0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (161)
  • R250 - R500 (191)
  • R500+ (820)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback): Denny... The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback)
Denny Cherry
R997 Discovery Miles 9 970 Ships in 10 - 15 working days

Who s watching you online? These days, it s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.

"The Basics of Digital Privacy" teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.

"The Basics of Digital Privacy" gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis
The most straightforward and up-to-date guide to privacy for anyone who goes online for work, school, or personal useReal-world examples show you how cyber criminals commit their crimes, and what you can do to keep your identity and your data safeWritten by author Denny Cherry, who teaches top security professionals how to protect huge databases of informationLearn the best ways to create secure passwords, chat, text, email and conduct business online without compromising your identity and your personal data"

Practical Anonymity - Hiding in Plain Sight Online (Paperback): Pete Loshin Practical Anonymity - Hiding in Plain Sight Online (Paperback)
Pete Loshin
R1,014 Discovery Miles 10 140 Ships in 10 - 15 working days

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing. "

Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview... Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks (Paperback)
J Sakai, Mandy Hiscocks
R211 Discovery Miles 2 110 Ships in 10 - 15 working days

Here are two "live" discussions by radical activists introducing the issues of movement security: u.s. activist and author J. Sakai & long-time Canadian organizer Mandy Hiscocks.


There are many books and articles reporting state repression, but not on that subject's more intimate relative, movement security. It is general practice to only pass along knowledge about movement security privately, in closed group lectures or by personal word-of-mouth. In fact, when new activists have questions about security problems, they quickly discover that there is no "Security for Dummies" to explore the basics. Adding to the confusion, the handful of available left security texts are usually about underground or illegal groups, not the far larger public movements that work on a more or less legal level.


During Montreal's 2013 Festival of Anarchy, J. Sakai gave a workshop about the politics of movement security, sharing the results of typical incidents of both the movement's successes and the movement's failures in combating the "political police" or state security agencies. He also discussed the nature of those state sub-cultures. This booklet contains a transcript of that talk, and of the subsequent lively question and answer period; along with several after-the-workshop observations by Sakai.


As he explains, "The key thing is, to start with, security is not about being macho vigilantes or having techniques of this or that. It's not some spy game. Security is about good politics. That's exactly why it's so difficult. But everyone will say that they have good politics. So this has to be broken down, this has to be explained." Which is what he does in this unusual talk.


Mandy Hiscocks comes at the topic from her personal experiences organizing against the 2010 G20 Summit in Toronto. In this in-depth interview, Hiscocks describes how her political scene and groups she worked with were infiltrated by undercover agents over a year before the summit even occurred. These police infiltrators provided information used in the prosecution of anti-Globalization organizers and participants. Hiscocks provides an honest and sobering appraisal of the practical challenge of State infiltration, and of how subsequent decisions played out in regards to the anti-G20 organizing and the repression that resulted. Hiscocks spent a year in prison as a result of these experiences, shortly after this interview was conducted.


Myjot (Paperback): Chris Hunter, Lisa Hunter Myjot (Paperback)
Chris Hunter, Lisa Hunter
R163 Discovery Miles 1 630 Ships in 10 - 15 working days

Can't remember your passwords? Tired of resetting your passwords? myJot is a convenient tool for jotting down important information we use on a daily basis for work, online accounts, social media, & email. myJot provides a convenient and organized way to keep usernames, passwords & account information centrally located.

Privacy - Select Issues & Laws for the 21st Century (Hardcover): Doris B Delrio Privacy - Select Issues & Laws for the 21st Century (Hardcover)
Doris B Delrio
R5,541 Discovery Miles 55 410 Ships in 12 - 19 working days

This book is a study of select issues and laws relating to privacy in the 21st century. Topics examined include an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA); background and issues related to the USA PATRIOT Act reauthorisation on government collection of private information; the United States v. Jones court case involving GPS monitoring, property and privacy; Fourth Amendment implications and legislative responses to drones in domestic surveillance operations; and the privacy and security concerns surrounding smart meter technology.

Mobile Device Security - Threats & Controls (Paperback): Willliam R O'Connor Mobile Device Security - Threats & Controls (Paperback)
Willliam R O'Connor
R1,769 Discovery Miles 17 690 Ships in 12 - 19 working days

Millions of Americans currently use mobile devices (eg: cellphones, smartphones, and tablet computers) on a daily basis to communicate, obtain internet-based information, and share their own information, photographs, and videos. Given the extent of consumer reliance on mobile interactions, it is increasingly important that these devices be secured from expanding threats to the confidentiality, integrity, and availability of the information they maintain and share. This book explores the current challenge of threats and controls to mobile device security with a focus on cyber threats to mobile devices; wireless device theft; and how to protect the data on your phone.

Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover): Larry A Schwartz Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover)
Larry A Schwartz
R3,959 Discovery Miles 39 590 Ships in 12 - 19 working days

In today's world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.

Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover): Patricia Diaz, William C. Long Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover)
Patricia Diaz, William C. Long
R3,104 R2,901 Discovery Miles 29 010 Save R203 (7%) Ships in 12 - 19 working days

A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data. This book provides an overview of state security breach notification laws applicable to entities that collect, maintain, own, possess, or license personal information. This book describes information security and security breach notification requirements in the Office of Management and Budget's "Breach Notification Policy," the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Gramm-Leach-Bliley Act (GLBA).

Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New): Laurel Jennings, Richard M. Eastman Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New)
Laurel Jennings, Richard M. Eastman
R3,112 R2,909 Discovery Miles 29 090 Save R203 (7%) Ships in 12 - 19 working days

It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given his prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000; in civil liability for damages, attorney's fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. This book provides an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA).

Smart Meters & the Smart Grid - Privacy & Cybersecurity Considerations (Hardcover): Irwin E. Reid, Hale A. Stevens Smart Meters & the Smart Grid - Privacy & Cybersecurity Considerations (Hardcover)
Irwin E. Reid, Hale A. Stevens
R3,957 Discovery Miles 39 570 Ships in 12 - 19 working days

Electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. This Advanced Metering Infrastructure (AMI) promises to increase energy efficiency, bolster electric power grid reliability, and facilitate demand response, among other benefits. However, to fulfil these ends, smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. This book examines the privacy and cybersecurity considerations of smart meters and the smart grid.

Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback): Richard Torrenzano,... Digital Assassination - Protecting Your Reputation, Brand, or Business Against Online Attacks (Paperback)
Richard Torrenzano, Mark Davis
R621 R569 Discovery Miles 5 690 Save R52 (8%) Ships in 10 - 15 working days

"Two leading reputation experts reveal how the internet is being used to destroy brands, reputations and even lives, and how to fight back.
"From false Wikipedia entries, to fake YouTube videos, to Facebook lynch mobs, everyone from CEOs to fashion models, journalists to politicians, restaurateurs to doctors, is open to character assassination in the burgeoning realm of digital media.
Two top media experts recount vivid tales of character attacks, provide specific advice on how to counter them, and how to turn the tables on the attackers. Having spent decades preparing for and coping with these issues, Richard Torrenzano and Mark Davis share their secrets on dealing with problems at the top of today's news.
Torrenzano and Davis also take a step back to look at how the past might inform our future thinking about character assassination, from the slander wars between Thomas Jefferson and Alexander Hamilton, to predictions on what the end of privacy will mean for civilization.

Corporate Cyberwar (Paperback): Dr Michael Teng Corporate Cyberwar (Paperback)
Dr Michael Teng
R531 Discovery Miles 5 310 Ships in 10 - 15 working days

Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Cyber Storm III (Paperback): Department of Homeland Security Cyber Storm III (Paperback)
Department of Homeland Security
R339 Discovery Miles 3 390 Ships in 10 - 15 working days
Privacy - An Overview of Federal Law Governing Wiretapping & Electronic Eavesdropping (Hardcover, New): Alderic Jimenez Privacy - An Overview of Federal Law Governing Wiretapping & Electronic Eavesdropping (Hardcover, New)
Alderic Jimenez
R2,800 R2,231 Discovery Miles 22 310 Save R569 (20%) Ships in 12 - 19 working days

It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given their prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for up to five years and fines up to $250,000 (and up to $500,000 for organisations). This book provides an overview of federal law governing wiretapping and electronic eavesdropping and the procedures they establish for law enforcement and foreign intelligence gathering purposes. It also appends citations to state law and contains a bibliography of legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). This book consists of public domain documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.

Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover): Jacqueline D. Lipton Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover)
Jacqueline D. Lipton
R1,968 Discovery Miles 19 680 Ships in 12 - 19 working days

A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.

Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback): James B.... Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback)
James B. Rule
R958 Discovery Miles 9 580 Ships in 10 - 15 working days

This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.

The Data Governance Imperative - A Business Strategy for Corporate Data (Paperback, New): Steve Sarsfield The Data Governance Imperative - A Business Strategy for Corporate Data (Paperback, New)
Steve Sarsfield
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

Attention to corporate information has never been more important than now. The ability to generate accurate business intelligence, accurate financial reports and to understand your business relies on better processes and personal commitment to clean data. Every byte of data that resides inside your company, and some that resides outside its walls, has the potential to make you stronger by giving you the agility, speed and intelligence that none of your competitors yet have. Data governance is the term given to changing the hearts and minds of your company to see the value of such information quality. The Data Governance Imperative is a business person's view of data governance. This practical book covers both strategies and tactics around managing a data governance initiative. The author, Steve Sarsfield, works for a major enterprise software company and is a leading expert in data quality and data governance, focusing on the business perspectives that are important to data champions, front-office employees, and executives. Steve runs an award-winning and world-recognized blog called the Data Governance and Data Quality Insider, offering practical wisdom.

Cybercrime - Secure It or Lose It (Paperback): Denise M Chatam Cybercrime - Secure It or Lose It (Paperback)
Denise M Chatam
R475 R446 Discovery Miles 4 460 Save R29 (6%) Ships in 10 - 15 working days

"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.

Identity Theft - A Comprehensive Guide (Paperback): Jay Mason Identity Theft - A Comprehensive Guide (Paperback)
Jay Mason
R281 R261 Discovery Miles 2 610 Save R20 (7%) Ships in 10 - 15 working days

"Identity Theft: A Comprehensive Guide," enables readers to understand, prevent and recover from the crime of identity theft. Included in the book are chapters on how to safeguard your computer, how to avoid scams, 40 ways to prevent identity theft, 20 things to do if you are a victim of identity theft, how to order your free credit report and FACTA.

Thorough information is provided on the latest identity theft insurance and what to avoid in purchasing this type of protection. The book includes a library of letters an identity theft victim will need to use and a snapshot of current state laws influencing identity theft.

Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover): Abraham L. Newman Protectors of Privacy - Regulating Personal Data in the Global Economy (Hardcover)
Abraham L. Newman
R1,269 Discovery Miles 12 690 Ships in 12 - 19 working days

From credit-card purchases to electronic fingerprints, the amount of personal data available to government and business is growing exponentially. All industrial societies face the problem of how to regulate this vast world of information, but their governments have chosen distinctly different solutions. In Protectors of Privacy, Abraham L. Newman details how and why, in contrast to the United States, the nations of the European Union adopted comprehensive data privacy for both the public and the private sectors, enforceable by independent regulatory agencies known as data privacy authorities. Despite U.S. prominence in data technology, Newman shows, the strict privacy rules of the European Union have been adopted far more broadly across the globe than the self-regulatory approach championed by the United States. This rift has led to a series of trade and security disputes between the United States and the European Union.Based on many interviews with politicians, civil servants, and representatives from business and NGOs, and supplemented with archival sources, statistical analysis, and examples, Protectors of Privacy delineates the two principal types of privacy regimes-comprehensive and limited. The book presents a theory of regulatory development that highlights the role of transgovernmental networks not only in implementing rules but also in actively shaping the political process surrounding policymaking. More broadly, Newman explains how Europe's institutional revolution has created in certain sectors the regulatory capacity that allows it to challenge U.S. dominance in international economic governance.

Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022): Dharma P. Agrawal, Nadia Nedjah,... Cyber Security, Privacy and Networking - Proceedings of ICSPN 2021 (Paperback, 1st ed. 2022)
Dharma P. Agrawal, Nadia Nedjah, Bb Gupta, Gregorio Martinez Perez
R6,396 Discovery Miles 63 960 Ships in 12 - 19 working days

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

The Governance of Privacy - Policy Instruments in Global Perspective (Paperback, New Ed): Colin J. Bennett, Charles Raab The Governance of Privacy - Policy Instruments in Global Perspective (Paperback, New Ed)
Colin J. Bennett, Charles Raab
R1,343 Discovery Miles 13 430 Ships in 10 - 15 working days

Analyzes privacy policy instruments available to contemporary industrial states, from government regulations and transnational regimes to self-regulation and privacy enhancing technologies. Privacy protection, according to Colin Bennett and Charles Raab, involves politics and public policy as much as it does law and technology. Moreover, the protection of our personal information in a globalized, borderless world means that privacy-related policies are inextricably interdependent. In this updated paperback edition of The Governance of Privacy, Bennett and Raab analyze a broad range of privacy policy instruments available to contemporary advanced industrial states, from government regulations and transnational regimes to self-regulation and privacy-enhancing technologies. They consider two possible dynamics of privacy regulation-a "race to the bottom," with competitive deregulation by countries eager to attract global investment in information technology, versus "a race to the top," with the progressive establishment of global privacy standards. Bennett and Raab begin by discussing the goals of privacy protection, the liberal and individualist assumptions behind it, and the neglected relationship between privacy and social equity. They describe and evaluate different policy instruments, including the important 1995 Directive on Data Protection from the European Union, as well as the general efficacy of the "top-down" statutory approach and self-regulatory and technological alternatives to it. They evaluate the interrelationships of these policy instruments and their position in a global framework of regulation and policy by state and non-state actors. And finally, they consider whether all of this policy activity at international, national, and corporate levels necessarily means higher levels of privacy protection.

RSA Security's Official Guide to XML Security (Paperback, Ed): Blake Dournee RSA Security's Official Guide to XML Security (Paperback, Ed)
Blake Dournee
R1,853 R1,513 Discovery Miles 15 130 Save R340 (18%) Ships in 10 - 15 working days

Use this book as both an XML primer and to get up to speed on XML-related security issues. Written by the experts at RSA Security, Inc., you’ll get inside tips on how to prevent denial of service attacks, and how to implement security measures to keep your XML programs protected.

The Digital Person - Technology and Privacy in the Information Age (Hardcover): Daniel J. Solove The Digital Person - Technology and Privacy in the Information Age (Hardcover)
Daniel J. Solove
R2,240 Discovery Miles 22 400 Ships in 12 - 19 working days

View the Table of Contents.
Read the Introduction.

aThis comprehensive analysis of privacy in the information age challenges traditional assumptions that breeches of privacy through the development of electronic dossiers involve the invasion of oneas private space.a
--"Choice"

"The Digital Person challenges the existing ways in which law and legal theory approach the social, political, and legal implications of the collection and use of personal information in computer databases. Solove's book is ambitious, and represents the most important publication in the field of information privacy law for some years."
--"Georgetown Law Journal"

"Anyone concerned with preserving privacy against technology's growing intrusiveness will find this book enlightening."
--"Publishers Weekly"

"Solove . . . truly understands the intersection of law and technology. This book is a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age."
--"The Wall Street Journal"

"Daniel Solove is one of the most energetic and creative scholars writing about privacy today. The Digital Person is an important contribution to the privacy debate, and Solove's discussion of the harms of what he calls 'digital dossiers' is invaluable."
--Jeffrey Rosen, author of "The Unwanted Gaze" and "The Naked Crowd"

"Powerful theme."
--"Privacy Journal"

"This is not only a book you should read, but you should make sure your friends read it."
--"IEEE Review"

"Solove offers a book that is both comprehensive and easy to understand, discussing the changes that technology has brought to our concept of privacy. An excellentstarting point for much needed discussion."
--"Law Technology News"

"An unusually perceptive discussion of one of the most vexing problems of the digital age--our loss of control over our personal information. It's a fascinating journey into the almost surreal ways personal information is hoarded, used, and abused in the digital age. I recommend his book highly."
--Bruce Schneier

"Solove's book is the best exposition thus far about the threat that computer databases containing personal data about millions of Americans poses for information privacy."
--Pamela Samuelson, Chancellor's Professor of Law and Information Management at the University of California, Berkeley

"Solove drives his points home through considerable reconfiguration of the basic argument. Rather than casting blame or urging retreat to a precomputer database era, the solution is seen in informing individuals, challenging data collectors, and bringing the law up-to-date."
--"Choice"

"If you want to find out what a mess the law of privacy is, how it got that way, and whether there is hope for the future, then read this book."
--"Legal Times"

"Solove evaluates the shortcomings of current approaches to privacy as well as some useful and controversial ideas for striking a new balance. Anyone who deals with privacy matters will find a lot ot consider."
--"DM News"

"Solove's treatment of this particular facet is thoughtful, thorough, concise, and occasionally laced with humor. The present volume gives us reason to look forward to his future contributions."
--"The Law and Politics Book Review"

"Solove's book is useful, particularly as an overview on how these private and governmentdatabases grew in sophistication and now interact with one another."
--"Christian Science Monitor"

"A far-reaching examination of how digital dossiers are shaping our lives. Daniel Solove has persuasively reconceptualized privacy for the digital age. A must-read."
--Paul Schwartz, Brooklyn Law School

"The Digital Person is a detailed and approachable resource on privacy issues and the laws that affect them."
--"IT Conversations"

Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases--which Daniel J. Solove calls "digital dossiers"--has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.

The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.

The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY

Privacy - Total Information Awareness Programs & Latest Developments (Paperback): Gina Marie Stevens Privacy - Total Information Awareness Programs & Latest Developments (Paperback)
Gina Marie Stevens
R1,268 R1,050 Discovery Miles 10 500 Save R218 (17%) Ships in 12 - 19 working days

This book describes the Total Information Awareness (TIA) programs in the Defense Research Projects Agency (DARPA) of the Department of Defense, and related information access, collection, and protection laws. TIA is a new technology under development that plans to use data mining technologies to sift through personal transactions in electronic data to find patterns and associations connected to terrorist threats and activities. Data mining technologies are currently used by federal agencies for various purposes. DARPA has underway a five year research project to develop and integrate information technologies into a prototype system or systems to identify foreign terrorists for use by the intelligence, counterintelligence, law enforcement, and homeland security communities. Recent increased awareness about the existence of the TIA project provoked expressions of concern about the potential for the invasion of privacy of law-abiding citizens by the Government, and about the direction of the project by John Poindexter, a central figure in the Iran-Contra affair. While the law enforcement and intelligence communities argue that more sophisticated information gathering techniques are essential to combat today's sophisticated terrorists, civil libertarians worry that the Government's increased capability to assemble information will result in increased and unchecked government power, and the erosion of individual privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cyber-Physical Systems - Digital…
Alla G. Kravets, Alexander A. Bolshakov, … Hardcover R4,897 Discovery Miles 48 970
Smart Computing Techniques and…
Suresh Chandra Satapathy, Vikrant Bhateja, … Hardcover R6,082 Discovery Miles 60 820
Artificial Intelligence Applications and…
Ilias Maglogiannis, Lazaros Iliadis, … Hardcover R1,621 Discovery Miles 16 210
New Developments of IT, IoT and ICT…
Kazumi Nakamatsu, Roumen Kountchev, … Hardcover R9,925 Discovery Miles 99 250
Intelligent Web Data Management…
Kun Ma, Ajith Abraham, … Hardcover R3,539 Discovery Miles 35 390
Happimetrics - Leveraging AI to Untangle…
Peter A. Gloor Hardcover R3,043 Discovery Miles 30 430
Proceedings of International Conference…
Nabendu Chaki, Jerzy Pejas, … Hardcover R7,509 Discovery Miles 75 090
Blockchain Technology: Applications and…
Sandeep Kumar Panda, Ajay Kumar Jena, … Hardcover R5,380 Discovery Miles 53 800
African Artificial Intelligence…
Mark Nasila Paperback R350 R296 Discovery Miles 2 960
Advanced Soft Computing Techniques in…
Sujata Dash, Subhendu Kumar Pani, … Hardcover R5,397 Discovery Miles 53 970

 

Partners