|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Collect data and build trust. With the rise of data science and
machine learning, companies are awash in customer data and powerful
new ways to gain insight from that data. But in the absence of
regulation and clear guidelines from most federal or state
governments, it's difficult for companies to understand what
qualifies as reasonable use and then determine how to act in the
best interest of their customers. How do they build, not erode,
trust? Customer Data and Privacy: The Insights You Need from
Harvard Business Review brings you today's most essential thinking
on customer data and privacy to help you understand the tangled
interdependencies and complexities of this evolving issue. The
lessons in this book will help you develop strategies that allow
your company to be a good steward, collecting, using, and storing
customer data responsibly. Business is changing. Will you adapt or
be left behind? Get up to speed and deepen your understanding of
the topics that are shaping your company's future with the Insights
You Need from Harvard Business Review series. Featuring HBR's
smartest thinking on fast-moving issues—blockchain,
cybersecurity, AI, and more—each book provides the
foundational introduction and practical case studies your
organization needs to compete today and collects the best research,
interviews, and analysis to get it ready for tomorrow. You can't
afford to ignore how these issues will transform the landscape of
business and society. The Insights You Need series will help you
grasp these critical ideas—and prepare you and your
company for the future.
Nearly two decades after the EU first enacted data protection
rules, key questions about the nature and scope of this EU policy,
and the harms it seeks to prevent, remain unanswered. The inclusion
of a Right to Data Protection in the EU Charter has increased the
salience of these questions, which must be addressed in order to
ensure the legitimacy, effectiveness and development of this
Charter right and the EU data protection regime more generally. The
Foundations of EU Data Protection Law is a timely and important
work which sheds new light on this neglected area of law,
challenging the widespread assumption that data protection is
merely a subset of the right to privacy. By positioning EU data
protection law within a comprehensive conceptual framework, it
argues that data protection has evolved from a regulatory
instrument into a fundamental right in the EU legal order and that
this right grants individuals more control over more forms of data
than the right to privacy. It suggests that this dimension of the
right to data protection should be explicitly recognised, while
identifying the practical and conceptual limits of individual
control over personal data. At a time when EU data protection law
is sitting firmly in the international spotlight, this book offers
academics, policy-makers, and practitioners a coherent vision for
the future of this key policy and fundamental right in the EU legal
order, and how best to realise it.
 |
IT-Sicherheitsmanagement nach der neuen ISO 27001
- ISMS, Risiken, Kennziffern, Controls
(German, Paperback, 2., akt. Aufl. 2020)
Heinrich Kersten, Gerhard Klett, Jurgen Reuter, Klaus-Werner Schroeder
|
R1,111
Discovery Miles 11 110
|
Ships in 10 - 15 working days
|
|
Dieses Buch behandelt das Management der Informationssicherheit auf
der Basis der Norm ISO/IEC 27001. Mit der 2. Auflage wurden die
Inhalte des Fachbuches umfassend aktualisiert und den Neuerungen
der Norm angepasst. Die Autoren erlautern kompetent den Standard
und seine organisatorisch-technische Umsetzung. Dies betrifft die
Anforderungen an das Informationssicherheits-Managementsystem
(ISMS) genauso wie die 114 Controls aus dem Anhang der Norm. Die
ausfuhrlich kommentierten Controls unterstutzen
Sicherheitsverantwortliche bei der Auswahl geeigneter
Sicherheitsmassnahmen in allen Bereichen. Die Normenreihe ISO 27000
ist ein wichtiges Hilfsmittel fur Unternehmen und Behoerden, die
ein IT-Sicherheitsmanagement in ihrer Organisation einfuhren und
betreiben wollen. Im internationalen Kontext ist die Anwendung der
ISO 27001 fur viele Organisationen nahezu unverzichtbar. Nicht
zuletzt mit dem deutschen IT-Sicherheitsgesetz erhalt dieser
Standard auch national eine hohe Bedeutung. Seit der Neufassung der
Norm im Jahr 2015 (deutsche Version) und AEnderungen in 2017 mussen
sich alle Organisationen entsprechend umstellen und ihr ISMS
anpassen. Hierfur enthalt das Buch entsprechende "Fahrplane".
Develop a comprehensive plan for building a HIPAA-compliant
security operations center, designed to detect and respond to an
increasing number of healthcare data breaches and events. Using
risk analysis, assessment, and management data combined with
knowledge of cybersecurity program maturity, this book gives you
the tools you need to operationalize threat intelligence,
vulnerability management, security monitoring, and incident
response processes to effectively meet the challenges presented by
healthcare's current threats. Healthcare entities are bombarded
with data. Threat intelligence feeds, news updates, and messages
come rapidly and in many forms such as email, podcasts, and more.
New vulnerabilities are found every day in applications, operating
systems, and databases while older vulnerabilities remain
exploitable. Add in the number of dashboards, alerts, and data
points each information security tool provides and security teams
find themselves swimming in oceans of data and unsure where to
focus their energy. There is an urgent need to have a cohesive plan
in place to cut through the noise and face these threats.
Cybersecurity operations do not require expensive tools or large
capital investments. There are ways to capture the necessary data.
Teams protecting data and supporting HIPAA compliance can do this.
All that's required is a plan-which author Eric Thompson provides
in this book. What You Will Learn Know what threat intelligence is
and how you can make it useful Understand how effective
vulnerability management extends beyond the risk scores provided by
vendors Develop continuous monitoring on a budget Ensure that
incident response is appropriate Help healthcare organizations
comply with HIPAA Who This Book Is For Cybersecurity, privacy, and
compliance professionals working for organizations responsible for
creating, maintaining, storing, and protecting patient information.
Fifty years ago, in "1984, " George Orwell imagined a future in
which privacy was demolished by a totalitarian state that used
spies, video surveillance, historical revisionism, and control over
the media to maintain its power. Those who worry about personal
privacy and identity--especially in this day of technologies that
encroach upon these rights--still use Orwell's "Big Brother"
language to discuss privacy issues. But the reality is that the age
of a monolithic Big Brother is over. And yet the threats are
perhaps even more likely to destroy the rights we've assumed were
ours.
"Database Nation: The Death of Privacy in the 21st Century"
shows how, in these early years of the 21st century, advances in
technology endanger our privacy in ways never before imagined.
Direct marketers and retailers track our every purchase;
surveillance cameras observe our movements; mobile phones will soon
report our location to those who want to track us; government
eavesdroppers listen in on private communications; misused medical
records turn our bodies and our histories against us; and linked
databases assemble detailed consumer profiles used to predict and
influence our behavior. Privacy--the most basic of our civil
rights--is in grave peril.
Simson Garfinkel--journalist, entrepreneur, and international
authority on computer security--has devoted his career to testing
new technologies and warning about their implications. This newly
revised update of the popular hardcover edition of "Database Nation
" is his compelling account of how invasive technologies will
affect our lives in the coming years. It's a timely, far-reaching,
entertaining, and thought-provoking look at the serious threats to
privacy facing us today. The book poses a disturbing question: how
can we protect our basic rights to privacy, identity, and autonomy
when technology is making invasion and control easier than ever
before?
Garfinkel's captivating blend of journalism, storytelling, and
futurism is a call to arms. It will frighten, entertain, and
ultimately convince us that we must take action now to protect our
privacy and identity before it's too late.
Der Datenschutz ist nicht ausreichend auf die Herausforderungen
moderner Informationstechnik mit Ubiquitous Computing, Big Data,
kunstlicher Intelligenz und lernenden Systemen eingestellt. Dies
gilt auch fur die Datenschutz-Grundverordnung. Die Beitrage des
Sammelbandes untersuchen die Anforderungen des digitalen Wandels an
Konzepte, Instrumente und Institutionen des Datenschutzes; sie
eroertern Loesungen fur bisher ungeregelte Datenschutzprobleme,
entwerfen Konzepte fur einen modernen Grundrechts- und Datenschutz
und entwickeln Modelle fur eine Evolution des Datenschutzes in der
kunftigen digitalen Welt.
Reimagining transparency and secrecy in the era of digital data
When total data surveillance delimits agency and revelations of
political wrongdoing fail to have consequences, is transparency the
social panacea liberal democracies purport it to be? This book sets
forth the provocative argument that progressive social goals would
be better served by a radical form of secrecy, at least while state
and corporate forces hold an asymmetrical advantage over the less
powerful in data control. Clare Birchall asks: How might
transparency actually serve agendas that are far from transparent?
Can we imagine a secrecy that could act in the service of, rather
than against, a progressive politics? To move beyond atomizing
calls for privacy and to interrupt the perennial tension between
state security and the public's right to know, Birchall adapts
Edouard Glissant's thinking to propose a digital "right to
opacity." As a crucial element of radical secrecy, she argues, this
would eventually give rise to a "postsecret" society, offering an
understanding and experience of the political that is free from the
false choice between secrecy and transparency. She grounds her
arresting story in case studies including the varied presidential
styles of George W. Bush, Barack Obama, and Donald Trump; the
Snowden revelations; conspiracy theories espoused or endorsed by
Trump; WikiLeaks and guerrilla transparency; and the opening of the
state through data portals. Postsecrecy is the necessary condition
for imagining, finally, an alternative vision of "the good," of
equality, as neither shaped by neoliberal incarnations of
transparency nor undermined by secret state surveillance. Not
least, postsecrecy reimagines collective resistance in the era of
digital data.
Would you say your phone is safe, or your computer? What about your
car? Or your bank? There is a global war going on and the next
target could be anyone - an international corporation or a randomly
selected individual. From cybercrime villages in Romania to
intellectual property theft campaigns in China, these are the true
stories of the hackers behind some of the largest cyberattacks in
history and those committed to stopping them. You've never heard of
them and you're not getting their real names. Kate Fazzini has met
the hackers who create new cyberweapons, hack sports cars and
develop ransomware capable of stopping international banks in their
tracks. Kingdom of Lies is a fast-paced look at technological
innovations that were mere fantasy only a few years ago, but now
make up an integral part of all our lives.
This book offers a comprehensive introduction to relational (SQL)
and non-relational (NoSQL) databases. The authors thoroughly review
the current state of database tools and techniques, and examine
coming innovations. The book opens with a broad look at data
management, including an overview of information systems and
databases, and an explanation of contemporary database types: SQL
and NoSQL databases, and their respective management systems The
nature and uses of Big Data A high-level view of the organization
of data management Data Modeling and Consistency Chapter-length
treatment is afforded Data Modeling in both relational and graph
databases, including enterprise-wide data architecture, and
formulas for database design. Coverage of languages extends from an
overview of operators, to SQL and and QBE (Query by Example), to
integrity constraints and more. A full chapter probes the
challenges of Ensuring Data Consistency, covering: Multi-User
Operation Troubleshooting Consistency in Massive Distributed Data
Comparison of the ACID and BASE consistency models, and more System
Architecture also gets from its own chapter, which explores
Processing of Homogeneous and Heterogeneous Data; Storage and
Access Structures; Multi-dimensional Data Structures and Parallel
Processing with MapReduce, among other topics. Post-Relational and
NoSQL Databases The chapter on post-relational databases discusses
the limits of SQL - and what lies beyond, including
Multi-Dimensional Databases, Knowledge Bases and and Fuzzy
Databases. A final chapter covers NoSQL Databases, along with
Development of Non-Relational Technologies, Key-Value,
Column-Family and Document Stores XML Databases and Graphic
Databases, and more The book includes more than 100 tables,
examples and illustrations, and each chapter offers a list of
resources for further reading. SQL & NoSQL Databases conveys
the strengths and weaknesses of relational and non-relational
approaches, and shows how to undertake development for big data
applications. The book benefits readers including students and
practitioners working across the broad field of applied information
technology. This textbook has been recommended and developed for
university courses in Germany, Austria and Switzerland.
Do we need a law of privacy? Should judges be allowed to stop us
reading about a footballer's adultery or enjoying pictures of a
film star's wedding? Is a super-model's cocaine addiction something
that she should be allowed to keep private? And aren't we entitled
to walk down the street without having our most intimate activities
recorded on security cameras and broadcast to the world?
These questions have divided not only the country but also our most
senior judges. Drawing a line between justified and unjustified
intrusion places great stresses on our legal traditions: some
judges favour stretching existing laws to help deserving victims,
whilst others feel it would be more honest simply to recognize
privacy as a new human right. The latter approach creates further
problems: shouldn't it be up to Parliament alone to create such a
right? And what about free speech: don't the newspapers and the
public have rights too?
The issues raised are often highly emotive. Newspapers are not
allowed to identify Thompson and Venables, the young men who
murdered two-year-old James Bulger, because their lives would be in
danger. Nobody may identify Mary Bell, who also killed when she was
a child, even though there was no such risk. Will paedophiles be
the next to demand lifelong anonymity?
Steering a course through this minefield requires a grasp of legal
concepts and principles and an understanding of how the law
develops. This book explores how the English legal system has had
to blend old laws on confidentiality with modern human rights law
in order to deal with these problematic issues. Written for
non-specialists by one of Britain's best known legal journalists,
this book provides a uniquely accessible guide to the legal aspects
of this topical debate.
Privacy on the internet is challenged in a wide variety of ways -
from large social media companies, whose entire business models are
based on privacy invasion, through the developing technologies of
facial recognition, to the desire of governments to monitor our
every activity online. But the impact these issues have on our
daily lives is often underplayed or misunderstood. In this book,
Paul Bernal analyses how the internet became what it is today,
exploring how the current manifestation of the internet works for
people, for companies and even for governments, with reference to
the new privacy battlefields of location and health data, the
internet of things and the increasingly contentious issue of
personal data and political manipulation. The author then proposes
what we should do about the problems surrounding internet privacy,
such as significant changes in government policy, a reversal of the
current 'war' on encryption, being brave enough to take on the
internet giants, and challenging the idea that 'real names' would
improve the discourse on social networks. ABOUT THE SERIES: The
'What Do We Know and What Should We Do About...?' series offers
readers short, up-to-date overviews of key issues often
misrepresented, simplified or misunderstood in modern society and
the media. Each book is written by a leading social scientist with
an established reputation in the relevant subject area. The Series
Editor is Professor Chris Grey, Royal Holloway, University of
London
Dieses Lehrbuch behandelt im ersten Teil schwerpunktmassig
technische Massnahmen, die den Schutz personenbezogener Daten
sicherstellen. Dazu werden grundlegende Verfahren der
Anonymisierung und der Gewahrleistung von Anonymitat im Internet
(z. B. Tor) vorgestellt. Das Buch gibt einen UEberblick uber
gangige Verfahren des Identitatsmanagements (z. B. OpenID Connect)
und die in elektronischen Ausweisdokumenten (z. B. im
Personalausweis) verwendeten Sicherheitsmassnahmen. Die
Datenschutz-Garantien der vermittelten Ansatze werden im Detail
behandelt. Im Bereich des World Wide Web erfahrt der Leser, wo die
Probleme aus Sicht des Datenschutzes liegen und wie diese Lucken
geschlossen werden koennen. Anonyme Bezahlverfahren und eine
Untersuchung von Bitcoin runden den technischen Teil des Buches ab.
Der Leser lernt Ansatze aus der Praxis kennen, um so je nach
Anforderungen in der Systementwicklung das passende Verfahren
auswahlen zu koennen. Im zweiten Teil werden die Grundlagen des
Datenschutzrechts behandelt. Denn technische Massnahmen sollen
unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche
Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im
Datenschutzrecht koennen technische Massnahmen nicht richtig
implementiert werden. Zum besseren Verstandnis erfolgt ein
UEberblick uber die Rechtsordnung insgesamt, in die das
Datenschutzrecht eingeordnet wird. Betrachtet werden die
europaische und die verfassungsrechtliche Dimension des
Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der
Datenschutz-Grundverordnung. Dabei werden auch besonders haufig
vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das
Webtracking eroertert. Beispielhaft werden datenschutzrechtliche
Falle bearbeitet.
|
|