|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
In Online Predators, An Internet Insurgency: A Field Manual for
Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings
his ten plus years' experience in the fight against online child
exploitation to bear in an easy to follow guide for all with a
stake in the life of a child. This book equips parents, guardians,
extended family, and educational professionals with practical
strategies to help keep kids safe in a technology connected world.
Instead of focusing on ever changing technology, Lee proposes a key
fundamental change in the fight against online predation-to develop
an insatiable curiosity about their child's online life, then get
in the front lines and stay there.
Privacy and data protection are now important issues for companies
across the financial services industry. Financial records are
amongst the most sensitive for many consumers and the regulator is
keen to promote good data handling practices in an industry that is
looking towards increased customer profiling, for both risk
management and opportunity spotting. Mandy Webster's Data
Protection in the Financial Services Industry explains how to
manage privacy and data protection issues throughout the customer
cycle; from making contact to seeking additional business from
current customers. She also looks at the precise role of the
Financial Services Authority and its response to compliance or
non-compliance. Each of the Eight Principles of the Data Protection
Act are reviewed and explained.
The Future of Open Data flows from a multi-year Social Sciences and
Humanities Research Council (SSHRC) Partnership Grant project that
set out to explore open government geospatial data from an
interdisciplinary perspective. Researchers on the grant adopted a
critical social science perspective grounded in the imperative that
the research should be relevant to government and civil society
partners in the field. This book builds on the knowledge developed
during the course of the grant and asks the question, "What is the
future of open data?" The contributors' insights into the future of
open data combine observations from five years of research about
the Canadian open data community with a critical perspective on
what could and should happen as open data efforts evolve. Each of
the chapters in this book addresses different issues and each is
grounded in distinct disciplinary or interdisciplinary
perspectives. The opening chapter reflects on the origins of open
data in Canada and how it has progressed to the present date,
taking into account how the Indigenous data sovereignty movement
intersects with open data. A series of chapters address some of the
pitfalls and opportunities of open data and consider how the
changing data context may impact sources of open data, limits on
open data, and even liability for open data. Another group of
chapters considers new landscapes for open data, including open
data in the global South, the data priorities of local governments,
and the emerging context for rural open data.
DNS Security: Defending the Domain Name System provides tactics on
how to protect a Domain Name System (DNS) framework by exploring
common DNS vulnerabilities, studying different attack vectors, and
providing necessary information for securing DNS infrastructure.
The book is a timely reference as DNS is an integral part of the
Internet that is involved in almost every attack against a network.
The book focuses entirely on the security aspects of DNS, covering
common attacks against DNS servers and the protocol itself, as well
as ways to use DNS to turn the tables on the attackers and stop an
incident before it even starts.
Neuroscience has begun to intrude deeply into what it means to be
human, an intrusion that offers profound benefits but will demolish
our present understanding of privacy. In Privacy in the Age of
Neuroscience, David Grant argues that we need to reconceptualize
privacy in a manner that will allow us to reap the rewards of
neuroscience while still protecting our privacy and, ultimately,
our humanity. Grant delves into our relationship with technology,
the latest in what he describes as a historical series of
'magnitudes', following Deity, the State and the Market, proposing
the idea that, for this new magnitude (Technology), we must control
rather than be subjected to it. In this provocative work, Grant
unveils a radical account of privacy and an equally radical
proposal to create the social infrastructure we need to support it.
Neuroscience has begun to intrude deeply into what it means to be
human, an intrusion that offers profound benefits but will demolish
our present understanding of privacy. In Privacy in the Age of
Neuroscience, David Grant argues that we need to reconceptualize
privacy in a manner that will allow us to reap the rewards of
neuroscience while still protecting our privacy and, ultimately,
our humanity. Grant delves into our relationship with technology,
the latest in what he describes as a historical series of
'magnitudes', following Deity, the State and the Market, proposing
the idea that, for this new magnitude (Technology), we must control
rather than be subjected to it. In this provocative work, Grant
unveils a radical account of privacy and an equally radical
proposal to create the social infrastructure we need to support it.
Networks powered by algorithms are pervasive. Major contemporary
technology trends - Internet of Things, Big Data, Digital Platform
Power, Blockchain, and the Algorithmic Society - are manifestations
of this phenomenon. The internet, which once seemed an unambiguous
benefit to society, is now the basis for invasions of privacy,
massive concentrations of power, and wide-scale manipulation. The
algorithmic networked world poses deep questions about power,
freedom, fairness, and human agency. The influential 1997 Federal
Communications Commission whitepaper "Digital Tornado" hailed the
"endless spiral of connectivity" that would transform society, and
today, little remains untouched by digital connectivity. Yet
fundamental questions remain unresolved, and even more serious
challenges have emerged. This important collection, which offers a
reckoning and a foretelling, features leading technology scholars
who explain the legal, business, ethical, technical, and public
policy challenges of building pervasive networks and algorithms for
the benefit of humanity. This title is also available as Open
Access on Cambridge Core.
Over 700 pages of insight into all things cybersecurity
Cybersecurity All-in-One For Dummies covers a lot of ground in the
world of keeping computer systems safe from those who want to break
in. This book offers a one-stop resource on cybersecurity basics,
personal security, business security, cloud security, security
testing, and security awareness. Filled with content to help with
both personal and business cybersecurity needs, this book shows you
how to lock down your computers, devices, and systems--and explains
why doing so is more important now than ever. Dig in for info on
what kind of risks are out there, how to protect a variety of
devices, strategies for testing your security, securing cloud data,
and steps for creating an awareness program in an organization.
Explore the basics of cybersecurity at home and in business Learn
how to secure your devices, data, and cloud-based assets Test your
security to find holes and vulnerabilities before hackers do Create
a culture of cybersecurity throughout an entire organization This
For Dummies All-in-One is a stellar reference for business owners
and IT support pros who need a guide to making smart security
choices. Any tech user with concerns about privacy and protection
will also love this comprehensive guide.
Handbook of IoT and Blockchain: Methods, solutions, and Recent
Advancements includes contributions from around the globe on recent
advances and findings in the domain of Internet of Things (IoT) and
Blockchain. Chapters include theoretical analysis, practical
implications, and extensive surveys with analysis on methods,
algorithms, and processes for new product development. IoT and
Blockchain are the emerging topics in the current manufacturing
scenario.This handbook includes recent advances; showcases the work
of research around the globe; offers theoretical analysis and
practical implications; presents extensive surveys with analysis,
new contributions, and proposals on methods, algorithms, and
processes; and also covers recent advances from quantitative and
qualitative articles, case studies, conceptual works, and
theoretical backing. This handbook will be of interest to graduate
students, researchers, academicians, institutions, and
professionals that are interested in exploring the areas of IoT and
Blockchain.
|
You may like...
On Thin Ice
Leading Cybersecurity Experts
Hardcover
R680
Discovery Miles 6 800
|