|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The Future of Open Data flows from a multi-year Social Sciences and
Humanities Research Council (SSHRC) Partnership Grant project that
set out to explore open government geospatial data from an
interdisciplinary perspective. Researchers on the grant adopted a
critical social science perspective grounded in the imperative that
the research should be relevant to government and civil society
partners in the field. This book builds on the knowledge developed
during the course of the grant and asks the question, "What is the
future of open data?" The contributors' insights into the future of
open data combine observations from five years of research about
the Canadian open data community with a critical perspective on
what could and should happen as open data efforts evolve. Each of
the chapters in this book addresses different issues and each is
grounded in distinct disciplinary or interdisciplinary
perspectives. The opening chapter reflects on the origins of open
data in Canada and how it has progressed to the present date,
taking into account how the Indigenous data sovereignty movement
intersects with open data. A series of chapters address some of the
pitfalls and opportunities of open data and consider how the
changing data context may impact sources of open data, limits on
open data, and even liability for open data. Another group of
chapters considers new landscapes for open data, including open
data in the global South, the data priorities of local governments,
and the emerging context for rural open data.
_______________ 'One of the best books yet written on data and
algorithms. . .deserves a place on the bestseller charts.' (The
Times) You are accused of a crime. Who would you rather determined
your fate - a human or an algorithm? An algorithm is more
consistent and less prone to error of judgement. Yet a human can
look you in the eye before passing sentence. Welcome to the age of
the algorithm, the story of a not-too-distant future where machines
rule supreme, making important decisions - in healthcare,
transport, finance, security, what we watch, where we go even who
we send to prison. So how much should we rely on them? What kind of
future do we want? Hannah Fry takes us on a tour of the good, the
bad and the downright ugly of the algorithms that surround us. In
Hello World she lifts the lid on their inner workings, demonstrates
their power, exposes their limitations, and examines whether they
really are an improvement on the humans they are replacing. A BBC
RADIO 4: BOOK OF THE WEEK SHORTLISTED FOR THE 2018 BAILLIE GIFFORD
PRIZE AND 2018 ROYAL SOCIETY SCIENCE BOOK PRIZE
The world's most infamous hacker offers an insider's view of the
low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one
of the most exhaustive FBI manhunts in history and have spawned
dozens of articles, books, films, and documentaries. Since his
release from federal prison, in 1998, Mitnick has turned his life
around and established himself as one of the most sought-after
computer security experts worldwide. Now, in The Art of Deception,
the world's most notorious hacker gives new meaning to the old
adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security,
Mitnick explains why all the firewalls and encryption protocols in
the world will never be enough to stop a savvy grifter intent on
rifling a corporate database or an irate employee determined to
crash a system. With the help of many fascinating true stories of
successful attacks on business and government, he illustrates just
how susceptible even the most locked-down information systems are
to a slick con artist impersonating an IRS agent. Narrating from
the points of view of both the attacker and the victims, he
explains why each attack was so successful and how it could have
been prevented in an engaging and highly readable style reminiscent
of a true-crime novel. And, perhaps most importantly, Mitnick
offers advice for preventing these types of social engineering
hacks through security protocols, training programs, and manuals
that address the human element of security.
Neuroscience has begun to intrude deeply into what it means to be
human, an intrusion that offers profound benefits but will demolish
our present understanding of privacy. In Privacy in the Age of
Neuroscience, David Grant argues that we need to reconceptualize
privacy in a manner that will allow us to reap the rewards of
neuroscience while still protecting our privacy and, ultimately,
our humanity. Grant delves into our relationship with technology,
the latest in what he describes as a historical series of
'magnitudes', following Deity, the State and the Market, proposing
the idea that, for this new magnitude (Technology), we must control
rather than be subjected to it. In this provocative work, Grant
unveils a radical account of privacy and an equally radical
proposal to create the social infrastructure we need to support it.
Neuroscience has begun to intrude deeply into what it means to be
human, an intrusion that offers profound benefits but will demolish
our present understanding of privacy. In Privacy in the Age of
Neuroscience, David Grant argues that we need to reconceptualize
privacy in a manner that will allow us to reap the rewards of
neuroscience while still protecting our privacy and, ultimately,
our humanity. Grant delves into our relationship with technology,
the latest in what he describes as a historical series of
'magnitudes', following Deity, the State and the Market, proposing
the idea that, for this new magnitude (Technology), we must control
rather than be subjected to it. In this provocative work, Grant
unveils a radical account of privacy and an equally radical
proposal to create the social infrastructure we need to support it.
Networks powered by algorithms are pervasive. Major contemporary
technology trends - Internet of Things, Big Data, Digital Platform
Power, Blockchain, and the Algorithmic Society - are manifestations
of this phenomenon. The internet, which once seemed an unambiguous
benefit to society, is now the basis for invasions of privacy,
massive concentrations of power, and wide-scale manipulation. The
algorithmic networked world poses deep questions about power,
freedom, fairness, and human agency. The influential 1997 Federal
Communications Commission whitepaper "Digital Tornado" hailed the
"endless spiral of connectivity" that would transform society, and
today, little remains untouched by digital connectivity. Yet
fundamental questions remain unresolved, and even more serious
challenges have emerged. This important collection, which offers a
reckoning and a foretelling, features leading technology scholars
who explain the legal, business, ethical, technical, and public
policy challenges of building pervasive networks and algorithms for
the benefit of humanity. This title is also available as Open
Access on Cambridge Core.
Handbook of IoT and Blockchain: Methods, solutions, and Recent
Advancements includes contributions from around the globe on recent
advances and findings in the domain of Internet of Things (IoT) and
Blockchain. Chapters include theoretical analysis, practical
implications, and extensive surveys with analysis on methods,
algorithms, and processes for new product development. IoT and
Blockchain are the emerging topics in the current manufacturing
scenario.This handbook includes recent advances; showcases the work
of research around the globe; offers theoretical analysis and
practical implications; presents extensive surveys with analysis,
new contributions, and proposals on methods, algorithms, and
processes; and also covers recent advances from quantitative and
qualitative articles, case studies, conceptual works, and
theoretical backing. This handbook will be of interest to graduate
students, researchers, academicians, institutions, and
professionals that are interested in exploring the areas of IoT and
Blockchain.
People increasingly live online, sharing publicly what might have
once seemed private, but at the same time are enraged by extremes
of government surveillance and the corresponding invasion into our
private lives. In this enlightening work, Adam Henschke re-examines
privacy and property in the age of surveillance in order to
understand not only the importance of these social conventions, but
also their moral relevance. By analyzing identity and information,
and presenting a case for a relation between the two, he explains
the moral importance of virtual identities and offers an ethically
robust solution to designing surveillance technologies. This book
should be read by anyone interested in surveillance technology, new
information technology more generally, and social concepts like
privacy and property.
|
|