|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > Surveillance services
News headlines about privacy invasions, discrimination, and biases
discovered in the platforms of big technology companies are
commonplace today, and big tech's reluctance to disclose how they
operate counteracts ideals of transparency, openness, and
accountability. This book is for computer science students and
researchers who want to study big tech's corporate surveillance
from an experimental, empirical, or quantitative point of view and
thereby contribute to holding big tech accountable. As a
comprehensive technical resource, it guides readers through the
corporate surveillance landscape and describes in detail how
corporate surveillance works, how it can be studied experimentally,
and what existing studies have found. It provides a thorough
foundation in the necessary research methods and tools, and
introduces the current research landscape along with a wide range
of open issues and challenges. The book also explains how to
consider ethical issues and how to turn research results into
real-world change.
Threats of terrorism, natural disaster, identity theft, job loss,
illegal immigration, and even biblical apocalypse - all are perils
that trigger alarm in people today. Although there may be a factual
basis for many of these fears, they do not simply represent
objective conditions. Feelings of insecurity are instilled by
politicians and the media, and sustained by urban fortification,
technological surveillance, and economic vulnerability.
""Surveillance in the Time of Insecurity"" fuses advanced
theoretical accounts of state power and neoliberalism with original
research from the social settings in which insecurity dynamics play
out in the new century. Torin Monahan explores the
counterterrorism-themed show ""24"", Rapture fiction, traffic
control centers, security conferences, public housing, and gated
communities, and examines how each manifests complex relationships
of inequality, insecurity, and surveillance. Alleviating insecurity
requires that we confront its mythic dimensions, the politics
inherent in new configurations of security provision, and the
structural obstacles to achieving equality in societies.
 |
The Right to Privacy
(Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
|
R540
Discovery Miles 5 400
|
Ships in 18 - 22 working days
|
|
|
What limits, if any, should be placed on a government's efforts to
spy on its citizens in the name of national security? Spying on
foreigners has long been regarded as an unseemly but necessary
enterprise. Spying on one's own citizens in a democracy, by
contrast, has historically been subject to various forms of legal
and political restraint. For most of the twentieth century these
regimes were kept distinct. That position is no longer tenable.
Modern threats do not respect national borders. Changes in
technology make it impractical to distinguish between 'foreign' and
'local' communications. And our culture is progressively reducing
the sphere of activity that citizens can reasonably expect to be
kept from government eyes. The main casualty of this transformed
environment will be privacy. Recent battles over privacy have been
dominated by fights over warrantless electronic surveillance and
CCTV; the coming years will see debates over DNA databases, data
mining, and biometric identification. There will be protests and
lawsuits, editorials and elections resisting these attacks on
privacy. Those battles are worthy. But the war will be lost. Modern
threats increasingly require that governments collect such
information, governments are increasingly able to collect it, and
citizens increasingly accept that they will collect it. This book
proposes a move away from questions of whether governments should
collect information and onto more problematic and relevant
questions concerning its use. By reframing the relationship between
privacy and security in the language of a social contract, mediated
by a citizenry who are active participants rather than passive
targets, the book offers a framework to defend freedom without
sacrificing liberty.
Draws together contributions from leading figures in the field of
surveillance to engage in the discussion of the emergence of
accountability as a means to manage threats to privacy. The first
of its kind to enrich the debate about accountability and privacy
by drawing together perspectives from experienced privacy
researchers and policy makers.
The United Kingdom has more than 4.2 million public closed-circuit
television (CCTV) cameras-one for every fourteen citizens. Across
the United States, hundreds of video surveillance systems are being
installed in town centers, public transportation facilities, and
schools at a cost exceeding $100 million annually. And now other
Western countries have begun to experiment with CCTV to prevent
crime in public places. In light of this expansion and the
associated public expenditure, as well as pressing concerns about
privacy rights, there is an acute need for an evidence-based
approach to inform policy and practice.
Drawing on the highest-quality research, criminologists Brandon C.
Welsh and David P. Farrington assess the effectiveness and social
costs of not only CCTV, but also of other important surveillance
methods to prevent crime in public space, such as improved street
lighting, security guards, place managers, and defensible space.
Importantly, the book goes beyond the question of "Does it work?"
and examines the specific conditions and contexts under which these
surveillance methods may have an effect on crime as well as the
mechanisms that bring about a reduction in crime.
At a time when cities need cost-effective methods to fight crime
and the public gradually awakens to the burdens of sacrificing
their privacy and civil rights for security, Welsh and Farrington
provide this timely and reliable guide to the most effective and
non-invasive uses of surveillance to make public places safer from
crime.
This book is about explaining surveillance processes and practices
in contemporary society. Surveillance studies is a relatively new
multi-disciplinary enterprise that aims to understand who watches
who, how the watched participate in and sometimes question their
surveillance, why surveillance occurs, and with what effects. This
book brings together some of the world's leading surveillance
scholars to discuss the "why" question. The field has been
dominated, since the groundbreaking work of Michel Foucault, by the
idea of the panopticon and this book explores why this metaphor has
been central to discussions of surveillance, what is fruitful in
the panoptic approach, and what other possible approaches can throw
better light on the phenomena in question. Since the advent of
networked computer databases, and especially since 9/11, questions
of surveillance have come increasingly to the forefront of
democratic, political, and policy debates in the global north (and
to an extent in the glo
Since the 9.11 attacks in North America and the accession of the
Schengen Accord in Europe there has been widespread concern with
international borders, the passage of people and the flow of
information across borders. States have fundamentally changed the
ways in which they police and monitor this mobile population and
its personal data. This book brings together leading authorities in
the field who have been working on the common problem of policing
and surveillance at physical and virtual borders at a time of
increased perceived threat. It is concerned with both theoretical
and empirical aspects of the ways in which the modern state
attempts to control its borders and mobile population. It will be
essential reading for students, practitioners, policy makers.
Understand the CCPA (California Consumer Privacy Act) and how to
implement strategies to comply with this privacy regulation.
Established in June 2018, the CCPA was created to remedy the lack
of comprehensive privacy regulation in the state of California.
When it comes into effect on January 1, 2020, the CCPA will give
California residents the right to: Learn what personal data a
business has collected about them Understand who this data has been
disclosed to Find out whether their personal data has been sold to
third parties, and who these third parties are Opt-out of such data
transactions, or request that the data be deleted. Many
organizations that do business in the state of California must
align to the provisions of the CCPA. Much like the EU's GDPR
(General Data Protection Regulation), businesses that fail to
comply with the CCPA will face economic penalties. Prepare your
business for CCPA compliance with our implementation guide that:
Provides the reader with a comprehensive understanding of the
legislation by explaining key terms Explains how a business can
implement strategies to comply with the CCPA Discusses potential
developments of the CCPA to further aid compliance Your guide to
understanding the CCPA and how you can implement a strategy to
comply with this legislation - buy this book today to get the
guidance you need! About the author Preston Bukaty is an attorney
and consultant. He specializes in data privacy GRC projects, from
data inventory audits to gap analyses, contract management, and
remediation planning. His compliance background and experience
operationalizing compliance in a variety of industries give him a
strong understanding of the legal issues presented by international
regulatory frameworks. Having conducted more than 3,000 data
mapping audits, he also understands the practical realities of
project management in operationalizing compliance initiatives.
Preston's legal experience and enthusiasm for technology make him
uniquely suited to understanding the business impact of privacy
regulations such as the GDPR and the CCPA. He has advised more than
250 organizations engaged in businesses as varied as SaaS
platforms, mobile geolocation applications, GNSS/telematics tools,
financial institutions, fleet management software,
architectural/engineering design systems, and web hosting. He also
teaches certification courses on GDPR compliance and ISO 27001
implementation, and writes on data privacy law topics. Preston
lives in Denver, Colorado. Prior to working as a data privacy
consultant, he worked for an international GPS software company,
advising business areas on compliance issues across 140 countries.
Preston holds a juris doctorate from the University of Kansas
School of Law, along with a basketball signed by Hall of Fame coach
Bill Self.
Featuring chapters authored by leading scholars in the fields of
criminology, critical race studies, history, and more, The
Cambridge Handbook of Race and Surveillance cuts across history and
geography to provide a detailed examination of how race and
surveillance intersect throughout space and time. The volume
reviews surveillance technology from the days of colonial conquest
to the digital era, focusing on countries such as the United
States, Canada, the UK, South Africa, the Philippines, India,
Brazil, and Palestine. Weaving together narratives on how
technology and surveillance have developed over time to reinforce
racial discrimination, the book delves into the often-overlooked
origins of racial surveillance, from skin branding, cranial
measurements, and fingerprinting to contemporary manifestations in
big data, commercial surveillance, and predictive policing. Lucid,
accessible, and expertly researched, this handbook provides a
crucial investigation of issues spanning history and at the
forefront of contemporary life.
 |
1984
(Paperback)
George Orwell
|
R208
R191
Discovery Miles 1 910
Save R17 (8%)
|
Ships in 9 - 17 working days
|
|
|
This Scholastic Classics edition of George Orwell's classic
dystopian novel is perfect for students and Orwell enthusiasts
alike. Who controls the past controls the future. Who controls the
present controls the past. Winston Smith has always been a dutiful
citizen of Oceania, rewriting history to meet the demands of the
Ministry of Truth. But with each lie that he writes, Winston starts
to resent the totalitarian party that seeks power for its own sake
and punishes those that desire individuality. When Winston begins a
secret relationship with his colleague Julia, he soon realises it's
virtually impossible to escape the watchful eye of Big Brother...
Totalitarianism, identity and independence, repression, power,
language, rebellion, technology and modernisation are some of the
themes that run throughout this novel.
Following the much publicised Mark Kennedy case, the question of
the necessity and proportionality of covert police operations has
been widely debated. At the same time, the use of covert tactics is
becoming more widespread and is a feature of routine as well as
more serious cases. It is a fast changing area of law which is
notoriously opaque and esoteric. This new edition of Covert
Policing: Law and Practice provides clear, up to date guidance on
this complex topic and is an essential resource for practitioners
working on cases involving covert operations. This book provides a
comprehensive review of the law governing covert policing
activities. It sets out the framework within which covert policing
operations should be planned and managed to enable practitioners
working for either the defence or prosecution to critically
consider the legality and propriety of evidence obtained in cases
where covert policing resources have been deployed, including
applications for Public Interest Immunity. The text places
considerable emphasis on the need for a proper methodology of
approach to the Regulation of Investigatory Powers Act 2000 and
other legislation affecting this area. It examines the statutory
and procedural requirements relating to covert policing
deployments, from the interception of communications and directed
and intrusive surveillance resources, through to the use and
conduct of covert human intelligence sources. It examines the
oversight mechanisms that exist to protect those subjected to
invasions of privacy without the proper criminal or civil processes
and covers recent developments arising from the Protection of
Freedoms Act, Data Retention and Investigatory Powers Act, secret
hearings, the Mark Kennedy case and revelations concerning mass
interception. Written in a way that seeks to highlight the effect
of the legislation and the principles emanating out of the case
law, this book is an essential resource for practitioners engaged
in cases where covert policing issues are likely to arise. It will
also be of assistance to those working for the police and other
public authorities authorised under the Regulation of Investigatory
Powers Act 2000 to carry out surveillance and other covert
activities.
This volume examines the relationship between privacy, surveillance
and security, and the alleged privacy-security trade-off, focusing
on the citizen's perspective. Recent revelations of mass
surveillance programmes clearly demonstrate the ever-increasing
capabilities of surveillance technologies. The lack of serious
reactions to these activities shows that the political will to
implement them appears to be an unbroken trend. The resulting move
into a surveillance society is, however, contested for many
reasons. Are the resulting infringements of privacy and other human
rights compatible with democratic societies? Is security
necessarily depending on surveillance? Are there alternative ways
to frame security? Is it possible to gain in security by giving up
civil liberties, or is it even necessary to do so, and do citizens
adopt this trade-off? This volume contributes to a better and
deeper understanding of the relation between privacy, surveillance
and security, comprising in-depth investigations and studies of the
common narrative that more security can only come at the expense of
sacrifice of privacy. The book combines theoretical research with a
wide range of empirical studies focusing on the citizen's
perspective. It presents empirical research exploring factors and
criteria relevant for the assessment of surveillance technologies.
The book also deals with the governance of surveillance
technologies. New approaches and instruments for the regulation of
security technologies and measures are presented, and
recommendations for security policies in line with ethics and
fundamental rights are discussed. This book will be of much
interest to students of surveillance studies, critical security
studies, intelligence studies, EU politics and IR in general. A PDF
version of this book is available for free in open access via
www.tandfebooks.com. It has been made available under a Creative
Commons Attribution-Non Commercial 3.0 license.
Today, public space has become a fruitful venue for surveillance of
many kinds. Emerging surveillance technologies used by governments,
corporations, and even individual members of the public are
reshaping the very nature of physical public space. Especially in
urban environments, the ability of individuals to remain private or
anonymous is being challenged. Surveillance, Privacy, and Public
Space problematizes our traditional understanding of 'public
space'. The chapter authors explore intertwined concepts to develop
current privacy theory and frame future scholarly debate on the
regulation of surveillance in public spaces. This book also
explores alternative understandings of the impacts that modern
living and technological progress have on the experience of being
in public, as well as the very nature of what public space really
is. Representing a range of disciplines and methods, this book
provides a broad overview of the changing nature of public space
and the complex interactions between emerging forms of surveillance
and personal privacy in these public spaces. It will appeal to
scholars and students in a variety of academic disciplines,
including sociology, surveillance studies, urban studies,
philosophy, law, communication and media studies, political
science, and criminology.
|
You may like...
Ward D
Freida McFadden
Paperback
R449
Discovery Miles 4 490
|