![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
In today's world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.
Here are two "live" discussions by radical activists introducing the issues of movement security: u.s. activist and author J. Sakai & long-time Canadian organizer Mandy Hiscocks.
"Two leading reputation experts reveal how the internet is being
used to destroy brands, reputations and even lives, and how to
fight back.
Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.
Attention to corporate information has never been more important than now. The ability to generate accurate business intelligence, accurate financial reports and to understand your business relies on better processes and personal commitment to clean data. Every byte of data that resides inside your company, and some that resides outside its walls, has the potential to make you stronger by giving you the agility, speed and intelligence that none of your competitors yet have. Data governance is the term given to changing the hearts and minds of your company to see the value of such information quality. The Data Governance Imperative is a business person's view of data governance. This practical book covers both strategies and tactics around managing a data governance initiative. The author, Steve Sarsfield, works for a major enterprise software company and is a leading expert in data quality and data governance, focusing on the business perspectives that are important to data champions, front-office employees, and executives. Steve runs an award-winning and world-recognized blog called the Data Governance and Data Quality Insider, offering practical wisdom.
From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.
"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.
"Identity Theft: A Comprehensive Guide," enables readers to understand, prevent and recover from the crime of identity theft. Included in the book are chapters on how to safeguard your computer, how to avoid scams, 40 ways to prevent identity theft, 20 things to do if you are a victim of identity theft, how to order your free credit report and FACTA. Thorough information is provided on the latest identity theft insurance and what to avoid in purchasing this type of protection. The book includes a library of letters an identity theft victim will need to use and a snapshot of current state laws influencing identity theft.
Analyzes privacy policy instruments available to contemporary industrial states, from government regulations and transnational regimes to self-regulation and privacy enhancing technologies. Privacy protection, according to Colin Bennett and Charles Raab, involves politics and public policy as much as it does law and technology. Moreover, the protection of our personal information in a globalized, borderless world means that privacy-related policies are inextricably interdependent. In this updated paperback edition of The Governance of Privacy, Bennett and Raab analyze a broad range of privacy policy instruments available to contemporary advanced industrial states, from government regulations and transnational regimes to self-regulation and privacy-enhancing technologies. They consider two possible dynamics of privacy regulation-a "race to the bottom," with competitive deregulation by countries eager to attract global investment in information technology, versus "a race to the top," with the progressive establishment of global privacy standards. Bennett and Raab begin by discussing the goals of privacy protection, the liberal and individualist assumptions behind it, and the neglected relationship between privacy and social equity. They describe and evaluate different policy instruments, including the important 1995 Directive on Data Protection from the European Union, as well as the general efficacy of the "top-down" statutory approach and self-regulatory and technological alternatives to it. They evaluate the interrelationships of these policy instruments and their position in a global framework of regulation and policy by state and non-state actors. And finally, they consider whether all of this policy activity at international, national, and corporate levels necessarily means higher levels of privacy protection.
Use this book as both an XML primer and to get up to speed on XML-related security issues. Written by the experts at RSA Security, Inc., you’ll get inside tips on how to prevent denial of service attacks, and how to implement security measures to keep your XML programs protected.
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.
Learn to implement a solid mCommerce security plan--from start to finish Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies, you'll learn best practices for implementing specific security methods in key industries--including banking, retail, entertainment, military, travel, and healthcare. The book also contains 8 pages of blueprints that depict secure end-to-end mCommerce architecture as well as identify key vulnerability points.Explore the latest security topics for both business and consumer mCommerce applications Improve services offered to customers through secure mCommerce applications Get details on various types of mobile applications and understand their security risks--including commerce, payments, information, communications, gaming, and military Discover the differences between mobile versus wired security Address mobile security issues in key industries such as banking and finance, travel, manufacturing, entertainment, public services, and defense Recognize the time- and cost-saving benefits of secured mCommerce applications through comprehensive case studies Preview the security of future mobile applications--such as 3G/4G networks and wearable computers
Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.
Privacy is perhaps the most hallowed of American rights--and most people are concerned that new technologies available to governments and corporations threaten to erode this most privileged of rights. But in The Limits of Privacy, Amitai Etzioni offers a decidedly different point of view, in which the right to privacy is balanced against concern for public safety and health. Etzioni looks at five flashpoint issues: Megan's Laws, HIV testing of infants, deciphering of encrypted messages, national identification cards, and medical records, and concludes that there are times when Amricans' insistence on privacy is not in the best interests of society at large. He offers four clear and concise criteria which, when applied jointly, help us to determine when the right to privacy should be overridden for the greater public good.Almost every week headlines warn us that our cell phones are being monitored, our e-mails read, and our medical records traded on the open market. Public opinion polls show that Americans are dismayed about incursions against personal privacy. Congress and state legislatures are considering laws designed to address their concerns.Focusing on five flashpoint issues--Megan's Law, mandatory HIV testing of infants, encryption of electronic documents, national identification cards and biometric identifiers, and medical records--The Limits of Privacy argues counterintuitively that sometimes major public health and safety concerns should outweigh the individual's right to privacy. Presenting four concise criteria to determine when the right to privacy should be preserved and when it should be overridden in the interests of the wider community, Etzioni argues that, in somecases, we would do well to sacrifice the privacy of the individual in the name of the common good.
Wenn Sie neugierig auf die Grundlagen der kunstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die fur die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tagliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen. Sie mussen keine Vorkenntnisse uber diese vielseitigen Technologien haben, denn der Autor Volker Lang fuhrt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einpragsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nachsten Kapitel ubergehen. Dieses Buch geht den digitalen Schlagwoertern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten. Das Aufschlusseln von Themen wie automatisiertes Fahren und intelligente Robotik mit kunstlicher Intelligenz, Blockchain-basierte Kryptowahrungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlasslich, um fur die Zukunft der Industrie gerustet zu sein. Unabhangig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder oeffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan fur alle Ihre Anforderungen an Technologie- und Innovationsstrategien. Was Sie lernen werden Sich im digitalen Zeitalter orientieren, ohne Vorkenntnisse uber digitale Technologien und digitale Transformation zu benoetigen Lernen Sie die beliebtesten aktuellen und zukunftigen Anwendungen von kunstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit fuhrenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um. Fur wen dieses Buch bestimmt ist Vordenker, Fuhrungskrafte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungstrager, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen.
This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet. |
You may like...
|