|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Media reform plays an increasingly important role in the struggle
for social justice. As battles are fought over the future of
investigative journalism, media ownership, spectrum management,
speech rights, broadband access, network neutrality, the
surveillance apparatus, and digital literacy, what effective
strategies can be used in the pursuit of effective media reform?
Prepared by thirty-three scholars and activists from more than
twenty-five countries, Strategies for Media Reform focuses on
theorizing media democratization and evaluating specific projects
for media reform. This edited collection of articles offers readers
the opportunity to reflect on the prospects for and challenges
facing campaigns for media reform and gathers significant examples
of theory, advocacy, and activism from multinational perspectives.
The whirlwind of social media, online dating, and mobile apps can
make life a dream or a nightmare. For every trustworthy website,
there are countless jerks, bullies, and scam artists who want to
harvest your personal information for their own purposes. But you
can fight back, right now. In The Smart Girl s Guide to Privacy,
award-winning author and investigative journalist Violet Blue shows
you how women are targeted online and how to keep yourself safe.
Blue s practical, user-friendly advice will teach you how to:
Delete personal content from websites Use website and browser
privacy controls effectively Recover from and prevent identity
theft Figure out where the law protects you and where it doesn t
Set up safe online profiles Remove yourself from people-finder
websites Even if your privacy has already been compromised, don t
panic. It s not too late to take control. Let The Smart Girl s
Guide to Privacy help you cut through the confusion and start
protecting your online life
The problem of privacy-preserving data analysis has a long history
spanning multiple disciplines. As electronic data about individuals
becomes increasingly detailed, and as technology enables ever more
powerful collection and curation of these data, the need increases
for a robust, meaningful, and mathematically rigorous definition of
privacy, together with a computationally rich class of algorithms
that satisfy this definition. Differential Privacy is such a
definition. The Algorithmic Foundations of Differential Privacy
starts out by motivating and discussing the meaning of differential
privacy, and proceeds to explore the fundamental techniques for
achieving differential privacy, and the application of these
techniques in creative combinations, using the query-release
problem as an ongoing example. A key point is that, by rethinking
the computational goal, one can often obtain far better results
than would be achieved by methodically replacing each step of a
non-private computation with a differentially private
implementation. Despite some powerful computational results, there
are still fundamental limitations. Virtually all the algorithms
discussed herein maintain differential privacy against adversaries
of arbitrary computational power - certain algorithms are
computationally intensive, others are efficient. Computational
complexity for the adversary and the algorithm are both discussed.
The monograph then turns from fundamentals to applications other
than query-release, discussing differentially private methods for
mechanism design and machine learning. The vast majority of the
literature on differentially private algorithms considers a single,
static, database that is subject to many analyses. Differential
privacy in other models, including distributed databases and
computations on data streams, is discussed. The Algorithmic
Foundations of Differential Privacy is meant as a thorough
introduction to the problems and techniques of differential
privacy, and is an invaluable reference for anyone with an interest
in the topic.
|
|