|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > Surveillance services
Threats of terrorism, natural disaster, identity theft, job loss,
illegal immigration, and even biblical apocalypse - all are perils
that trigger alarm in people today. Although there may be a factual
basis for many of these fears, they do not simply represent
objective conditions. Feelings of insecurity are instilled by
politicians and the media, and sustained by urban fortification,
technological surveillance, and economic vulnerability.
""Surveillance in the Time of Insecurity"" fuses advanced
theoretical accounts of state power and neoliberalism with original
research from the social settings in which insecurity dynamics play
out in the new century. Torin Monahan explores the
counterterrorism-themed show ""24"", Rapture fiction, traffic
control centers, security conferences, public housing, and gated
communities, and examines how each manifests complex relationships
of inequality, insecurity, and surveillance. Alleviating insecurity
requires that we confront its mythic dimensions, the politics
inherent in new configurations of security provision, and the
structural obstacles to achieving equality in societies.
|
The Right to Privacy
(Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
|
R538
Discovery Miles 5 380
|
Ships in 10 - 15 working days
|
|
Draws together contributions from leading figures in the field of
surveillance to engage in the discussion of the emergence of
accountability as a means to manage threats to privacy. The first
of its kind to enrich the debate about accountability and privacy
by drawing together perspectives from experienced privacy
researchers and policy makers.
A powerful and urgent call to action: to improve our lives and our
societies, we must demand open access to data for all. Information
is power, and the time is now for digital liberation. Access Rules
mounts a strong and hopeful argument for how informational tools at
present in the hands of a few could instead become empowering
machines for everyone. By forcing data-hoarding companies to open
access to their data, we can reinvigorate both our economy and our
society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend
that if we disrupt monopoly power and create a level playing field,
digital innovations can emerge to benefit us all. Over the past
twenty years, Big Tech has managed to centralize the most relevant
data on their servers, as data has become the most important raw
material for innovation. However, dominant oligopolists like
Facebook, Amazon, and Google, in contrast with their reputation as
digital pioneers, are actually slowing down innovation and progress
by withholding data for the benefit of their shareholders--at the
expense of customers, the economy, and society. As Access Rules
compellingly argues, ultimately it is up to us to force information
giants, wherever they are located, to open their treasure troves of
data to others. In order for us to limit global warming, contain a
virus like COVID-19, or successfully fight poverty,
everyone-including citizens and scientists, start-ups and
established companies, as well as the public sector and NGOs-must
have access to data. When everyone has access to the informational
riches of the data age, the nature of digital power will change.
Information technology will find its way back to its original
purpose: empowering all of us to use information so we can thrive
as individuals and as societies.
This book is about explaining surveillance processes and practices
in contemporary society. Surveillance studies is a relatively new
multi-disciplinary enterprise that aims to understand who watches
who, how the watched participate in and sometimes question their
surveillance, why surveillance occurs, and with what effects. This
book brings together some of the world's leading surveillance
scholars to discuss the "why" question. The field has been
dominated, since the groundbreaking work of Michel Foucault, by the
idea of the panopticon and this book explores why this metaphor has
been central to discussions of surveillance, what is fruitful in
the panoptic approach, and what other possible approaches can throw
better light on the phenomena in question. Since the advent of
networked computer databases, and especially since 9/11, questions
of surveillance have come increasingly to the forefront of
democratic, political, and policy debates in the global north (and
to an extent in the glo
Since the 9.11 attacks in North America and the accession of the
Schengen Accord in Europe there has been widespread concern with
international borders, the passage of people and the flow of
information across borders. States have fundamentally changed the
ways in which they police and monitor this mobile population and
its personal data. This book brings together leading authorities in
the field who have been working on the common problem of policing
and surveillance at physical and virtual borders at a time of
increased perceived threat. It is concerned with both theoretical
and empirical aspects of the ways in which the modern state
attempts to control its borders and mobile population. It will be
essential reading for students, practitioners, policy makers.
From the highly acclaimed author of WAYS OF BEING. We live in times
of increasing inscrutability. Our news feeds are filled with
unverified, unverifiable speculation, much of it automatically
generated by anonymous software. As a result, we no longer
understand what is happening around us. Underlying all of these
trends is a single idea: the belief that quantitative data can
provide a coherent model of the world, and the efficacy of
computable information to provide us with ways of acting within it.
Yet the sheer volume of information available to us today reveals
less than we hope. Rather, it heralds a new Dark Age: a world of
ever-increasing incomprehension. In his brilliant new work, leading
artist and writer James Bridle offers us a warning against the
future in which the contemporary promise of a new technologically
assisted Enlightenment may just deliver its opposite: an age of
complex uncertainty, predictive algorithms, surveillance, and the
hollowing out of empathy. Surveying the history of art, technology
and information systems he reveals the dark clouds that gather over
discussions of the digital sublime.
Understand the CCPA (California Consumer Privacy Act) and how to
implement strategies to comply with this privacy regulation.
Established in June 2018, the CCPA was created to remedy the lack
of comprehensive privacy regulation in the state of California.
When it comes into effect on January 1, 2020, the CCPA will give
California residents the right to: Learn what personal data a
business has collected about them Understand who this data has been
disclosed to Find out whether their personal data has been sold to
third parties, and who these third parties are Opt-out of such data
transactions, or request that the data be deleted. Many
organizations that do business in the state of California must
align to the provisions of the CCPA. Much like the EU's GDPR
(General Data Protection Regulation), businesses that fail to
comply with the CCPA will face economic penalties. Prepare your
business for CCPA compliance with our implementation guide that:
Provides the reader with a comprehensive understanding of the
legislation by explaining key terms Explains how a business can
implement strategies to comply with the CCPA Discusses potential
developments of the CCPA to further aid compliance Your guide to
understanding the CCPA and how you can implement a strategy to
comply with this legislation - buy this book today to get the
guidance you need! About the author Preston Bukaty is an attorney
and consultant. He specializes in data privacy GRC projects, from
data inventory audits to gap analyses, contract management, and
remediation planning. His compliance background and experience
operationalizing compliance in a variety of industries give him a
strong understanding of the legal issues presented by international
regulatory frameworks. Having conducted more than 3,000 data
mapping audits, he also understands the practical realities of
project management in operationalizing compliance initiatives.
Preston's legal experience and enthusiasm for technology make him
uniquely suited to understanding the business impact of privacy
regulations such as the GDPR and the CCPA. He has advised more than
250 organizations engaged in businesses as varied as SaaS
platforms, mobile geolocation applications, GNSS/telematics tools,
financial institutions, fleet management software,
architectural/engineering design systems, and web hosting. He also
teaches certification courses on GDPR compliance and ISO 27001
implementation, and writes on data privacy law topics. Preston
lives in Denver, Colorado. Prior to working as a data privacy
consultant, he worked for an international GPS software company,
advising business areas on compliance issues across 140 countries.
Preston holds a juris doctorate from the University of Kansas
School of Law, along with a basketball signed by Hall of Fame coach
Bill Self.
One day in the spring of 2013, a box appeared outside a
fourth-floor apartment door in Brooklyn, New York. The recipient,
who didn't know the sender, only knew she was supposed to bring
this box to a friend, who would ferry it to another friend. This
was Edward Snowden's box-printouts of documents proving that the US
government had built a massive surveillance apparatus and used it
to spy on its own people-and the friend on the end of this chain
was filmmaker Laura Poitras. Thus the biggest national security
leak of the digital era was launched via a remarkably analog
network, the US Postal Service. This is just one of the odd, ironic
details that emerges from the story of how Jessica Bruder and Dale
Maharidge, two experienced journalists but security novices (and
the friends who received and ferried the box) got drawn into the
Snowden story as behind-the-scenes players. Their initially
stumbling, increasingly paranoid, and sometimes comic efforts to
help bring Snowden's leaks to light, and ultimately, to understand
their significance, unfold in an engrossing narrative that includes
emails and diary entries from Poitras. This is an illuminating
essay on the status of transparency, privacy, and trust in the age
of surveillance.
This volume examines the relationship between privacy, surveillance
and security, and the alleged privacy-security trade-off, focusing
on the citizen's perspective. Recent revelations of mass
surveillance programmes clearly demonstrate the ever-increasing
capabilities of surveillance technologies. The lack of serious
reactions to these activities shows that the political will to
implement them appears to be an unbroken trend. The resulting move
into a surveillance society is, however, contested for many
reasons. Are the resulting infringements of privacy and other human
rights compatible with democratic societies? Is security
necessarily depending on surveillance? Are there alternative ways
to frame security? Is it possible to gain in security by giving up
civil liberties, or is it even necessary to do so, and do citizens
adopt this trade-off? This volume contributes to a better and
deeper understanding of the relation between privacy, surveillance
and security, comprising in-depth investigations and studies of the
common narrative that more security can only come at the expense of
sacrifice of privacy. The book combines theoretical research with a
wide range of empirical studies focusing on the citizen's
perspective. It presents empirical research exploring factors and
criteria relevant for the assessment of surveillance technologies.
The book also deals with the governance of surveillance
technologies. New approaches and instruments for the regulation of
security technologies and measures are presented, and
recommendations for security policies in line with ethics and
fundamental rights are discussed. This book will be of much
interest to students of surveillance studies, critical security
studies, intelligence studies, EU politics and IR in general. A PDF
version of this book is available for free in open access via
www.tandfebooks.com. It has been made available under a Creative
Commons Attribution-Non Commercial 3.0 license.
This book shows how surveillance society shapes and interacts with
journalistic practices and discourses. It illustrates not only how
surveillance debates play out in and through mediated discourses,
but also how practices of surveillance inform the stories, everyday
work and the ethics of journalists. The increasing entrenchment of
data collection and surveillance in all kinds of social processes
raises important questions around new threats to journalistic
freedom and political dissent; the responsibilities of media
organizations and state actors; the nature of journalists'
relationship to the state; journalists' ability to protect their
sources and data; and the ways in which media coverage shape public
perceptions of surveillance, to mention just a few areas of
concern. Against this backdrop, the contributions gathered in this
book examine areas including media coverage of surveillance,
encryption and privacy; journalists' views on surveillance and
security; public debate around the power of intelligence agencies,
and the strategies of privacy rights activists. The book raises
fundamental questions around the role of journalism in creating the
conditions for digital citizenship. The chapters in this book were
originally published in a special issue of the journal, Digital
Journalism.
Today, public space has become a fruitful venue for surveillance of
many kinds. Emerging surveillance technologies used by governments,
corporations, and even individual members of the public are
reshaping the very nature of physical public space. Especially in
urban environments, the ability of individuals to remain private or
anonymous is being challenged. Surveillance, Privacy, and Public
Space problematizes our traditional understanding of 'public
space'. The chapter authors explore intertwined concepts to develop
current privacy theory and frame future scholarly debate on the
regulation of surveillance in public spaces. This book also
explores alternative understandings of the impacts that modern
living and technological progress have on the experience of being
in public, as well as the very nature of what public space really
is. Representing a range of disciplines and methods, this book
provides a broad overview of the changing nature of public space
and the complex interactions between emerging forms of surveillance
and personal privacy in these public spaces. It will appeal to
scholars and students in a variety of academic disciplines,
including sociology, surveillance studies, urban studies,
philosophy, law, communication and media studies, political
science, and criminology.
|
1984
(Paperback)
George Orwell
|
R217
R179
Discovery Miles 1 790
Save R38 (18%)
|
Ships in 9 - 15 working days
|
|
This Scholastic Classics edition of George Orwell's classic
dystopian novel is perfect for students and Orwell enthusiasts
alike. Who controls the past controls the future. Who controls the
present controls the past. Winston Smith has always been a dutiful
citizen of Oceania, rewriting history to meet the demands of the
Ministry of Truth. But with each lie that he writes, Winston starts
to resent the totalitarian party that seeks power for its own sake
and punishes those that desire individuality. When Winston begins a
secret relationship with his colleague Julia, he soon realises it's
virtually impossible to escape the watchful eye of Big Brother...
Totalitarianism, identity and independence, repression, power,
language, rebellion, technology and modernisation are some of the
themes that run throughout this novel.
|
|