0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (209)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Health Data Privacy under the GDPR - Big Data Challenges and Regulatory Responses (Paperback): Maria Tzanou Health Data Privacy under the GDPR - Big Data Challenges and Regulatory Responses (Paperback)
Maria Tzanou
R1,151 Discovery Miles 11 510 Ships in 12 - 17 working days

The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children's health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives, this book will appeal to those interested in privacy, data protection, big data, health sciences, information technology, the GDPR, EU and human rights law.

Privacy and Technologies of Identity - A Cross-Disciplinary Conversation (Hardcover, 2006 ed.): Katherine J. Strandburg,... Privacy and Technologies of Identity - A Cross-Disciplinary Conversation (Hardcover, 2006 ed.)
Katherine J. Strandburg, Daniela Stan Raicu
R4,772 R4,346 Discovery Miles 43 460 Save R426 (9%) Ships in 12 - 17 working days

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy.

This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition)
Branden Williams, James Adamson
R1,312 R1,228 Discovery Miles 12 280 Save R84 (6%) Ships in 12 - 17 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016): Edward J M Colbert, Alexander Kott Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R3,730 R2,689 Discovery Miles 26 890 Save R1,041 (28%) Ships in 12 - 17 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition): C Hadnagy Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition)
C Hadnagy
R899 R633 Discovery Miles 6 330 Save R266 (30%) Ships in 12 - 17 working days

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,989 Discovery Miles 99 890 Ships in 10 - 15 working days
What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Paperback): Shimon... What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Paperback)
Shimon Brathwaite
R1,152 Discovery Miles 11 520 Ships in 12 - 17 working days

1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses

The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover): Malcolm Warner, Mike Stone The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover)
Malcolm Warner, Mike Stone
R3,428 R1,284 Discovery Miles 12 840 Save R2,144 (63%) Ships in 12 - 17 working days

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.

Throughput Accounting in a Hyperconnected World (Hardcover): Ionica Oncioiu Throughput Accounting in a Hyperconnected World (Hardcover)
Ionica Oncioiu
R5,103 Discovery Miles 51 030 Ships in 12 - 17 working days

As economies globalize, the number and power of transnational companies increases, especially in developing countries. Relevant, reliable, and comparable financial information and a common business language are needed to ensure communication between all users of financial information. Throughput Accounting in a Hyperconnected World provides innovative insights into controversial debates regarding the configuration and use of accounting and finance information both internally within economic entities and through third parties. These debates underline the major responsibility of users when configuring accounting and finance models and thereby in modelling business information. The content within this publication covers risk analysis, social accounting, and entrepreneurial models and is designed for managers, accountants, risk managers, academics, researchers, practitioners, and students.

Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004): Neal Koblitz Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004)
Neal Koblitz; Appendix by A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
R4,945 Discovery Miles 49 450 Ships in 12 - 17 working days

This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.

Healthcare and Big Data - Digital Specters and Phantom Objects (Hardcover, 1st ed. 2016): Mary F.E. Ebeling Healthcare and Big Data - Digital Specters and Phantom Objects (Hardcover, 1st ed. 2016)
Mary F.E. Ebeling
R3,204 Discovery Miles 32 040 Ships in 12 - 17 working days

This highly original book is an ethnographic noir of how Big Data profits from patient private health information. The book follows personal health data as it is collected from inside healthcare and beyond to create patient consumer profiles that are sold to marketers. Primarily told through a first-person noir narrative, Ebeling as a sociologist-hard-boiled-detective, investigates Big Data and the trade in private health information by examining the information networks that patient data traverses. The noir narrative reveals the processes that the data broker industry uses to create data commodities-data phantoms or the marketing profiles of patients that are bought by advertisers to directly market to consumers. Healthcare and Big Data considers the implications these "data phantoms" have for patient privacy as well as the very real harm that they can cause.

Recommender Systems in Fashion and Retail - Proceedings of the Fourth Workshop at the Recommender Systems Conference (2022)... Recommender Systems in Fashion and Retail - Proceedings of the Fourth Workshop at the Recommender Systems Conference (2022) (Hardcover, 1st ed. 2023)
Humberto Jesus Corona Pampin, Reza Shirvany
R3,599 Discovery Miles 35 990 Ships in 12 - 17 working days

This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field. Recommender systems are often used to solve different complex problems in this scenario, such as product recommendations, size and fit recommendations, and social media-influenced recommendations (outfits worn by influencers).

Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover): Sunita Vikrant Dhavale Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover)
Sunita Vikrant Dhavale
R4,590 Discovery Miles 45 900 Ships in 12 - 17 working days
Privacy - Past, Present, and Future (Hardcover): Leslie N. Gruis Privacy - Past, Present, and Future (Hardcover)
Leslie N. Gruis
R3,724 Discovery Miles 37 240 Ships in 10 - 15 working days

Top analyst Leslie Gruis's timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.

Electronic Warfare in the Information Age (Hardcover): D.C. Schleher Electronic Warfare in the Information Age (Hardcover)
D.C. Schleher
R4,322 Discovery Miles 43 220 Ships in 10 - 15 working days

This is an advanced practitioner's guide to current concepts and threats associated with modern electronic warfare (EW). It identifies and explains the newest radar communications threats, and provides practical, "how-to" information on designing and implementing ECM and ECCM systems. The aim of the text is to help the reader develop ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates ESM receiving equipment, and outlines advanced ECM methods, including monopulse deception, coherent radar jamming, and high-ERP generation. Other sections cover modern ECCM countermeasure techniques, the impact of new stealth technology on ESM and ECM requirements, and jammer upgrading procedures.

Surveillance Valley - The Secret Military History of the Internet (Paperback): Yasha Levine Surveillance Valley - The Secret Military History of the Internet (Paperback)
Yasha Levine 1
R360 R294 Discovery Miles 2 940 Save R66 (18%) Ships in 9 - 15 working days

** Featured as a Guardian Long Read ** '[A] fast-paced, myth busting expose' Max Blumenthal, author of The Management of Savagery 'Contentious... forceful... salutary' The New Yorker EVERYTHING WE HAVE BEEN TOLD ABOUT THE DEMOCRATIC NATURE OF THE INTERNET IS A MARKETING PLOY. As the Cambridge Analytica scandal has shown, private corporations consider it their right to use our data (and by extension, us) which ever way they see fit. Tempted by their appealing organisational and diagnostic tools, we have allowed private internet corporations access to the most intimate corners of our lives. But the internet was developed, from the outset, as a weapon. Looking at the hidden origins of many internet corporations and platforms, Levine shows that this is a function, not a bug of the online experience. Conceived as a surveillance tool by ARPA to control insurgents in the Vietnam War, the internet is now essential to our lives. This book investigates the troubling and unavoidable truth of its history and the unfathomable power of the corporations who now more or less own it. Without this book, your picture of contemporary society will be missing an essential piece of the puzzle. 'A masterful job of research and reporting about the military origins of the 'world wide web' and how its essential nature has not changed in the years since its creation during the Cold War.' - Tim Shorrock, author of Spies For Hire

Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment,... Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare (Hardcover)
Lester Evans
R721 R600 Discovery Miles 6 000 Save R121 (17%) Ships in 10 - 15 working days
Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Hardcover): Sonali Vyas, Vinod Kumar Shukla,... Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Hardcover)
Sonali Vyas, Vinod Kumar Shukla, Shaurya Gupta, Ajay Prasad
R4,845 R4,007 Discovery Miles 40 070 Save R838 (17%) Ships in 9 - 15 working days

This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.

A Guide to Using the Anonymous Web in Libraries and Information Organizations - Enhancing Patron Privacy and Information Access... A Guide to Using the Anonymous Web in Libraries and Information Organizations - Enhancing Patron Privacy and Information Access (Paperback)
Brady D. Lund, Matthew A. Beckstrom
R947 R890 Discovery Miles 8 900 Save R57 (6%) Ships in 9 - 15 working days

A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services. It will be particularly useful to those seeking to promote enhanced privacy for their patrons. The book begins by explaining, in simple terms, what the anonymous web is, how it works, and its benefits for users. Lund and Beckstrom also explain why they believe access to the anonymous web should be provided in library and information organizations around the world. They describe how to provide access, as well as educate library users on how to utilize the anonymous web and navigate any challenges that might arise during implementation. The authors also encourage the development of library policies that guide appropriate conduct and filter content, where appropriate, in order to deter illegal activity. A Guide to Using the Anonymous Web in Libraries and Information Organizations reminds us that libraries and other information providers have a duty to educate and support their communities, while also preserving privacy. Demonstrating that the anonymous web can help them to fulfil these obligations, this book will be essential reading for library and information professionals working around the world.

Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023): Kui Ren, Cong Wang Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023)
Kui Ren, Cong Wang
R3,605 Discovery Miles 36 050 Ships in 12 - 17 working days

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,360 R1,212 Discovery Miles 12 120 Save R148 (11%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Global Challenges for Identity Policies (Hardcover): E. Whitley, G. Hosein Global Challenges for Identity Policies (Hardcover)
E. Whitley, G. Hosein
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

The goals of this book are to provide a comprehensive review of identity policies as they are being implemented in various countries around the world, to consider the key arenas where identity policies are developed and to provide intellectual coherence for making sense of these various activities.

Security and Privacy of Electronic Healthcare Records - Concepts, paradigms and solutions (Hardcover): Sudeep Tanwar, Sudhanshu... Security and Privacy of Electronic Healthcare Records - Concepts, paradigms and solutions (Hardcover)
Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar
R3,731 R3,265 Discovery Miles 32 650 Save R466 (12%) Ships in 10 - 15 working days

Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage. With the development of the IoT, the Cloud and Smart Cities frameworks, new privacy and security methods are being pursued to secure healthcare-based systems and platforms. Presenting a detailed framework as well as comparative case studies for security protection, data integrity, privacy preservation, scalability, and healthcare legislation, this edited volume covers state of the art research and addresses privacy and security methods and technologies for EHRs.

Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020):... Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020)
Peter Christen, Thilina Ranbaduge, Rainer Schnell
R4,291 Discovery Miles 42 910 Ships in 12 - 17 working days

This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and their computational aspects, practical considerations such as dealing with dirty and missing data, as well as privacy, risk, and performance assessment measures. Existing techniques for privacy-preserving record linkage are evaluated empirically and real-world application examples that scale to population sizes are described. The book also includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic data that can be used to test and evaluate linkage techniques. This book consists of fourteen chapters grouped into four parts, and two appendices. The first part introduces the reader to the topic of linking sensitive data, the second part covers methods and techniques to link such data, the third part discusses aspects of practical importance, and the fourth part provides an outlook of future challenges and open research problems relevant to linking sensitive databases. The appendices provide pointers and describe freely available, open-source software systems that allow the linkage of sensitive data, and provide further details about the evaluations presented. A companion Web site at https://dmm.anu.edu.au/lsdbook2020 provides additional material and Python programs used in the book. This book is mainly written for applied scientists, researchers, and advanced practitioners in governments, industry, and universities who are concerned with developing, implementing, and deploying systems and tools to share sensitive information in administrative, commercial, or medical databases. The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!David J. Hand, Imperial College, London

Privacy-Enhanced Business - Adapting to the Online Environment (Hardcover): Curtis D. Frye Privacy-Enhanced Business - Adapting to the Online Environment (Hardcover)
Curtis D. Frye
R2,699 Discovery Miles 26 990 Ships in 10 - 15 working days

With more than 200 million people online and their numbers on the rise, growing also is a perceived threat to personal privacy. A trend toward consumer protective legislation is developing in Europe and shows signs of developing in the U.S. Frye examines the new online environment, the national and international legislative scenarios that could affect the way online business is done, and proposes steps that would allow organizations to determine the policies best for themselves within privacy-enhanced environments. He lays out the privacy interests and concerns of Internet users in the context of privacy laws in Europe, Canada, and the U.S. Then, without demonizing or lionizing them, he looks impartially at how corporations could and might have to function under a variety of likely legislations. Frye's book, among the first to attempt the task, is a timely, much needed advisory-and warning-for top echelon executives in the public and private sectors both, particularly in marketing and sales, areas where privacy activists are concentrating their efforts. It is also an important source of information and thought for academics and their graduate-level students.

Frye introduces the Internet as a social and technological phenomenon by recounting briefly the early days of its predecessor, ARPANet. In the next chapters he fills in the policy background from a legal standpoint, explaining the thrust toward privacy that emerged through Supreme Court and lower court decisions. He then examines Internet economics, and from there turns to Internet-based advertising. He also covers the controversy over cookies and shows what Web users can do to visit Web sites without leaving crumbs. He introduces the infomediary, a type of organization that could allow consumers to maintain anonymity while still granting businesses access to detailed demographic and behavioral information. Frye describes a range of scenarios that could be played out over the next decade and offers specific steps that organizations can take to improve consumer confidence, maintain the flow of information they need, yet still demonstrate their compliance with consumer expectations as well as the law. Two appendices contain the full text of two documents vital to senior managers mapping their own corporate strategies: the European Union Data Directive and an EU Work Paper on the use of contracts to ensure the security of personally identifiable information that is transferred from the EU to other countries, such as the U.S., that lack their own adequate protections.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R291 R262 Discovery Miles 2 620
Information And Communications…
Dana van der Merwe Paperback R1,257 R1,116 Discovery Miles 11 160
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R426 R209 Discovery Miles 2 090
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,732 Discovery Miles 27 320
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,865 Discovery Miles 28 650

 

Partners