0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (122)
  • R250 - R500 (227)
  • R500+ (757)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

How Things Work - The Computer Science Edition (Hardcover): Charles F. Bowman How Things Work - The Computer Science Edition (Hardcover)
Charles F. Bowman
R3,937 Discovery Miles 39 370 Ships in 10 - 15 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

The Ethics of Cybersecurity (Hardcover, 1st ed. 2020): Markus Christen, Bert Gordijn, Michele Loi The Ethics of Cybersecurity (Hardcover, 1st ed. 2020)
Markus Christen, Bert Gordijn, Michele Loi
R3,163 Discovery Miles 31 630 Ships in 18 - 22 working days

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

Digital Privacy - Theory, Technologies, and Practices (Hardcover, illustrated edition): Alessandro Acquisti, Stefanos... Digital Privacy - Theory, Technologies, and Practices (Hardcover, illustrated edition)
Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina Di Vimercati
R3,950 Discovery Miles 39 500 Ships in 10 - 15 working days

While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental issues of concern for most Internet users, ranked higher than ease-of-use, spam, cost, and security. Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. Editors Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, established researchers whose work enjoys worldwide recognition, draw on contributions from experts in academia, industry, and government to delineate theoretical, technical, and practical aspects of digital privacy. They provide an up-to-date, integrated approach to privacy issues that spells out what digital privacy is and covers the threats, rights, and provisions of the legal framework in terms of technical counter measures for the protection of an individual's privacy. The work includes coverage of protocols, mechanisms, applications, architectures, systems, and experimental studies. Even though the utilization of personal information can improve customer services, increase revenues, and lower business costs, it can be easily misused and lead to violations of privacy. Important legal, regulatory, and ethical issues have emerged, prompting the need for an urgent and consistent response by electronic societies. Currently there is no book available that combines such a wide range of privacy topics with such a stellar cast of contributors. Filling that void, Digital Privacy: Theory, Techniques, and Practices gives you the foundation for building effective and legal privacy protocols into your business processes.

Privacy & Personality (Paperback): Russell L Ciochon Privacy & Personality (Paperback)
Russell L Ciochon
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

Like many concepts, privacy has a commonly accepted core of meaning with an indefinite or variable periphery. Some would wish to enlarge the core. It would be pointless to attempt to establish a definition by way of introduction to a series of essays that themselves provide no single definition. But the themes of freedom, justice, rational choice, and community always seem to appear in any discussion of privacy. "Privacy is a penultimate good. Perhaps, in certain usages--such as autonomy--it is an ultimate good, desirable for its own sake and grounded on nothing more final. Of course, the right of privacy may sometimes be asserted to conceal illegal or immoral acts. When that occurs, it appears to be put to an instrumental use. But, insofar as we justify such claims, it is not because they prevent the detection of immorality or violations of the law. Rather, at least in the case of illegal acts, it is because the means being challenged themselves violate privacy.

The individual control-human dignity foundation for privacy, is closely related to personality. Privacy provides relief from tension and opportunity for the development of intimate relations with others. All of us have standards of behavior that are higher than we can maintain at all times, and these standards are widely shared in the society in which we live. If we do not observe them we are likely to be criticized, or we fear that we shall be, and we suffer also from loss of self-esteem. Whether in some final sense the concept of privacy is culture bound is impossible to establish, in the absence of any known society in which elements of privacy are not to be found.

"J. Roland Pennock" was professor of political science at Swarthmore College for more than twenty-five years, as well as a fellow at the John Simon Guggenheim Memorial Foundation. "John W. Chapman" is professor emeritus of political science at the University of Pittsburgh.

Communicating Artificial Intelligence (AI) - Theory, Research, and Practice (Hardcover): Seungahn Nah, Jang Hyun Kim, Jungseock... Communicating Artificial Intelligence (AI) - Theory, Research, and Practice (Hardcover)
Seungahn Nah, Jang Hyun Kim, Jungseock Joo, Jasmine E. McNealy
R4,485 Discovery Miles 44 850 Ships in 10 - 15 working days

Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts. This book tackles these unexplored research areas with special emphasis on conditions, components, and consequences of cognitive, attitudinal, affective, and behavioural dimensions toward communication and AI. In doing so, this book epitomizes communication, journalism and media scholarship on AI and its social, political, cultural, and ethical perspectives. Topics vary widely from interactions between humans and robots through news representation of AI and AI-based news credibility to privacy and value toward AI in the public sphere. Contributors from such countries as Brazil, Netherland, South Korea, Spain, and United States discuss important issues and challenges in AI and communication studies. The collection of chapters in the book considers implications for not only theoretical and methodological approaches, but policymakers and practitioners alike. The chapters in this book were originally published as a special issue of Communication Studies.

Open Government in a Theoretical and Practical Context (Hardcover, New Ed): Michael Hunt Open Government in a Theoretical and Practical Context (Hardcover, New Ed)
Michael Hunt; Edited by Richard A. Chapman
R2,936 Discovery Miles 29 360 Ships in 10 - 15 working days

Combining a stimulating blend of academic authority and senior practitioner experience, this book tackles the principle of openness to official documentation and information flow. It covers important areas such as the Hutton Report into the death of Dr David Kelly, the freedom of speech in democratic societies, the value of the freedom of information and international comparisons. The book is a must read for courses on public policy and governance and information law.

Security and Privacy Preserving in Social Networks (Hardcover, 2013): Richard Chbeir, Bechara Al Bouna Security and Privacy Preserving in Social Networks (Hardcover, 2013)
Richard Chbeir, Bechara Al Bouna
R4,045 R3,492 Discovery Miles 34 920 Save R553 (14%) Ships in 10 - 15 working days

This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.

Guide to the De-Identification of Personal Health Information (Paperback): Khaled El Emam Guide to the De-Identification of Personal Health Information (Paperback)
Khaled El Emam
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-based methodology and provides a general overview of its steps. The book supplies a detailed case for why de-identification is important as well as best practices to help you pin point when it is necessary to apply de-identification in the disclosure of personal health information. It also: Outlines practical methods for de-identification Describes how to measure re-identification risk Explains how to reduce the risk of re-identification Includes proofs and supporting reference material Focuses only on transformations proven to work on health information-rather than covering all possible approaches, whether they work in practice or not Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible-while protecting patients' privacy and complying with current regulations.

The Data Economy - Implications from Singapore (Paperback): Sree Kumar, See-Kiong Ng, Sin Gee Teo, Warren Chik The Data Economy - Implications from Singapore (Paperback)
Sree Kumar, See-Kiong Ng, Sin Gee Teo, Warren Chik
R804 Discovery Miles 8 040 Ships in 10 - 15 working days

"The data economy" is a term used by many, but properly understood by few. Even more so the concept of "big data". Both terms embody the notion of a digital world in which many transactions and data flows animate a virtual space. This is the unseen world in which technology has become the master, with the hand of the human less visible. In fact, however, it is human interaction in and around technology that makes data so pervasive and important - the ability of the human mind to extract, manipulate and shape data that gives meaning to it. This book outlines the findings and conclusions of a multidisciplinary team of data scientists, lawyers, and economists tasked with studying both the possibilities of exploiting the rich data sets made available from many human-technology interactions and the practical and legal limitations of trying to do so. It revolves around a core case study of Singapore's public transport system, using data from both the private company operating the contactless payment system (EZ-Link) and the government agency responsible for public transport infrastructure (Land Transport Authority). In analysing both the possibilities and the limitations of these data sets, the authors propose policy recommendations in terms of both the uses of large data sets and the legislation necessary to enable these uses while protecting the privacy of users.

Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020):... Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020)
Peter Christen, Thilina Ranbaduge, Rainer Schnell
R4,318 Discovery Miles 43 180 Ships in 18 - 22 working days

This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and their computational aspects, practical considerations such as dealing with dirty and missing data, as well as privacy, risk, and performance assessment measures. Existing techniques for privacy-preserving record linkage are evaluated empirically and real-world application examples that scale to population sizes are described. The book also includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic data that can be used to test and evaluate linkage techniques. This book consists of fourteen chapters grouped into four parts, and two appendices. The first part introduces the reader to the topic of linking sensitive data, the second part covers methods and techniques to link such data, the third part discusses aspects of practical importance, and the fourth part provides an outlook of future challenges and open research problems relevant to linking sensitive databases. The appendices provide pointers and describe freely available, open-source software systems that allow the linkage of sensitive data, and provide further details about the evaluations presented. A companion Web site at https://dmm.anu.edu.au/lsdbook2020 provides additional material and Python programs used in the book. This book is mainly written for applied scientists, researchers, and advanced practitioners in governments, industry, and universities who are concerned with developing, implementing, and deploying systems and tools to share sensitive information in administrative, commercial, or medical databases. The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!David J. Hand, Imperial College, London

Bits, Bytes, and Big Brother - Federal Information Control in the Technological Age (Hardcover, New): Shannon E. Martin Bits, Bytes, and Big Brother - Federal Information Control in the Technological Age (Hardcover, New)
Shannon E. Martin
R2,047 Discovery Miles 20 470 Ships in 10 - 15 working days

This study examines the tensions and interrelationships inherent in federal control of information in the technological era. Analyzing topics relating to information content and carrier issues, citizens' natural rights and utilities, and the effects of the executive and legislative branches, the author examines the historical definitions of information, traditional ethical principles, the parameters as framed by the Constitution, and three kinds of information control actions promulgated by the federal government (the Foreign Agents Registration and Propaganda Act, the Computer Security Act of 1987, and the Pentagon media rules during the Persian Gulf War). Following analysis of the practical, ethical, and legal issues involved, the author recommends a proactive information policy encompassing both information content and carriers and preserving Constitutional principles on the free flow of information.

Surveillance as Social Sorting - Privacy, Risk and Automated Discrimination (Hardcover): David Lyon Surveillance as Social Sorting - Privacy, Risk and Automated Discrimination (Hardcover)
David Lyon
R4,931 Discovery Miles 49 310 Ships in 10 - 15 working days


Surveillance happens to all of us, everyday, as we walk beneath street cameras, swipe cards, surf the net. Agencies are using increasingly sophisticated computer systems - especially searchable databases - to keep tabs on us at home, work and play. Once the word surveillance was reserved for police activities and intelligence gathering, now it is an unavoidable feature of everyday life.

Surveillance as Social Sorting proposes that surveillance is not simply a contemporary threat to individual freedom, but that, more insidiously, it is a powerful means of creating and reinforcing long-term social differences. As practiced today, it is actually a form of social sorting - a means of verifying identities but also of assessing risks and assigning worth. Questions of how categories are constructed therefore become significant ethical and political questions.

Bringing together contributions from North America and Europe, Surveillance as Social Sorting offers an innovative approach to the interaction between societies and their technologies. It looks at a number of examples in depth and will be an appropriate source of reference for a wide variety of courses.

Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback):... Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback)
Thomas R. Peltier
R2,952 Discovery Miles 29 520 Ships in 10 - 15 working days

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.

Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.

Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.

Invitation to Cryptology (Paperback): Thomas Barr Invitation to Cryptology (Paperback)
Thomas Barr
R3,815 Discovery Miles 38 150 Ships in 10 - 15 working days

For a one-semester undergraduate-level course in Cryptology, Mathematics, or Computer Science.

Designed for either the intelligent freshman (good at math) or for a low-level junior year first course, Cryptology introduces a wide range of up-to-date cryptological concepts along with the mathematical ideas that are behind them. The new and old are organized around a historical framework. A variety of mathematical topics that are germane to cryptology (e.g., modular arithmetic, Boolean functions, complexity theory, etc.) are developed, but they do not overshadow the main focus of the text. Unlike other texts in this field, Cryptology brings students directly to concepts of classical substitutions and transpositions and issues in modern cryptographic methods.

Botnets - Architectures, Countermeasures, and Challenges (Hardcover): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Hardcover)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R3,806 Discovery Miles 38 060 Ships in 10 - 15 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Human Dimensions of Cybersecurity (Hardcover): Terry Bossomaier, Steven D'Alessandro, Roger Bradbury Human Dimensions of Cybersecurity (Hardcover)
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury
R1,977 Discovery Miles 19 770 Ships in 10 - 15 working days

"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury have produced a book that ... shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity - what it is, why it matters, and how to do it." --Professor Paul Cornish, Visiting Professor, LSE IDEAS, London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states. This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and don'ts of cybersecurity. The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.

The International Handbook of Computer Security (Hardcover): Jae Shim, Anique A. Qureshi, Joel G Siegel The International Handbook of Computer Security (Hardcover)
Jae Shim, Anique A. Qureshi, Joel G Siegel
R4,785 Discovery Miles 47 850 Ships in 10 - 15 working days

"The International Handbook of Computer Security" is designed to help information systems/computer professionals as well as business executives protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in what often seems a quagmire of computers, technology, networks, and software.
Major topics discussed are: security policies; physical security procedures; data preservation and protection; hardware and software protection and security; personnel management and security; network security, internal and external systems; contingency planning; legal and auditing planning and control.

The Identity Trade - Selling Privacy and Reputation Online (Hardcover): Nora A. Draper The Identity Trade - Selling Privacy and Reputation Online (Hardcover)
Nora A. Draper
R2,561 Discovery Miles 25 610 Ships in 10 - 15 working days

The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity-a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.

Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover): Ari Ezra Waldman Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover)
Ari Ezra Waldman
R693 R627 Discovery Miles 6 270 Save R66 (10%) Ships in 18 - 22 working days

In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be read by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.

Privacy II - Exploring Questions of Media Morality: A Special Issue of the journal of Mass Media Ethics (Paperback): Jay Black Privacy II - Exploring Questions of Media Morality: A Special Issue of the journal of Mass Media Ethics (Paperback)
Jay Black
R966 Discovery Miles 9 660 Ships in 10 - 15 working days

Concerns over privacy in America and the role of a free and responsible press have intensified in recent years. The Journal of Mass Media Ethics has worked with Poynter Institute for Media Studies in an effort to focus and broaden the discussion. This issue -- the second devoted to privacy matters -- features articles that the editors hope will add useful perspectives to the current discussions of privacy issues, particularly those raised by new technology.

Digital Privacy, Terrorism and Law Enforcement - The UK's Response to Terrorist Communication (Hardcover): Simon Hale-Ross Digital Privacy, Terrorism and Law Enforcement - The UK's Response to Terrorist Communication (Hardcover)
Simon Hale-Ross
R4,489 Discovery Miles 44 890 Ships in 10 - 15 working days

This book examines the UK's response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of 'darknet'; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a 'digital rights criterion' from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.

The Future of Internet Policy (Paperback): Peter Decherney, Victor Pickard The Future of Internet Policy (Paperback)
Peter Decherney, Victor Pickard
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across national borders. They all look forward to how today's policies will shape the future of the internet and society. A particular focus of interest for some of the contributors is the revelations that followed Edward Snowden's mass disclosure of classified documents in 2013, which revealed the U.S. National Security Agency's systematic and longstanding program of monitoring global communications. Some chapters consider different countries' varying approaches to regulating the proliferation of online communication, while others assess the current state of digital technology. They all call for policy interventions to solve market failures. This book was originally published as a special issue of Critical Studies in Media Communication.

Regulating New Technologies in Uncertain Times (Hardcover, 1st ed. 2019): Leonie Reins Regulating New Technologies in Uncertain Times (Hardcover, 1st ed. 2019)
Leonie Reins
R2,463 Discovery Miles 24 630 Ships in 18 - 22 working days

This book deals with questions of democracy and governance relating to new technologies. The deployment and application of new technologies is often accompanied with uncertainty as to their long-term (un)intended impacts. New technologies also raise questions about the limits of the law as the line between harmful and beneficial effects is often difficult to draw. The volume explores overarching concepts on how to regulate new technologies and their implications in a diverse and constantly changing society, as well as the way in which regulation can address differing, and sometimes conflicting, societal objectives, such as public health and the protection of privacy. Contributions focus on a broad range of issues such as Citizen Science, Smart Cities, big data, and health care, but also on the role of market regulation for new technologies.The book will serve as a useful research tool for scholars and practitioners interested in the latest developments in the field of technology regulation. Leonie Reins is Assistant Professor at the Tilburg Institute for Law, Technology, and Society (TILT) in The Netherlands.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Discourses of Cleander and Eudoxus…
Gabriel Daniel Paperback R606 Discovery Miles 6 060
The Adventures of Telemachus, the Son of…
Francois De Salignac Fenelon Paperback R605 Discovery Miles 6 050
Learning To Crochet
Lion Brand Yarn Company Paperback R195 Discovery Miles 1 950
A Letter to Lord Eg----Nt, on the…
Peter Chester Paperback R294 Discovery Miles 2 940
Introduction to the Law of Tenures
Martin Wright Paperback R497 Discovery Miles 4 970
The Pleasures of Retirement, Preferable…
Charles Pinot-Duclos Paperback R534 Discovery Miles 5 340
Laphyrologia - Or, a Discourse…
Thomas Heskith Paperback R334 Discovery Miles 3 340
Japanese Temari - A Colorful Spin on an…
Barbara B. Suess Hardcover R1,394 Discovery Miles 13 940
Colourful Crochet - 35 Designs to Bring…
Emma Leith Paperback R349 Discovery Miles 3 490
Interpretations
Joji Locatelli Paperback R609 Discovery Miles 6 090

 

Partners