|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
" A primer in practical computer security aimed at those shopping, communicating, or doing business online – almost everyone, in other words." – The Economist Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world? The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive. " This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that’ s not yet everybody, it soon will be." – Stephen H. Wildstrom, BusinessWeek " It’ s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lie pulls off this feat rather well." – Dustin Puryear, Linux.com " Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible." – Los Angeles Times
Digital Forensics and Cyber Investigation equips students, law
enforcement officers, government employees, business employees, and
cybersecurity practitioners with the competencies and fundamental
knowledge base they need to tackle issues involving cybercrime and
cyber investigations. The book introduces readers to process of
conducting successful forensic examinations of digital devices and
computer networks through hands-on practice and comprehensive
exploration of cyber-investigation techniques. Over the course of
15 chapters, readers gain foundational knowledge on
cybercrime-focused digital forensics and develop their ability to
apply this knowledge to cybercrime cases. Opening chapters examine
computer ethics in cybercrime investigation and cybersecurity
practice, the basics of information technology, mobile forensics,
and email evidence and analysis. In additional chapters, students
learn about electronic vandalism, phishing scams, geo-localization
and cyberspace detection, and dark web investigation. They are
provided with historical overviews and proven frameworks for
developing strategic plans to counter cybersecurity and
cyberterrorism attempts and attacks. Providing readers with
essential, timely knowledge, Digital Forensics is an ideal resource
for students and practitioners in the fields of digital forensics
and cybercrime investigation.
The notion of surveillance has become increasingly more crucial in
public conversation as new tools of observation are obtained by
many different players. The traditional notion of "overseeing" is
being increasingly replaced by multi-level surveillance where many
different actors, at different levels of hierarchy, from the child
surveilling the parent to the state surveilling its citizens, are
entering the surveillance theater. This creates a unique
surveillance ecosystem where the individual is observed not only as
an analog flesh-and-blood body moving through real spaces such as a
shopping mall, but also tracked as a data point where the volume of
data is perpetually and permanently expanding as the digital life
story is inscribed in the digital spaces. The combined narrative of
the individual is now under surveillance. Modern Day Surveillance
Ecosystem and Impacts on Privacy navigates the reader through an
understanding of the self as a narrative element that is open for
observation and analysis. This book provides a broad-based and
theoretically grounded look at the overall processes of
surveillance in a global system. Covering topics including
commodity, loss of privacy, and big data, this text is essential
for researchers, government officials, policymakers, security
analysts, lawmakers, teachers, professors, graduate and
undergraduate students, practitioners, and academicians interested
in communication, technology, surveillance, privacy, and more.
Build trust with your library's users by securing their data
privacy. Taking a holistic approach, this guide presents practical
ways to implement privacy ethics into data practices. Libraries are
not exempt from the financial costs of data breaches or leaks, no
matter the size. Whether from a library worker unwittingly sharing
a patron's address with a perpetrator of domestic violence to
leaving sensitive patron data unprotected, patrons can also pay a
hefty price when libraries fail to manage patron data securely and
ethically. In this guide, readers will learn concrete action steps
for putting the ethical management of data into practice, following
two common public and academic library cumulative case studies. The
authors explore such key topics as succinct summaries of major U.S.
laws and other regulations and standards governing patron data
management; information security practices to protect patrons and
libraries from common threats; how to navigate barriers in
organizational culture when implementing data privacy measures;
sources for publicly available, customizable privacy training
material for library workers; the data life cycle from planning and
collecting to disposal; how to conduct a data inventory;
understanding the associated privacy risks of different types of
library data; why the current popular model of library assessment
can become a huge privacy invasion; addressing key topics while
keeping your privacy policy clear and understandable to patrons;
and data privacy and security provisions to look for in vendor
contracts.
With the expansion of technology and governance, the information
governance industry has experienced dramatic and often, sudden
changes. Among the most important shifts are the proliferation of
data privacy rules and regulations, the exponential growth of data
and the need for removing redundant, obsolete, and trivial
information and the growing threat of litigation and regulatory
fines based on a failure to properly keep records and manage data.
At the same time, longstanding information governance standards and
best practices exist, which transcend the sudden vicissitudes of
the day.This volume focuses on these core IG principles, with an
emphasis on how they apply to our target audience, which includes
law librarians, legal and research staff and other individuals and
departments in both the public and private sectors who engage
deeply with regulatory compliance matters. Core topics that will be
addressed include: the importance of implementing and maintaining
cohesive records management workflows that implement the classic
principles of capturing, checking, recording, consolidation, and
review; the classic records management principles of
Accountability, Transparency, Integrity, Protection, Compliance,
Accessibility, Retention and Disposition; and archives Management
and the two principles of Providence and Original Order.
|
|