|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
Privacy is one of the most urgent issues associated with
information technology and digital media. This book claims that
what people really care about when they complain and protest that
privacy has been violated is not the act of sharing information
itself--most people understand that this is crucial to social life
--but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to
concern about control over personal information, Helen Nissenbaum
counters that information ought to be distributed and protected
according to norms governing distinct social contexts--whether it
be workplace, health care, schools, or among family and friends.
She warns that basic distinctions between public and private,
informing many current privacy policies, in fact obscure more than
they clarify. In truth, contemporary information systems should
alarm us only when they function without regard for social norms
and values, and thereby weaken the fabric of social life.
Privacy on the internet is challenged in a wide variety of ways -
from large social media companies, whose entire business models are
based on privacy invasion, through the developing technologies of
facial recognition, to the desire of governments to monitor our
every activity online. But the impact these issues have on our
daily lives is often underplayed or misunderstood. In this book,
Paul Bernal analyses how the internet became what it is today,
exploring how the current manifestation of the internet works for
people, for companies and even for governments, with reference to
the new privacy battlefields of location and health data, the
internet of things and the increasingly contentious issue of
personal data and political manipulation. The author then proposes
what we should do about the problems surrounding internet privacy,
such as significant changes in government policy, a reversal of the
current 'war' on encryption, being brave enough to take on the
internet giants, and challenging the idea that 'real names' would
improve the discourse on social networks. ABOUT THE SERIES: The
'What Do We Know and What Should We Do About...?' series offers
readers short, up-to-date overviews of key issues often
misrepresented, simplified or misunderstood in modern society and
the media. Each book is written by a leading social scientist with
an established reputation in the relevant subject area. The Series
Editor is Professor Chris Grey, Royal Holloway, University of
London
This book provides a practical guide to the DPO role, encompassing
the key activities you'll need to manage to succeed in the role.
Coverage includes data protection fundamentals and processes,
understanding risk and relevant standards, frameworks and tools,
with DPO tips also embedded throughout the book and case studies
included to support practice-based learning.
With the expansion of technology and governance, the information
governance industry has experienced dramatic and often, sudden
changes. Among the most important shifts are the proliferation of
data privacy rules and regulations, the exponential growth of data
and the need for removing redundant, obsolete, and trivial
information and the growing threat of litigation and regulatory
fines based on a failure to properly keep records and manage data.
At the same time, longstanding information governance standards and
best practices exist, which transcend the sudden vicissitudes of
the day.This volume focuses on these core IG principles, with an
emphasis on how they apply to our target audience, which includes
law librarians, legal and research staff and other individuals and
departments in both the public and private sectors who engage
deeply with regulatory compliance matters. Core topics that will be
addressed include: the importance of implementing and maintaining
cohesive records management workflows that implement the classic
principles of capturing, checking, recording, consolidation, and
review; the classic records management principles of
Accountability, Transparency, Integrity, Protection, Compliance,
Accessibility, Retention and Disposition; and archives Management
and the two principles of Providence and Original Order.
![The Implant (Paperback): Robert L. Ivey](//media.loot.co.za/images/x80/645897156609179215.jpg) |
The Implant
(Paperback)
Robert L. Ivey
|
R185
R160
Discovery Miles 1 600
Save R25 (14%)
|
Ships in 10 - 15 working days
|
|
|
|