
Sunil Bajpai, Satish C. Tripathi, … Hardcover R4,090 Discovery Miles 40 900
Asteroseismology
C. Aerts, J. Christensen-Dalsgaard, … Hardcover R6,636 Discovery Miles 66 360
Quaternary Glaciations - Extent and…
J. Ehlers, P.L. Gibbard, … Hardcover R5,611 Discovery Miles 56 110
Adaptive Optics for Astronomy
D.M. Alloin, Jean-Marie Mariotti Hardcover R5,333 Discovery Miles 53 330
The Finite Element Method for Fluid…
Olek C. Zienkiewicz, R.L. Taylor, … Hardcover R2,908 R2,735 Discovery Miles 27 350

 

Partners