|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The Future of Open Data flows from a multi-year Social Sciences and
Humanities Research Council (SSHRC) Partnership Grant project that
set out to explore open government geospatial data from an
interdisciplinary perspective. Researchers on the grant adopted a
critical social science perspective grounded in the imperative that
the research should be relevant to government and civil society
partners in the field. This book builds on the knowledge developed
during the course of the grant and asks the question, "What is the
future of open data?" The contributors' insights into the future of
open data combine observations from five years of research about
the Canadian open data community with a critical perspective on
what could and should happen as open data efforts evolve. Each of
the chapters in this book addresses different issues and each is
grounded in distinct disciplinary or interdisciplinary
perspectives. The opening chapter reflects on the origins of open
data in Canada and how it has progressed to the present date,
taking into account how the Indigenous data sovereignty movement
intersects with open data. A series of chapters address some of the
pitfalls and opportunities of open data and consider how the
changing data context may impact sources of open data, limits on
open data, and even liability for open data. Another group of
chapters considers new landscapes for open data, including open
data in the global South, the data priorities of local governments,
and the emerging context for rural open data.
The world's most infamous hacker offers an insider's view of the
low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one
of the most exhaustive FBI manhunts in history and have spawned
dozens of articles, books, films, and documentaries. Since his
release from federal prison, in 1998, Mitnick has turned his life
around and established himself as one of the most sought-after
computer security experts worldwide. Now, in The Art of Deception,
the world's most notorious hacker gives new meaning to the old
adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security,
Mitnick explains why all the firewalls and encryption protocols in
the world will never be enough to stop a savvy grifter intent on
rifling a corporate database or an irate employee determined to
crash a system. With the help of many fascinating true stories of
successful attacks on business and government, he illustrates just
how susceptible even the most locked-down information systems are
to a slick con artist impersonating an IRS agent. Narrating from
the points of view of both the attacker and the victims, he
explains why each attack was so successful and how it could have
been prevented in an engaging and highly readable style reminiscent
of a true-crime novel. And, perhaps most importantly, Mitnick
offers advice for preventing these types of social engineering
hacks through security protocols, training programs, and manuals
that address the human element of security.
PrivacyEngineering is a hands-on guide to building a modern and
flexible privacy program for your organization. It helps map
essential legal requirements into practical engineering techniques
that you can implement right away. The book develops your strategic
understanding of data governance and helps you navigate the tricky
trade-offs between privacy and business needs. You'll learn to spot
risks in your own data management systems and prepare to satisfy
both internal and external privacy audits. There's no bureaucratic
new processes or expensive new software necessary. You'll learn how
to repurpose the data and security tools you already use to achieve
your privacy goals. Preserving the privacy of your users is
essential for any successful business. Well-designed processes and
data governance ensure that privacy is built into your systems from
the ground up, keeping your users safe and helping your
organization maintain compliance with the law.
Neuroscience has begun to intrude deeply into what it means to be
human, an intrusion that offers profound benefits but will demolish
our present understanding of privacy. In Privacy in the Age of
Neuroscience, David Grant argues that we need to reconceptualize
privacy in a manner that will allow us to reap the rewards of
neuroscience while still protecting our privacy and, ultimately,
our humanity. Grant delves into our relationship with technology,
the latest in what he describes as a historical series of
'magnitudes', following Deity, the State and the Market, proposing
the idea that, for this new magnitude (Technology), we must control
rather than be subjected to it. In this provocative work, Grant
unveils a radical account of privacy and an equally radical
proposal to create the social infrastructure we need to support it.
Neuroscience has begun to intrude deeply into what it means to be
human, an intrusion that offers profound benefits but will demolish
our present understanding of privacy. In Privacy in the Age of
Neuroscience, David Grant argues that we need to reconceptualize
privacy in a manner that will allow us to reap the rewards of
neuroscience while still protecting our privacy and, ultimately,
our humanity. Grant delves into our relationship with technology,
the latest in what he describes as a historical series of
'magnitudes', following Deity, the State and the Market, proposing
the idea that, for this new magnitude (Technology), we must control
rather than be subjected to it. In this provocative work, Grant
unveils a radical account of privacy and an equally radical
proposal to create the social infrastructure we need to support it.
Networks powered by algorithms are pervasive. Major contemporary
technology trends - Internet of Things, Big Data, Digital Platform
Power, Blockchain, and the Algorithmic Society - are manifestations
of this phenomenon. The internet, which once seemed an unambiguous
benefit to society, is now the basis for invasions of privacy,
massive concentrations of power, and wide-scale manipulation. The
algorithmic networked world poses deep questions about power,
freedom, fairness, and human agency. The influential 1997 Federal
Communications Commission whitepaper "Digital Tornado" hailed the
"endless spiral of connectivity" that would transform society, and
today, little remains untouched by digital connectivity. Yet
fundamental questions remain unresolved, and even more serious
challenges have emerged. This important collection, which offers a
reckoning and a foretelling, features leading technology scholars
who explain the legal, business, ethical, technical, and public
policy challenges of building pervasive networks and algorithms for
the benefit of humanity. This title is also available as Open
Access on Cambridge Core.
Google is the most popular search engine ever created, but Google's
search capabilities are so powerful, they sometimes discover
content that no one ever intended to be publicly available on the
Web, including social security numbers, credit card numbers, trade
secrets, and federally classified documents. Google Hacking for
Penetration Testers, Third Edition, shows you how security
professionals and system administratord manipulate Google to find
this sensitive information and "self-police" their own
organizations. You will learn how Google Maps and Google Earth
provide pinpoint military accuracy, see how bad guys can manipulate
Google to create super worms, and see how they can "mash up" Google
with Facebook, LinkedIn, and more for passive reconnaissance. This
third edition includes completely updated content throughout and
all new hacks such as Google scripting and using Google hacking
with other search engines and APIs. Noted author Johnny Long,
founder of Hackers for Charity, gives you all the tools you need to
conduct the ultimate open source reconnaissance and penetration
testing.
Handbook of IoT and Blockchain: Methods, solutions, and Recent
Advancements includes contributions from around the globe on recent
advances and findings in the domain of Internet of Things (IoT) and
Blockchain. Chapters include theoretical analysis, practical
implications, and extensive surveys with analysis on methods,
algorithms, and processes for new product development. IoT and
Blockchain are the emerging topics in the current manufacturing
scenario.This handbook includes recent advances; showcases the work
of research around the globe; offers theoretical analysis and
practical implications; presents extensive surveys with analysis,
new contributions, and proposals on methods, algorithms, and
processes; and also covers recent advances from quantitative and
qualitative articles, case studies, conceptual works, and
theoretical backing. This handbook will be of interest to graduate
students, researchers, academicians, institutions, and
professionals that are interested in exploring the areas of IoT and
Blockchain.
People increasingly live online, sharing publicly what might have
once seemed private, but at the same time are enraged by extremes
of government surveillance and the corresponding invasion into our
private lives. In this enlightening work, Adam Henschke re-examines
privacy and property in the age of surveillance in order to
understand not only the importance of these social conventions, but
also their moral relevance. By analyzing identity and information,
and presenting a case for a relation between the two, he explains
the moral importance of virtual identities and offers an ethically
robust solution to designing surveillance technologies. This book
should be read by anyone interested in surveillance technology, new
information technology more generally, and social concepts like
privacy and property.
|
You may like...
Glass Tower
Sarah Isaacs
Paperback
R280
R259
Discovery Miles 2 590
|