|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The notion of surveillance has become increasingly more crucial in
public conversation as new tools of observation are obtained by
many different players. The traditional notion of "overseeing" is
being increasingly replaced by multi-level surveillance where many
different actors, at different levels of hierarchy, from the child
surveilling the parent to the state surveilling its citizens, are
entering the surveillance theater. This creates a unique
surveillance ecosystem where the individual is observed not only as
an analog flesh-and-blood body moving through real spaces such as a
shopping mall, but also tracked as a data point where the volume of
data is perpetually and permanently expanding as the digital life
story is inscribed in the digital spaces. The combined narrative of
the individual is now under surveillance. Modern Day Surveillance
Ecosystem and Impacts on Privacy navigates the reader through an
understanding of the self as a narrative element that is open for
observation and analysis. This book provides a broad-based and
theoretically grounded look at the overall processes of
surveillance in a global system. Covering topics including
commodity, loss of privacy, and big data, this text is essential
for researchers, government officials, policymakers, security
analysts, lawmakers, teachers, professors, graduate and
undergraduate students, practitioners, and academicians interested
in communication, technology, surveillance, privacy, and more.
Emerging as an effective alternative to organization-based
information systems, cloud computing has been adopted by many
businesses around the world. Despite the increased popularity,
there remain concerns about the security of data in the cloud since
users have become accustomed to having control over their hardware
and software. Security, Trust, and Regulatory Aspects of Cloud
Computing in Business Environments compiles the research and views
of cloud computing from various individuals around the world.
Detailing cloud security, regulatory and industry compliance, and
trust building in the cloud, this book is an essential reference
source for practitioners, professionals, and researchers worldwide,
as well as business managers interested in an assembled collection
of solutions provided by a variety of cloud users.
Data collection allows today's businesses to cater to each
customer's individual needs and provides a necessary edge in a
competitive market. However, any breach in confidentiality can
cause serious consequences for both the consumer and the company.
The Handbook of Research on Emerging Developments in Data Privacy
brings together new ideas on how to deal with potential leaks of
valuable customer information. Highlighting the legal aspects of
identity protection, trust and security, and detection techniques,
this comprehensive work is a valuable resource for any business,
legal, or technology professional looking to improve information
security within their organization.
Breaches and identity theft involving medical data are on the rise.
Data security has become especially critical to the healthcare
industry as patient privacy hinges on legal compliance and secure
adoption of electronic health records. As cyber criminals see
medical data as an easy way to illegally obtain medical goods and
services or sell sensitive information, major security flaws can
pose serious threats to the health and safety of patients. The
Handbook of Research on Medical Data Security for Bioengineers
seeks to provide a cross-disciplinary forum on research in privacy
preserving healthcare systems and engineering applications in
medical data security. The goal of the book is to instigate
discussion on these critical issues since the success of electronic
healthcare applications depends directly on patient security and
privacy for ethical and legal reasons. While highlighting topics
including data privacy, encryption strategies, and smart health,
this book is ideally designed for IT experts, computer engineers,
biomedical engineer practitioners, professionals, researchers, and
post-doctoral and graduate students.
Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid,
to explain the phenomenal, yet under-researched relationship
between terrorists and media professionals in which acts of
terrorism and media coverage are exchanged, influenced, and fueled
by one another. Exchanging Terrorism Oxygen for Media Airwaves: The
Age of Terroredia provides a timely and thorough discussion on a
wide range of issues surrounding terrorism in relation to both
traditional and new media. Comprised of insights and research from
leading experts in the fields of terrorism and media studies, this
publication presents various topics relating to Terroredia:
understanding of terrorism and the role of the media, terrorism
manifestations and media representations of terrorism, types of
terrorism and media stereotypes of terrorism, terrorism tactics and
media strategies, the war on terrorism, the function of terrorism
and the employment of the media, new terrorism and new media,
contemporary cases of terrorist-media interactions, the rationality
behind terrorism and counterterrorism, as well as the
responsibility of the media. This publication is of interest to
government officials, media professionals, researchers, and
upper-level students interested in learning more about the complex
relationship between terrorism and the media.
Focused on the latest mobile technologies, this book addresses
specific features (such as IoT) and their adoptions that aim to
enable excellence in business in Industry 4.0. Furthermore, this
book explores how the adoption of these technologies is related to
rising concerns about privacy and trusted communication issues that
concern management and leaders of business organizations. Managing
IoT and Mobile Technologies with Innovation, Trust, and Sustainable
Computing not only targets IT experts and drills down on the
technical issues but also provides readers from various groups with
a well-linked concept about how the latest trends of mobile
technologies are closely related to daily living and the workplace
at managerial and even individual levels.
As data mining is one of the most rapidly changing disciplines with
new technologies and concepts continually under development,
academicians, researchers, and professionals of the discipline need
access to the most current information about the concepts, issues,
trends, and technologies in this emerging field.""Social
Implications of Data Mining and Information Privacy:
Interdisciplinary Frameworks and Solutions"" serves as a critical
source of information related to emerging issues and solutions in
data mining and the influence of political and socioeconomic
factors. An immense breakthrough, this essential reference provides
concise coverage of emerging issues and technological solutions in
data mining, and covers problems with applicable laws governing
such issues.
Technology has become profoundly integrated into modern society;
however, this increases the risk of vulnerabilities, such as
hacking and other system errors, along with other online threats.
Security, Privacy, and Anonymization in Social Networks: Emerging
Research and Opportunities is a pivotal reference source for the
most up-to-date research on edge clustering models and weighted
social networks. Presenting widespread coverage across a range of
applicable perspectives and topics, such as neighborhood attacks,
fast k-degree anonymization (FKDA), and vertex-clustering
algorithms, this book is ideally designed for academics,
researchers, post-graduates, and practitioners seeking current
research on undirected networks and greedy algorithms for social
network anonymization.
Personal Data Privacy and Protection in a Surveillance Era:
Technologies and Practices spans a number of interdependent and
emerging topics in the area of legal protection of privacy and
technology. This book explores the new threats that cyberspace
poses to the privacy of individuals, as well as the threats that
surveillance technologies generate in public spaces and in digital
communication. It examines media practices and privacy frameworks
in the fields of copyright, digital management and genetic
information. New models of data protection are proposed along with
their advantages and disadvantages.
Information security is moving much higher up the agenda of
corporate concerns. The pitfalls lying in wait of corporate
information are legion. If information is our most important asset,
then we must fortify ourselves for the task of protecting it
properly. This book is a compilation of contributed chapters by
researches and practitioners addressing issues, trends and
challenges facing the management of information security in this
new millennium. Information Security Management: Global Challenges
in the New Millennium focuses on aspects of information security
planning, evaluation, design and implementation.
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
Geared towards technical professionals, marketing managers,
finance/business strategists, law/policy makers, and educators
whose work involves e-commerce, this unique book provides a clear
overview of the legal and public policy issues associated with
computer networks and electronic transaction and security. It
identifies various forms of potential legal and commercial
liability, and advises what legal claims may be raised, by whom,
and the potential impact of these claims. Methods to reduce or
eliminate liability are discussed, offering practical, operational
guidance to professionals. The book also describes the legal rights
of computer system and electronic commerce operators that can be
applied to help preserve security and to recover in the event that
security is breached.
Smart healthcare systems, made up of advanced wearable devices,
internet of things (IoT) technologies and mobile internet
connectivity, allow significant medical information to be easily
and regularly transmitted over public networks. Personal patient
information and clinical records are stored on hospitals and
healthcare centres and can be accessed remotely by healthcare
workers. Due to the widespread increase in the sheer volume of
medical data being collected and created all the time, it has never
been more important to ensure that such information is collected,
stored and processed in a reliable and secure manner. This edited
book covers the recent trends in the field of medical information
processing, including prediction of complications using machine
learning and trends in visualization and image analysis. Further
chapters focus on information security and privacy solutions for
smart healthcare applications, including encryption of medical
information, privacy in smart IoT environments, medical image
watermarking and secure communication systems. Medical Information
Processing and Security: Techniques and applications can be used as
a reference book for practicing engineers, researchers and
scientists. It will also be useful for senior undergraduate and
graduate students, and practitioners from government and industry
as well as healthcare technology professionals working on
state-of-the-art security solutions for smart healthcare
applications.
This contributed volume discusses diverse topics to demystify the
rapidly emerging and evolving blockchain technology, the emergence
of integrated platforms and hosted third-party tools, and the
development of decentralized applications for various business
domains. It presents various applications that are helpful for
research scholars and scientists who are working toward identifying
and pinpointing the potential of as well as the hindrances to this
technology.
** Featured as a Guardian Long Read ** '[A] fast-paced, myth
busting expose' Max Blumenthal, author of The Management of
Savagery 'Contentious... forceful... salutary' The New Yorker
EVERYTHING WE HAVE BEEN TOLD ABOUT THE DEMOCRATIC NATURE OF THE
INTERNET IS A MARKETING PLOY. As the Cambridge Analytica scandal
has shown, private corporations consider it their right to use our
data (and by extension, us) which ever way they see fit. Tempted by
their appealing organisational and diagnostic tools, we have
allowed private internet corporations access to the most intimate
corners of our lives. But the internet was developed, from the
outset, as a weapon. Looking at the hidden origins of many internet
corporations and platforms, Levine shows that this is a function,
not a bug of the online experience. Conceived as a surveillance
tool by ARPA to control insurgents in the Vietnam War, the internet
is now essential to our lives. This book investigates the troubling
and unavoidable truth of its history and the unfathomable power of
the corporations who now more or less own it. Without this book,
your picture of contemporary society will be missing an essential
piece of the puzzle. 'A masterful job of research and reporting
about the military origins of the 'world wide web' and how its
essential nature has not changed in the years since its creation
during the Cold War.' - Tim Shorrock, author of Spies For Hire
Technological innovation and evolution continues to improve
personal and professional lifestyles, as well as general
organizational and business practices; however, these advancements
also create potential issues in the security and privacy of the
user's information. Innovative Solutions for Access Control
Management features a comprehensive discussion on the trending
topics and emergent research in IT security and governance.
Highlighting theoretical frameworks and best practices, as well as
challenges and solutions within the topic of access control and
management, this publication is a pivotal reference source for
researchers, practitioners, students, database vendors, and
organizations within the information technology and computer
science fields.
This book provides probabilistic, deterministic and
geolocation-aware approaches for adaptive connectivity, robust
security and privacy-aware communications for vehicular cyber
physical systems (CPS). It presents mathematical models and
numerical results obtained from experiments and simulations, and a
trade-off between connectivity, security and privacy for vehicular
communications. Connectivity between vehicles is crucial for
vehicular CPS. Intelligent vehicular CPS provides not only road
safety and traffic efficiency by exchanging information among
vehicles, but also offers infotainment services to passengers using
a variety of wireless technologies to forward the
traffic/trajectory information with Vehicle-to-Vehicle (V2V),
vehicular ad hoc network (VANET), and
Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book
covers how to ensure that the message received from other vehicles
is secure and trustworthy, rather than malicious. Further, it
reveals how to make sure that the privacy of participants is not
revealed while validating the received message. Researchers and
professionals working with vehicular networks, smart systems, cyber
physical systems, and mobile privacy will find this book valuable.
This book addresses the legal feasibility of ethnic data collection
and positive action for equality and anti-discrimination purposes,
and considers how they could be used to promote the Roma minority's
inclusion in Europe. The book's central aim is to research how a
societal problem can be improved upon from a legal perspective. The
controversy surrounding ethnic data collection and positive action
severely limits their use at the national level. Accordingly, legal
and political concerns are analysed and addressed in order to
demonstrate that it is possible to collect such data and to
implement such measures while fully respecting international and
European human rights norms, provided that certain conditions are
met. Part I focuses on ethnic data collection and explores the key
rules and principles that govern it, the ways in which this
equality tool could be used, and how potential obstacles might be
overcome. It also identifies and addresses the specific challenges
that arise when collecting ethnic data on the Roma minority in
Europe. In turn, Part II explores positive action and the broad
range of measures covered by the concept, before analysing the
applicable international and European framework. It reviews the
benefits and challenges of implementing positive action for Roma,
identifies best practices, and gives special consideration to
inter-cultural mediation in the advancement of Roma inclusion. The
book concludes with an overview of the main findings on both topics
and by identifying three essential elements that must be in place,
in addition to full respect for the applicable legal rules, in
order to combat discrimination and achieve the inclusion of Roma in
Europe by complementing existing anti-discrimination frameworks
with the collection of ethnic data and the implementation of
positive action schemes.
This book presents the data privacy protection which has been
extensively applied in our current era of big data. However,
research into big data privacy is still in its infancy. Given the
fact that existing protection methods can result in low data
utility and unbalanced trade-offs, personalized privacy protection
has become a rapidly expanding research topic.In this book, the
authors explore emerging threats and existing privacy protection
methods, and discuss in detail both the advantages and
disadvantages of personalized privacy protection. Traditional
methods, such as differential privacy and cryptography, are
discussed using a comparative and intersectional approach, and are
contrasted with emerging methods like federated learning and
generative adversarial nets. The advances discussed cover various
applications, e.g. cyber-physical systems, social networks, and
location-based services. Given its scope, the book is of interest
to scientists, policy-makers, researchers, and postgraduates alike.
|
You may like...
Bloedlelie
Jeanette Ferreira
Paperback
R320
R300
Discovery Miles 3 000
The New Kingdom
Wilbur Smith, Mark Chadbourn
Hardcover
(1)
R589
R530
Discovery Miles 5 300
|