![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
"The International Handbook of Computer Security" is designed to
help information systems/computer professionals as well as business
executives protect computer systems and data from a myriad of
internal and external threats. The book addresses a wide range of
computer security issues. It is intended to provide practical and
thorough guidance in what often seems a quagmire of computers,
technology, networks, and software.
This book examines the UK's response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of 'darknet'; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a 'digital rights criterion' from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.
In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are explored in this book.On the one hand, individual privacy protection is a hot topic and must be addressed in order to guarantee the proper evolution of a modern society. On the other, security can invade individual privacy, especially after the appearance of new forms of terrorism. In this book, we analyze these problems from a new point of view.
Concerns over privacy in America and the role of a free and responsible press have intensified in recent years. The Journal of Mass Media Ethics has worked with Poynter Institute for Media Studies in an effort to focus and broaden the discussion. This issue -- the second devoted to privacy matters -- features articles that the editors hope will add useful perspectives to the current discussions of privacy issues, particularly those raised by new technology.
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across national borders. They all look forward to how today's policies will shape the future of the internet and society. A particular focus of interest for some of the contributors is the revelations that followed Edward Snowden's mass disclosure of classified documents in 2013, which revealed the U.S. National Security Agency's systematic and longstanding program of monitoring global communications. Some chapters consider different countries' varying approaches to regulating the proliferation of online communication, while others assess the current state of digital technology. They all call for policy interventions to solve market failures. This book was originally published as a special issue of Critical Studies in Media Communication.
This book deals with questions of democracy and governance relating to new technologies. The deployment and application of new technologies is often accompanied with uncertainty as to their long-term (un)intended impacts. New technologies also raise questions about the limits of the law as the line between harmful and beneficial effects is often difficult to draw. The volume explores overarching concepts on how to regulate new technologies and their implications in a diverse and constantly changing society, as well as the way in which regulation can address differing, and sometimes conflicting, societal objectives, such as public health and the protection of privacy. Contributions focus on a broad range of issues such as Citizen Science, Smart Cities, big data, and health care, but also on the role of market regulation for new technologies.The book will serve as a useful research tool for scholars and practitioners interested in the latest developments in the field of technology regulation. Leonie Reins is Assistant Professor at the Tilburg Institute for Law, Technology, and Society (TILT) in The Netherlands.
Thoughts are free - but they are no longer secret. Today, our data is automatically stored and analyzed by algorithms "behind the cloud" - where we no longer have control over our data. Our most private and secret information is entrusted to the internet and permanently collected, stacked and linked to our digital twins. With and without our consent. "Privacy is dead", as Mark Zuckerberg put it. The question is: How did we get there? And, if the actors behind the cloud know everything: what is still private today, and are there any personal secrets at all when the "gods" behind the cloud possibly know us better than our friends and family? The book uses a wealth of case studies (e.g. cryptocurrencies, journalism, digital traces of sexual preferences) to develop a typology of privacy in the history of ideas. Furthermore, it shows the areas of life in which big data and artificial intelligence have already made inroads. This book is a translation of the original German 2nd edition Die Ruckseite der Cloud by Peter Seele and Lucas Zapf, published by Springer-Verlag GmbH Germany, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation.
The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical 'FICO' score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.
An original deep history of the internet that tells the story of the centuries-old utopian dreams behind it-and explains why they have died today Many think of the internet as an unprecedented and overwhelmingly positive achievement of modern human technology. But is it? In The Internet Is Not What You Think It Is, Justin Smith offers an original deep history of the internet, from the ancient to the modern world-uncovering its surprising origins in nature and centuries-old dreams of radically improving human life by outsourcing thinking to machines and communicating across vast distances. Yet, despite the internet's continuing potential, Smith argues, the utopian hopes behind it have finally died today, killed by the harsh realities of social media, the global information economy, and the attention-destroying nature of networked technology. Ranging over centuries of the history and philosophy of science and technology, Smith shows how the "internet" has been with us much longer than we usually think. He draws fascinating connections between internet user experience, artificial intelligence, the invention of the printing press, communication between trees, and the origins of computing in the machine-driven looms of the silk industry. At the same time, he reveals how the internet's organic structure and development root it in the natural world in unexpected ways that challenge efforts to draw an easy line between technology and nature. Combining the sweep of intellectual history with the incisiveness of philosophy, The Internet Is Not What You Think It Is cuts through our daily digital lives to give a clear-sighted picture of what the internet is, where it came from, and where it might be taking us in the coming decades.
This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsourcing and cloud computing situations. Private companies, public organizations and final users are releasing, sharing, and disseminating their data to take reciprocal advantage of the great benefits of making their data available to others. This book weighs these benefits against the potential privacy risks. A detailed analysis of recent techniques for privacy protection in data release and case studies illustrate crucial scenarios. Protecting Privacy in Data Release targets researchers, professionals and government employees working in security and privacy. Advanced-level students in computer science and electrical engineering will also find this book useful as a secondary text or reference.
What if you could peer into the minds of an entire population? What if you could target the weakest with rumours that only they saw? In 2016, an obscure British military contractor turned the world upside down. Funded by a billionaire on a crusade to start his own far-right insurgency, Cambridge Analytica combined psychological research with private Facebook data to make an invisible weapon with the power to change what voters perceived as real. The firm was created to launch the then unknown Steve Bannon's ideological assault on America. But as it honed its dark arts in elections from Trinidad to Nigeria, 24-year-old research director Christopher Wylie began to see what he and his colleagues were unleashing. He had heard the disturbing visions of the investors. He saw what CEO Alexander Nix did behind closed doors. When Britain shocked the world by voting to leave the EU, Wylie realised it was time to expose his old associates. The political crime of the century had just taken place - the weapon had been tested - and nobody knew.
PrivacyEngineering is a hands-on guide to building a modern and flexible privacy program for your organization. It helps map essential legal requirements into practical engineering techniques that you can implement right away. The book develops your strategic understanding of data governance and helps you navigate the tricky trade-offs between privacy and business needs. You'll learn to spot risks in your own data management systems and prepare to satisfy both internal and external privacy audits. There's no bureaucratic new processes or expensive new software necessary. You'll learn how to repurpose the data and security tools you already use to achieve your privacy goals. Preserving the privacy of your users is essential for any successful business. Well-designed processes and data governance ensure that privacy is built into your systems from the ground up, keeping your users safe and helping your organization maintain compliance with the law.
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.
This combination book and audio instructional program is designed to diminish the accents of men and women who speak English as their second language. It will help them speak standard American English with clarity, confidence, and accuracy. Specific exercises concentrate on vowel sounds, problematic consonants such as V, W, TH, the American R, and the often confusing American T sound. It teaches them to employ correct syllable stress, emphasize the correct words in a sentence for native sounding rhythm, speak with American intonation, link words for smoother speech flow, use common word contractions, and more. Additional topics that often confuse ESL students are also discussed and explained. They include distinguishing between casual and formal speech, homophones (for instance, they're and there), recognizing words with silent letters (comb, receipt, and others), and avoiding embarrassing pronunciation mistakes, such as mixing up "beach" and "bitch." Students are familiarized with many irregular English spelling rules and exceptions, and are shown how such irregularities can contribute to pronunciation errors. A native language guide references problematic accent issues of 13 different language backgrounds. Correct lip and tongue positions for all sounds are discussed in detail. There is also a link to downloadable audio that uses male and female voices to coach correct American-style pronunciation.
The tension between freedom of expression and European personal data protection regulation is unmistakable. Nowhere is this more apparent than in its interface with professional journalism and other traditional publishers including artists, writers and academics. This book systematically explores how that tension has been managed across thirty-one European States from the 1970s through to the 2010s including under the General Data Protection Regulation (GDPR). It is found that, notwithstanding confusing laws, data authorities have regulated journalism through contextual rights balancing. However, they have struggled to establish a clear standard of strictness or ensure consistent enforcement. Their stance regarding other publishers has been more confused - whilst academics have been subject to onerous restrictions developed for medical and related research, other writers and artists have been largely ignored. This book suggests that contextual rights balancing should be extended to all traditional publishers and systematically developed through robust co-regulation that draws on the strength of both statutory control and self-regulation.
This book examines how face recognition technology is affecting privacy and confidentiality in an era of enhanced surveillance. Further, it offers a new approach to the complex issues of privacy and confidentiality, by drawing on Joseph K in Kafka's disturbing novel The Trial, and on Isaiah Berlin's notion of liberty and freedom. Taking into consideration rights and wrongs, protection from harm associated with compulsory visibility, and the need for effective data protection law, the author promotes ethical practices by reinterpreting privacy as a property right. To protect this right, the author advocates the licensing of personal identifiable images where appropriate. The book reviews American, UK and European case law concerning privacy and confidentiality, the effect each case has had on the developing jurisprudence, and the ethical issues involved. As such, it offers a valuable resource for students of ethico-legal fields, professionals specialising in image rights law, policy-makers, and liberty advocates and activists.
Surveillance is a divisive issue-one might say it is inherently controversial. Used by private industry, law enforcement, and for national security, it can be a potent tool for protecting resources and assets. It can also be extremely invasive, calling into question our basic rights to freedom and privacy. Introduction to Surveillance Studies explores technological trends, past- and present-day rationales for surveillance and surveillance devices, and current social issues surrounding them. The book begins with a brief historical perspective on the evolution of surveillance technologies, then charts the development of modern-day devices from the invention of radar to the dawn of the Internet. Next, it describes emerging technologies-including GIS, GPS devices, Google Maps, biometric technology, surveillance cameras, global satellites, miniaturization of devices, and social media-that are challenging notions of privacy and the right of access to information. While focusing on the technology, the book also discusses surveillance as a phenomenon and what these technologies mean to our understanding of freedom, privacy, and the impact of technology on communications and the structure of society. Enhanced with numerous photos, the book presents the pros and cons-and some of the controversy-of these increasingly sophisticated technologies, their collective impact, and what the future may hold. It is ideal for those new to surveillance; security, military, and law enforcement professionals who utilize surveillance technologies; and students of privacy, constitutional freedom, journalism, and sociology.
This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.
In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.
We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that respond to specific people to drones equipped with their own behavioural algorithms. While the World-Sized Web carries enormous potential, Schneier argues that we are unprepared for the vulnerabilities it brings. Cutting-edge digital attackers can now crash your car, pacemaker and home security system and everyone else's. Click Here to Kill Everybody explores the risks and security implications of the World-Sized Web and lays out common-sense policies that will allow us to enjoy the benefits of this new omnipotent age without surrendering ourselves entirely to our creation.
The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity-a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.
In this examination of how the rise of online sharing economy platforms has facilitated online crime, this book shows how, while marketed as trustworthy peer-to-peer services, these platforms are highly vulnerable to misuse by scammers and are used for the dissemination of delusive speech. The analysis centres around the concept of delusive speech, a sub-set of disinformation, designed to deceive and motivate by criminal intent. Looking beyond the economic and disruptive impacts of sharing economy platforms like Uber, Airbnb, and others, this book situates these Big Tech giants as mass communication channels that are frequently misused by bad actors to distribute dangerous content globally. Drawing from over 600 cases of victims lured into scams or physical danger via misleading Airbnb listings, the book provides a detailed case study exposing Airbnb's failure to establish legitimate safety measures despite branding its platform as a 'community of trust'. Incorporating netnography and thematic analysis, the author theorises the deceptive semiotic structure of delusive speech and evaluates practical mechanisms Airbnb could employ to prevent scams and crime on its platform. With a global audience including researchers in communication and media studies, digital media, and media industries, as well as tech journalists, Silicon Valley critics, policymakers, and digital rights advocates, this book unmasks how sharing economy giants like Airbnb contribute to an epidemic of online deception causing real-world harm. |
You may like...
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud
Paperback
Cyber Security and Threats - Concepts…
Information Reso Management Association
Hardcover
R9,416
Discovery Miles 94 160
Cyber Security and Threats - Concepts…
Information Reso Management Association
Hardcover
R9,416
Discovery Miles 94 160
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,854
Discovery Miles 28 540
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R762
Discovery Miles 7 620
|