0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (120)
  • R250 - R500 (231)
  • R500+ (820)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Bits, Bytes, and Big Brother - Federal Information Control in the Technological Age (Hardcover, New): Shannon E. Martin Bits, Bytes, and Big Brother - Federal Information Control in the Technological Age (Hardcover, New)
Shannon E. Martin
R2,214 Discovery Miles 22 140 Ships in 10 - 15 working days

This study examines the tensions and interrelationships inherent in federal control of information in the technological era. Analyzing topics relating to information content and carrier issues, citizens' natural rights and utilities, and the effects of the executive and legislative branches, the author examines the historical definitions of information, traditional ethical principles, the parameters as framed by the Constitution, and three kinds of information control actions promulgated by the federal government (the Foreign Agents Registration and Propaganda Act, the Computer Security Act of 1987, and the Pentagon media rules during the Persian Gulf War). Following analysis of the practical, ethical, and legal issues involved, the author recommends a proactive information policy encompassing both information content and carriers and preserving Constitutional principles on the free flow of information.

Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback):... Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback)
Thomas R. Peltier
R2,985 Discovery Miles 29 850 Ships in 12 - 19 working days

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.

Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.

Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.

The International Handbook of Computer Security (Hardcover): Jae Shim, Anique A. Qureshi, Joel G Siegel The International Handbook of Computer Security (Hardcover)
Jae Shim, Anique A. Qureshi, Joel G Siegel
R4,785 Discovery Miles 47 850 Ships in 12 - 19 working days

"The International Handbook of Computer Security" is designed to help information systems/computer professionals as well as business executives protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in what often seems a quagmire of computers, technology, networks, and software.
Major topics discussed are: security policies; physical security procedures; data preservation and protection; hardware and software protection and security; personnel management and security; network security, internal and external systems; contingency planning; legal and auditing planning and control.

Digital Privacy, Terrorism and Law Enforcement - The UK's Response to Terrorist Communication (Hardcover): Simon Hale-Ross Digital Privacy, Terrorism and Law Enforcement - The UK's Response to Terrorist Communication (Hardcover)
Simon Hale-Ross
R4,470 Discovery Miles 44 700 Ships in 12 - 19 working days

This book examines the UK's response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of 'darknet'; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a 'digital rights criterion' from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.

Behind the Cloud - A Theory of the Private Without Secrecy (Hardcover, 1st ed. 2022): Peter Seele, Lucas Zapf Behind the Cloud - A Theory of the Private Without Secrecy (Hardcover, 1st ed. 2022)
Peter Seele, Lucas Zapf
R1,080 R914 Discovery Miles 9 140 Save R166 (15%) Ships in 10 - 15 working days

Thoughts are free - but they are no longer secret. Today, our data is automatically stored and analyzed by algorithms "behind the cloud" - where we no longer have control over our data. Our most private and secret information is entrusted to the internet and permanently collected, stacked and linked to our digital twins. With and without our consent. "Privacy is dead", as Mark Zuckerberg put it. The question is: How did we get there? And, if the actors behind the cloud know everything: what is still private today, and are there any personal secrets at all when the "gods" behind the cloud possibly know us better than our friends and family? The book uses a wealth of case studies (e.g. cryptocurrencies, journalism, digital traces of sexual preferences) to develop a typology of privacy in the history of ideas. Furthermore, it shows the areas of life in which big data and artificial intelligence have already made inroads. This book is a translation of the original German 2nd edition Die Ruckseite der Cloud by Peter Seele and Lucas Zapf, published by Springer-Verlag GmbH Germany, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation.

Advances In Artificial Intelligence For Privacy Protection And Security (Hardcover): Agusti Solanas, Antoni Martinez-Balleste Advances In Artificial Intelligence For Privacy Protection And Security (Hardcover)
Agusti Solanas, Antoni Martinez-Balleste
R3,738 Discovery Miles 37 380 Ships in 12 - 19 working days

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are explored in this book.On the one hand, individual privacy protection is a hot topic and must be addressed in order to guarantee the proper evolution of a modern society. On the other, security can invade individual privacy, especially after the appearance of new forms of terrorism. In this book, we analyze these problems from a new point of view.

Privacy II - Exploring Questions of Media Morality: A Special Issue of the journal of Mass Media Ethics (Paperback): Jay Black Privacy II - Exploring Questions of Media Morality: A Special Issue of the journal of Mass Media Ethics (Paperback)
Jay Black
R962 Discovery Miles 9 620 Ships in 12 - 19 working days

Concerns over privacy in America and the role of a free and responsible press have intensified in recent years. The Journal of Mass Media Ethics has worked with Poynter Institute for Media Studies in an effort to focus and broaden the discussion. This issue -- the second devoted to privacy matters -- features articles that the editors hope will add useful perspectives to the current discussions of privacy issues, particularly those raised by new technology.

Regulating New Technologies in Uncertain Times (Hardcover, 1st ed. 2019): Leonie Reins Regulating New Technologies in Uncertain Times (Hardcover, 1st ed. 2019)
Leonie Reins
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

This book deals with questions of democracy and governance relating to new technologies. The deployment and application of new technologies is often accompanied with uncertainty as to their long-term (un)intended impacts. New technologies also raise questions about the limits of the law as the line between harmful and beneficial effects is often difficult to draw. The volume explores overarching concepts on how to regulate new technologies and their implications in a diverse and constantly changing society, as well as the way in which regulation can address differing, and sometimes conflicting, societal objectives, such as public health and the protection of privacy. Contributions focus on a broad range of issues such as Citizen Science, Smart Cities, big data, and health care, but also on the role of market regulation for new technologies.The book will serve as a useful research tool for scholars and practitioners interested in the latest developments in the field of technology regulation. Leonie Reins is Assistant Professor at the Tilburg Institute for Law, Technology, and Society (TILT) in The Netherlands.

The Future of Internet Policy (Paperback): Peter Decherney, Victor Pickard The Future of Internet Policy (Paperback)
Peter Decherney, Victor Pickard
R1,527 Discovery Miles 15 270 Ships in 12 - 19 working days

All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across national borders. They all look forward to how today's policies will shape the future of the internet and society. A particular focus of interest for some of the contributors is the revelations that followed Edward Snowden's mass disclosure of classified documents in 2013, which revealed the U.S. National Security Agency's systematic and longstanding program of monitoring global communications. Some chapters consider different countries' varying approaches to regulating the proliferation of online communication, while others assess the current state of digital technology. They all call for policy interventions to solve market failures. This book was originally published as a special issue of Critical Studies in Media Communication.

Building Machine Learning Pipelines (Paperback): Hannes Hapke Building Machine Learning Pipelines (Paperback)
Hannes Hapke; Contributions by Catherine Nelson
R1,885 R1,491 Discovery Miles 14 910 Save R394 (21%) Ships in 9 - 17 working days

Companies are spending billions on machine learning projects, but it's money wasted if the models can't be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You'll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. Understand the steps to build a machine learning pipeline Build your pipeline using components from TensorFlow Extended Orchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow Pipelines Work with data using TensorFlow Data Validation and TensorFlow Transform Analyze a model in detail using TensorFlow Model Analysis Examine fairness and bias in your model performance Deploy models with TensorFlow Serving or TensorFlow Lite for mobile devices Learn privacy-preserving machine learning techniques

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Hardcover): John J. Trinckes Jr. How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Hardcover)
John J. Trinckes Jr.
R4,493 Discovery Miles 44 930 Ships in 12 - 19 working days

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical 'FICO' score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.

Protecting Privacy in Data Release (Hardcover, 2015 ed.): Giovanni Livraga Protecting Privacy in Data Release (Hardcover, 2015 ed.)
Giovanni Livraga
R2,879 Discovery Miles 28 790 Ships in 10 - 15 working days

This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsourcing and cloud computing situations. Private companies, public organizations and final users are releasing, sharing, and disseminating their data to take reciprocal advantage of the great benefits of making their data available to others. This book weighs these benefits against the potential privacy risks. A detailed analysis of recent techniques for privacy protection in data release and case studies illustrate crucial scenarios. Protecting Privacy in Data Release targets researchers, professionals and government employees working in security and privacy. Advanced-level students in computer science and electrical engineering will also find this book useful as a secondary text or reference.

Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback): John Pirc, David DeSanto, Iain Davison, Will... Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback)
John Pirc, David DeSanto, Iain Davison, Will Gragido
R1,029 Discovery Miles 10 290 Ships in 12 - 19 working days

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Data Power - Radical Geographies of Control and Resistance (Paperback): Jim E. Thatcher, Craig M. Dalton Data Power - Radical Geographies of Control and Resistance (Paperback)
Jim E. Thatcher, Craig M. Dalton
R566 Discovery Miles 5 660 Ships in 12 - 19 working days

In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.

New Dark Age - Technology and the End of the Future (Paperback, New edition): James Bridle New Dark Age - Technology and the End of the Future (Paperback, New edition)
James Bridle
R324 Discovery Miles 3 240 Ships in 9 - 17 working days

From the highly acclaimed author of WAYS OF BEING. We live in times of increasing inscrutability. Our news feeds are filled with unverified, unverifiable speculation, much of it automatically generated by anonymous software. As a result, we no longer understand what is happening around us. Underlying all of these trends is a single idea: the belief that quantitative data can provide a coherent model of the world, and the efficacy of computable information to provide us with ways of acting within it. Yet the sheer volume of information available to us today reveals less than we hope. Rather, it heralds a new Dark Age: a world of ever-increasing incomprehension. In his brilliant new work, leading artist and writer James Bridle offers us a warning against the future in which the contemporary promise of a new technologically assisted Enlightenment may just deliver its opposite: an age of complex uncertainty, predictive algorithms, surveillance, and the hollowing out of empathy. Surveying the history of art, technology and information systems he reveals the dark clouds that gather over discussions of the digital sublime.

Parenting for the Digital Generation - A Guide to Digital Education and the Online Environment (Hardcover): Jon M Garon Parenting for the Digital Generation - A Guide to Digital Education and the Online Environment (Hardcover)
Jon M Garon
R1,287 R933 Discovery Miles 9 330 Save R354 (28%) Ships in 12 - 19 working days

Parenting for the Digital Generationprovides a practical handbook for parents, grandparents, teachers, and counselors who want to understand both the opportunities and the threats that exist for the generation of digital natives who are more familiar with a smartphone than they are with a paper book. This book provides straightforward, jargon-free information regarding the online environment and the experience in which children and young adults engage both inside and outside the classroom. The digital environment creates many challenges, some of which are largely the same as parents faced before the Internet, but others which are entirely new. Many children struggle to connect, and they underperform in the absence of the social and emotional support of a healthy learning environment. Parents must also help their children navigate a complex and occasionally dangerous online world. This book provides a step-by-step guide for parents seeking to raise happy, mature, creative, and well-adjusted children. The guide provides clear explanations of the keys to navigating as a parent in the online environment while providing practical strategies that do not look for dangers where there are only remote threats.

European Data Protection Regulation, Journalism, and Traditional Publishers - Balancing on a Tightrope? (Hardcover): David Erdos European Data Protection Regulation, Journalism, and Traditional Publishers - Balancing on a Tightrope? (Hardcover)
David Erdos
R2,851 Discovery Miles 28 510 Ships in 12 - 19 working days

The tension between freedom of expression and European personal data protection regulation is unmistakable. Nowhere is this more apparent than in its interface with professional journalism and other traditional publishers including artists, writers and academics. This book systematically explores how that tension has been managed across thirty-one European States from the 1970s through to the 2010s including under the General Data Protection Regulation (GDPR). It is found that, notwithstanding confusing laws, data authorities have regulated journalism through contextual rights balancing. However, they have struggled to establish a clear standard of strictness or ensure consistent enforcement. Their stance regarding other publishers has been more confused - whilst academics have been subject to onerous restrictions developed for medical and related research, other writers and artists have been largely ignored. This book suggests that contextual rights balancing should be extended to all traditional publishers and systematically developed through robust co-regulation that draws on the strength of both statutory control and self-regulation.

Ransomware Protection Playbook (Paperback): RA Grimes Ransomware Protection Playbook (Paperback)
RA Grimes
R557 Discovery Miles 5 570 Ships in 12 - 19 working days

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization's, data.

Hacking Artificial Intelligence - A Leader's Guide from Deepfakes to Breaking Deep Learning (Hardcover): Davey Gibian Hacking Artificial Intelligence - A Leader's Guide from Deepfakes to Breaking Deep Learning (Hardcover)
Davey Gibian
R1,266 R912 Discovery Miles 9 120 Save R354 (28%) Ships in 12 - 19 working days

Sheds light on the ability to hack AI and the technology industry's lack of effort to secure vulnerabilities. We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, consumer electronics, and the national security landscape. But like all digital technologies, AI can fail and be left vulnerable to hacking. The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. Hacking Artificial Intelligence sheds light on these hacking risks, explaining them to those who can make a difference. Today, very few people-including those in influential business and government positions-are aware of the new risks that accompany automated systems. While society hurdles ahead with AI, we are also rushing towards a security and safety nightmare. This book is the first-ever layman's guide to the new world of hacking AI and introduces the field to thousands of readers who should be aware of these risks. From a security perspective, AI is today where the internet was 30 years ago. It is wide open and can be exploited. Readers from leaders to AI enthusiasts and practitioners alike are shown how AI hacking is a real risk to organizations and are provided with a framework to assess such risks, before problems arise.

Blockchain Security in Cloud Computing (Hardcover, 1st ed. 2022): K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal... Blockchain Security in Cloud Computing (Hardcover, 1st ed. 2022)
K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal Kumar, Sanjeevikumar Padmanaban
R4,936 Discovery Miles 49 360 Ships in 12 - 19 working days

This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.

Face Recognition Technology - Compulsory Visibility and Its Impact on Privacy and the Confidentiality of Personal Identifiable... Face Recognition Technology - Compulsory Visibility and Its Impact on Privacy and the Confidentiality of Personal Identifiable Images (Hardcover, 1st ed. 2020)
Ian Berle
R2,076 Discovery Miles 20 760 Ships in 12 - 19 working days

This book examines how face recognition technology is affecting privacy and confidentiality in an era of enhanced surveillance. Further, it offers a new approach to the complex issues of privacy and confidentiality, by drawing on Joseph K in Kafka's disturbing novel The Trial, and on Isaiah Berlin's notion of liberty and freedom. Taking into consideration rights and wrongs, protection from harm associated with compulsory visibility, and the need for effective data protection law, the author promotes ethical practices by reinterpreting privacy as a property right. To protect this right, the author advocates the licensing of personal identifiable images where appropriate. The book reviews American, UK and European case law concerning privacy and confidentiality, the effect each case has had on the developing jurisprudence, and the ethical issues involved. As such, it offers a valuable resource for students of ethico-legal fields, professionals specialising in image rights law, policy-makers, and liberty advocates and activists.

The Art of Deception - Controlling the Human Element of Security (Paperback, New ed): KD Mitnick The Art of Deception - Controlling the Human Element of Security (Paperback, New ed)
KD Mitnick
R322 R262 Discovery Miles 2 620 Save R60 (19%) Ships in 9 - 17 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Introduction to Surveillance Studies (Hardcover): J. K. Petersen Introduction to Surveillance Studies (Hardcover)
J. K. Petersen
R3,451 Discovery Miles 34 510 Ships in 12 - 19 working days

Surveillance is a divisive issue-one might say it is inherently controversial. Used by private industry, law enforcement, and for national security, it can be a potent tool for protecting resources and assets. It can also be extremely invasive, calling into question our basic rights to freedom and privacy. Introduction to Surveillance Studies explores technological trends, past- and present-day rationales for surveillance and surveillance devices, and current social issues surrounding them. The book begins with a brief historical perspective on the evolution of surveillance technologies, then charts the development of modern-day devices from the invention of radar to the dawn of the Internet. Next, it describes emerging technologies-including GIS, GPS devices, Google Maps, biometric technology, surveillance cameras, global satellites, miniaturization of devices, and social media-that are challenging notions of privacy and the right of access to information. While focusing on the technology, the book also discusses surveillance as a phenomenon and what these technologies mean to our understanding of freedom, privacy, and the impact of technology on communications and the structure of society. Enhanced with numerous photos, the book presents the pros and cons-and some of the controversy-of these increasingly sophisticated technologies, their collective impact, and what the future may hold. It is ideal for those new to surveillance; security, military, and law enforcement professionals who utilize surveillance technologies; and students of privacy, constitutional freedom, journalism, and sociology.

Click Here to Kill Everybody - Security and Survival in a Hyper-connected World (Paperback): Bruce Schneier Click Here to Kill Everybody - Security and Survival in a Hyper-connected World (Paperback)
Bruce Schneier
R459 Discovery Miles 4 590 Ships in 12 - 19 working days

We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that respond to specific people to drones equipped with their own behavioural algorithms. While the World-Sized Web carries enormous potential, Schneier argues that we are unprepared for the vulnerabilities it brings. Cutting-edge digital attackers can now crash your car, pacemaker and home security system and everyone else's. Click Here to Kill Everybody explores the risks and security implications of the World-Sized Web and lays out common-sense policies that will allow us to enjoy the benefits of this new omnipotent age without surrendering ourselves entirely to our creation.

Data for the People - How to Make Our Post-Privacy Economy Work for You (Hardcover): Andreas Weigend Data for the People - How to Make Our Post-Privacy Economy Work for You (Hardcover)
Andreas Weigend
R1,124 Discovery Miles 11 240 Ships in 9 - 17 working days

A long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer Every time we Google something, Facebook someone, Uber somewhere, or even just turn on a light, we create data that businesses collect and use to make decisions about us. In many ways this has improved our lives, yet, we as individuals do not benefit from this wealth of data as much as we could. Moreover, whether it is a bank evaluating our credit worthiness, an insurance company determining our risk level, or a potential employer deciding whether we get a job, it is likely that this data will be used against us rather than for us. In Data for the People, Andreas Weigend draws on his years as a consultant for commerce, education, healthcare, travel and finance companies to outline how Big Data can work better for all of us. As of today, how much we benefit from Big Data depends on how closely the interests of big companies align with our own. Too often, outdated standards of control and privacy force us into unfair contracts with data companies, but it doesn't have to be this way. Weigend makes a powerful argument that we need to take control of how our data is used to actually make it work for us. Only then can we the people get back more from Big Data than we give it. Big Data is here to stay. Now is the time to find out how we can be empowered by it.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Speaking of Language and Law…
Peter Tiersma Hardcover R2,904 Discovery Miles 29 040
Multimodality and Social Semiosis…
Margit Boeck, Norbert Pachler Hardcover R4,942 Discovery Miles 49 420
Multilingual Memories - Monuments…
Robert Blackwood, John Macalister Hardcover R4,589 Discovery Miles 45 890
Introduction to Peircean Visual…
Tony Jappy Hardcover R5,954 Discovery Miles 59 540
Critical Global Semiotics…
Maureen Ellis Paperback R1,320 Discovery Miles 13 200
Semiotic Landscapes - Language, Image…
Adam Jaworski, Crispin Thurlow Hardcover R5,964 Discovery Miles 59 640
Cultural Semiotics - For a Cultural…
Anna Maria Lorusso Hardcover R4,051 Discovery Miles 40 510
Representation - Cultural…
Stuart Hall, Jessica Evans, … Paperback  (1)
R1,938 Discovery Miles 19 380
Poetics of the Iconotext
Liliane Louvel, Edited By Karen Jacobs Hardcover R4,624 Discovery Miles 46 240
Kosmos Noetos - The Metaphysical…
Ivo Assad Ibri Hardcover R2,572 Discovery Miles 25 720

 

Partners