|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
The internet has greatly enhanced access to, dissemination, and
sale of child pornography, which is a profitable industry estimated
to generate billions of dollars worldwide. While efforts to address
the issue of sexual exploitation of children may be slow, the
capabilities of offenders to organize, communicate over the
internet, and harness technology are unequivocally fast. Protection
of children against cyber exploitation has become imperative, and
measures should be taken that are specific and targeted to provide
specialized victim identification capabilities; adequate protection
for children using the internet; genuine participation of children;
a full and responsible private sector; and finally, coordinated,
effective, and structured international cooperation to protect all
children. Combating the Exploitation of Children in Cyberspace
provides innovative research for understanding all elements of
combating cyber exploitation of children including the roles of law
enforcement, international organizations, and the judicial system
and educating children and their families to the dangers of the
independent internet usage through cyberspace awareness programs.
The content within this publication examines child grooming,
cyberbullying, and cybercrime. It is designed for law enforcement,
lawmakers, teachers, government officials, policymakers, IT
specialists, cybercriminal researchers, psychologists, victim
advocates, professionals, academicians, researchers, and students.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
The successes and failures of an industry that claims to protect
and promote our online identities What does privacy mean in the
digital era? As technology increasingly blurs the boundary between
public and private, questions about who controls our data become
harder and harder to answer. Our every web view, click, and online
purchase can be sold to anyone to store and use as they wish. At
the same time, our online reputation has become an important part
of our identity-a form of cultural currency. The Identity Trade
examines the relationship between online visibility and privacy,
and the politics of identity and self-presentation in the digital
age. In doing so, Nora Draper looks at the revealing two-decade
history of efforts by the consumer privacy industry to give
individuals control over their digital image through the sale of
privacy protection and reputation management as a service. Through
in-depth interviews with industry experts, as well as analysis of
media coverage, promotional materials, and government policies,
Draper examines how companies have turned the protection and
promotion of digital information into a business. Along the way,
she also provides insight into how these companies have responded
to and shaped the ways we think about image and reputation in the
digital age. Tracking the successes and failures of companies
claiming to control our digital ephemera, Draper takes us inside an
industry that has commodified strategies of information control.
This book is a discerning overview of the debate around who
controls our data, who buys and sells it, and the consequences of
treating privacy as a consumer good.
|
|