|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > Surveillance services
|
1984
(Paperback)
George Orwell
|
R171
Discovery Miles 1 710
|
Ships in 12 - 17 working days
|
|
This Scholastic Classics edition of George Orwell's classic
dystopian novel is perfect for students and Orwell enthusiasts
alike. Who controls the past controls the future. Who controls the
present controls the past. Winston Smith has always been a dutiful
citizen of Oceania, rewriting history to meet the demands of the
Ministry of Truth. But with each lie that he writes, Winston starts
to resent the totalitarian party that seeks power for its own sake
and punishes those that desire individuality. When Winston begins a
secret relationship with his colleague Julia, he soon realises it's
virtually impossible to escape the watchful eye of Big Brother...
Totalitarianism, identity and independence, repression, power,
language, rebellion, technology and modernisation are some of the
themes that run throughout this novel.
A powerful and urgent call to action: to improve our lives and our
societies, we must demand open access to data for all. Information
is power, and the time is now for digital liberation. Access Rules
mounts a strong and hopeful argument for how informational tools at
present in the hands of a few could instead become empowering
machines for everyone. By forcing data-hoarding companies to open
access to their data, we can reinvigorate both our economy and our
society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend
that if we disrupt monopoly power and create a level playing field,
digital innovations can emerge to benefit us all. Over the past
twenty years, Big Tech has managed to centralize the most relevant
data on their servers, as data has become the most important raw
material for innovation. However, dominant oligopolists like
Facebook, Amazon, and Google, in contrast with their reputation as
digital pioneers, are actually slowing down innovation and progress
by withholding data for the benefit of their shareholders--at the
expense of customers, the economy, and society. As Access Rules
compellingly argues, ultimately it is up to us to force information
giants, wherever they are located, to open their treasure troves of
data to others. In order for us to limit global warming, contain a
virus like COVID-19, or successfully fight poverty,
everyone-including citizens and scientists, start-ups and
established companies, as well as the public sector and NGOs-must
have access to data. When everyone has access to the informational
riches of the data age, the nature of digital power will change.
Information technology will find its way back to its original
purpose: empowering all of us to use information so we can thrive
as individuals and as societies.
This book is about explaining surveillance processes and practices
in contemporary society. Surveillance studies is a relatively new
multi-disciplinary enterprise that aims to understand who watches
who, how the watched participate in and sometimes question their
surveillance, why surveillance occurs, and with what effects. This
book brings together some of the world's leading surveillance
scholars to discuss the "why" question. The field has been
dominated, since the groundbreaking work of Michel Foucault, by the
idea of the panopticon and this book explores why this metaphor has
been central to discussions of surveillance, what is fruitful in
the panoptic approach, and what other possible approaches can throw
better light on the phenomena in question. Since the advent of
networked computer databases, and especially since 9/11, questions
of surveillance have come increasingly to the forefront of
democratic, political, and policy debates in the global north (and
to an extent in the glo
Since the 9.11 attacks in North America and the accession of the
Schengen Accord in Europe there has been widespread concern with
international borders, the passage of people and the flow of
information across borders. States have fundamentally changed the
ways in which they police and monitor this mobile population and
its personal data. This book brings together leading authorities in
the field who have been working on the common problem of policing
and surveillance at physical and virtual borders at a time of
increased perceived threat. It is concerned with both theoretical
and empirical aspects of the ways in which the modern state
attempts to control its borders and mobile population. It will be
essential reading for students, practitioners, policy makers.
This book is about explaining surveillance processes and practices
in contemporary society. Surveillance studies is a relatively new
multi-disciplinary enterprise that aims to understand who watches
who, how the watched participate in and sometimes question their
surveillance, why surveillance occurs, and with what effects. This
book brings together some of the world's leading surveillance
scholars to discuss the why question. The field has been dominated,
since the groundbreaking work of Michel Foucault, by the idea of
the panopticon and this book explores why this metaphor has been
central to discussions of surveillance, what is fruitful in the
panoptic approach, and what other possible approaches can throw
better light on the phenomena in question. Since the advent of
networked computer databases, and especially since 9/11, questions
of surveillance have come increasingly to the forefront of
democratic, political and policy debates in the global north (and
to an extent in the global south). Civil liberties, democratic
participation and privacy are some of the issues that are raised by
these developments. adequate understanding of how, how well and
whether or not surveillance works. This book explores the
theoretical questions in a way that is grounded in and attuned to
empirical realities.
Since the 9.11 attacks in North America and the accession of the
Schengen Accord in Europe there has been widespread concern with
international borders, the passage of people and the flow of
information across borders. States have fundamentally changed the
ways in which they police and monitor this mobile population and
its personal data. This book brings together leading authorities in
the field who have been working on the common problem of policing
and surveillance at physical and virtual borders at a time of
increased perceived threat. It is concerned with both theoretical
and empirical aspects of the ways in which the modern state
attempts to control its borders and mobile population. It will be
essential reading for students, practitioners, policy makers.
Understand the CCPA (California Consumer Privacy Act) and how to
implement strategies to comply with this privacy regulation.
Established in June 2018, the CCPA was created to remedy the lack
of comprehensive privacy regulation in the state of California.
When it comes into effect on January 1, 2020, the CCPA will give
California residents the right to: Learn what personal data a
business has collected about them Understand who this data has been
disclosed to Find out whether their personal data has been sold to
third parties, and who these third parties are Opt-out of such data
transactions, or request that the data be deleted. Many
organizations that do business in the state of California must
align to the provisions of the CCPA. Much like the EU's GDPR
(General Data Protection Regulation), businesses that fail to
comply with the CCPA will face economic penalties. Prepare your
business for CCPA compliance with our implementation guide that:
Provides the reader with a comprehensive understanding of the
legislation by explaining key terms Explains how a business can
implement strategies to comply with the CCPA Discusses potential
developments of the CCPA to further aid compliance Your guide to
understanding the CCPA and how you can implement a strategy to
comply with this legislation - buy this book today to get the
guidance you need! About the author Preston Bukaty is an attorney
and consultant. He specializes in data privacy GRC projects, from
data inventory audits to gap analyses, contract management, and
remediation planning. His compliance background and experience
operationalizing compliance in a variety of industries give him a
strong understanding of the legal issues presented by international
regulatory frameworks. Having conducted more than 3,000 data
mapping audits, he also understands the practical realities of
project management in operationalizing compliance initiatives.
Preston's legal experience and enthusiasm for technology make him
uniquely suited to understanding the business impact of privacy
regulations such as the GDPR and the CCPA. He has advised more than
250 organizations engaged in businesses as varied as SaaS
platforms, mobile geolocation applications, GNSS/telematics tools,
financial institutions, fleet management software,
architectural/engineering design systems, and web hosting. He also
teaches certification courses on GDPR compliance and ISO 27001
implementation, and writes on data privacy law topics. Preston
lives in Denver, Colorado. Prior to working as a data privacy
consultant, he worked for an international GPS software company,
advising business areas on compliance issues across 140 countries.
Preston holds a juris doctorate from the University of Kansas
School of Law, along with a basketball signed by Hall of Fame coach
Bill Self.
Today, public space has become a fruitful venue for surveillance of
many kinds. Emerging surveillance technologies used by governments,
corporations, and even individual members of the public are
reshaping the very nature of physical public space. Especially in
urban environments, the ability of individuals to remain private or
anonymous is being challenged. Surveillance, Privacy, and Public
Space problematizes our traditional understanding of 'public
space'. The chapter authors explore intertwined concepts to develop
current privacy theory and frame future scholarly debate on the
regulation of surveillance in public spaces. This book also
explores alternative understandings of the impacts that modern
living and technological progress have on the experience of being
in public, as well as the very nature of what public space really
is. Representing a range of disciplines and methods, this book
provides a broad overview of the changing nature of public space
and the complex interactions between emerging forms of surveillance
and personal privacy in these public spaces. It will appeal to
scholars and students in a variety of academic disciplines,
including sociology, surveillance studies, urban studies,
philosophy, law, communication and media studies, political
science, and criminology.
'Unique and engaging characters woven into the fabric of a
fantastic plot. Jason Dean is one to watch' Marc Cameron, New York
Times bestselling author of Tom Clancy Code of Honor What is a
death sentence to a dead man?He was a man with many names. Moving
from country to country, changing his face constantly so as to
remain in the shadows, he was nothing more than a ghost. For now,
he is known simply as Korso. A covert salvage operative, he
recovers lost artefacts and items, often stolen, for rich
benefactors unable to operate through normal channels. But his
shadowy existence is shattered upon the arrival at his Bermuda home
of the man he had hoped never to see again... Tasked with
recovering a missing, one-of-a-kind shipment in only four days, his
elite skill set will be tested to its limits. Failure will result
in his identity being revealed to his former boss, the ruthless
Nikolic, who would stop at nothing to eliminate the one man who
walked away from his organisation. An exceptional, white-knuckle
thriller full of intrigue and suspense, perfect for fans of Rob
Sinclair, Mark Dawson and Adam Hamdy. Praise for Tracer 'Tracer,
Korso's first outing, is everything you could want in a thriller;
fast-pace, suspense, mystery, just the right amount of wickedness,
but above all else a protagonist who the reader will want to read
more and more of. A real page turner' Rob Sinclair, million copy
bestselling author of The Red Cobra 'Meet Korso, a mysterious and
unique character you won't be able to get enough of. In a thriller
novel I want tension, pace and ample action, and in Tracer, Jason
Dean has delivered by the bucketful' Matt Hilton, author of the Joe
Hunter thrillers 'A relentless round of fast and furious set
pieces, out-pacing Reacher for tension and with non-stop violence
and intrigue to satisfy any thriller fans' Adrian Magson, author of
The Watchman 'A thrilling, race-against-time ride ... a great start
to what I'm sure will be a hugely successful thriller series' A. A.
Chaudhuri, author of The Scribe 'The most explosive book I've read
in ages' D. L. Marshall, author of Anthrax Island 'A superb,
fast-paced thriller which literally ticks like a time-bomb' Nick
Oldham, author of the Henry Christie series
One day in the spring of 2013, a box appeared outside a
fourth-floor apartment door in Brooklyn, New York. The recipient,
who didn't know the sender, only knew she was supposed to bring
this box to a friend, who would ferry it to another friend. This
was Edward Snowden's box-printouts of documents proving that the US
government had built a massive surveillance apparatus and used it
to spy on its own people-and the friend on the end of this chain
was filmmaker Laura Poitras. Thus the biggest national security
leak of the digital era was launched via a remarkably analog
network, the US Postal Service. This is just one of the odd, ironic
details that emerges from the story of how Jessica Bruder and Dale
Maharidge, two experienced journalists but security novices (and
the friends who received and ferried the box) got drawn into the
Snowden story as behind-the-scenes players. Their initially
stumbling, increasingly paranoid, and sometimes comic efforts to
help bring Snowden's leaks to light, and ultimately, to understand
their significance, unfold in an engrossing narrative that includes
emails and diary entries from Poitras. This is an illuminating
essay on the status of transparency, privacy, and trust in the age
of surveillance.
This volume examines the relationship between privacy, surveillance
and security, and the alleged privacy-security trade-off, focusing
on the citizen's perspective. Recent revelations of mass
surveillance programmes clearly demonstrate the ever-increasing
capabilities of surveillance technologies. The lack of serious
reactions to these activities shows that the political will to
implement them appears to be an unbroken trend. The resulting move
into a surveillance society is, however, contested for many
reasons. Are the resulting infringements of privacy and other human
rights compatible with democratic societies? Is security
necessarily depending on surveillance? Are there alternative ways
to frame security? Is it possible to gain in security by giving up
civil liberties, or is it even necessary to do so, and do citizens
adopt this trade-off? This volume contributes to a better and
deeper understanding of the relation between privacy, surveillance
and security, comprising in-depth investigations and studies of the
common narrative that more security can only come at the expense of
sacrifice of privacy. The book combines theoretical research with a
wide range of empirical studies focusing on the citizen's
perspective. It presents empirical research exploring factors and
criteria relevant for the assessment of surveillance technologies.
The book also deals with the governance of surveillance
technologies. New approaches and instruments for the regulation of
security technologies and measures are presented, and
recommendations for security policies in line with ethics and
fundamental rights are discussed. This book will be of much
interest to students of surveillance studies, critical security
studies, intelligence studies, EU politics and IR in general. A PDF
version of this book is available for free in open access via
www.tandfebooks.com. It has been made available under a Creative
Commons Attribution-Non Commercial 3.0 license.
This book shows how surveillance society shapes and interacts with
journalistic practices and discourses. It illustrates not only how
surveillance debates play out in and through mediated discourses,
but also how practices of surveillance inform the stories, everyday
work and the ethics of journalists. The increasing entrenchment of
data collection and surveillance in all kinds of social processes
raises important questions around new threats to journalistic
freedom and political dissent; the responsibilities of media
organizations and state actors; the nature of journalists'
relationship to the state; journalists' ability to protect their
sources and data; and the ways in which media coverage shape public
perceptions of surveillance, to mention just a few areas of
concern. Against this backdrop, the contributions gathered in this
book examine areas including media coverage of surveillance,
encryption and privacy; journalists' views on surveillance and
security; public debate around the power of intelligence agencies,
and the strategies of privacy rights activists. The book raises
fundamental questions around the role of journalism in creating the
conditions for digital citizenship. The chapters in this book were
originally published in a special issue of the journal, Digital
Journalism.
A compelling firsthand investigation of how social media and big
data have amplified the close relationship between privacy and
inequality  Online privacy is under constant attack by
social media and big data technologies. But we cannot rely on
individual actions to remedy this—it is a matter of social
justice. Alice E. Marwick offers a new way of understanding how
privacy is jeopardized, particularly for marginalized and
disadvantaged communities—including immigrants, the poor, people
of color, LGBTQ+ populations, and victims of online harassment.
 Marwick shows that few resources or regulations for
preventing personal information from spreading on the internet.
Through a new theory of “networked privacy,†she reveals how
current legal and technological frameworks are woefully inadequate
in addressing issues of privacy—often by design. Drawing from
interviews and focus groups encompassing a diverse group of
Americans, Marwick shows that even heavy social media users care
deeply about privacy and engage in extensive “privacy work†to
protect it. But people are up against the violation machine of the
modern internet. Safeguarding privacy must happen at the collective
level.
Casino and Gaming Resort Investigations addresses the continued and
growing need for gaming security professionals to properly and
successfully investigate the increasing and unique types of crime
they will face in their careers. As the gaming industry has grown,
so has the need for competent and highly skilled investigators who
must be prepared to manage a case of employee theft one day to a
sophisticated sports book scam the next. This book provides the
reader with the fundamental knowledge needed to understand how each
gaming and non-gaming department functions and interacts within the
overall gaming resort, allowing the investigator to determine and
focus on the important elements of any investigation in any area.
Each chapter delivers a background of a department or type of crime
normally seen in the gaming environment, and then discusses what
should be considered important or even critical for the
investigator to know or determine in the course of the
investigation. Likely scenarios, case histories, and tips, as well
as cautions for investigators to be aware of, are used throughout
the book. This book was written for and directed at gaming security
and surveillance professionals, including gaming regulators, and
tribal gaming authorities, who are almost daily confronted by the
ingenious and the most common scams, theft, and frauds that are
perpetrated in the gaming world.
Today, public space has become a fruitful venue for surveillance of
many kinds. Emerging surveillance technologies used by governments,
corporations, and even individual members of the public are
reshaping the very nature of physical public space. Especially in
urban environments, the ability of individuals to remain private or
anonymous is being challenged. Surveillance, Privacy, and Public
Space problematizes our traditional understanding of 'public
space'. The chapter authors explore intertwined concepts to develop
current privacy theory and frame future scholarly debate on the
regulation of surveillance in public spaces. This book also
explores alternative understandings of the impacts that modern
living and technological progress have on the experience of being
in public, as well as the very nature of what public space really
is. Representing a range of disciplines and methods, this book
provides a broad overview of the changing nature of public space
and the complex interactions between emerging forms of surveillance
and personal privacy in these public spaces. It will appeal to
scholars and students in a variety of academic disciplines,
including sociology, surveillance studies, urban studies,
philosophy, law, communication and media studies, political
science, and criminology.
What our health data tell American capitalism about our value-and
how that controls our lives. Afterlives of Data follows the curious
and multiple lives that our data live once they escape our control.
Mary F. E. Ebeling's ethnographic investigation shows how
information about our health and the debt that we carry becomes
biopolitical assets owned by healthcare providers, insurers,
commercial data brokers, credit reporting companies, and platforms.
By delving into the oceans of data built from everyday medical and
debt traumas, Ebeling reveals how data about our lives come to
affect our bodies and our life chances and to wholly define us.
Investigations into secretive data collection and breaches of
privacy by the likes of Cambridge Analytica have piqued concerns
among many Americans about exactly what is being done with their
data. From credit bureaus and consumer data brokers like Equifax
and Experian to the secretive military contractor Palantir, this
massive industry has little regulatory oversight for health data
and works to actively obscure how it profits from our data. In this
book, Ebeling traces the health data-medical information extracted
from patients' bodies-that are digitized and repackaged into new
data commodities that have afterlives in database lakes and oceans,
algorithms, and statistical models used to score patients on their
creditworthiness and riskiness. Critical and disturbing, Afterlives
of Data examines how Americans' data about their health and their
debt are used in the service of marketing and capitalist
surveillance.
News headlines about privacy invasions, discrimination, and biases
discovered in the platforms of big technology companies are
commonplace today, and big tech's reluctance to disclose how they
operate counteracts ideals of transparency, openness, and
accountability. This book is for computer science students and
researchers who want to study big tech's corporate surveillance
from an experimental, empirical, or quantitative point of view and
thereby contribute to holding big tech accountable. As a
comprehensive technical resource, it guides readers through the
corporate surveillance landscape and describes in detail how
corporate surveillance works, how it can be studied experimentally,
and what existing studies have found. It provides a thorough
foundation in the necessary research methods and tools, and
introduces the current research landscape along with a wide range
of open issues and challenges. The book also explains how to
consider ethical issues and how to turn research results into
real-world change.
The challenges to humanity posed by the digital future, the first
detailed examination of the unprecedented form of power called
"surveillance capitalism," and the quest by powerful corporations
to predict and control our behavior. In this masterwork of original
thinking and research, Shoshana Zuboff provides startling insights
into the phenomenon that she has named surveillance capitalism. The
stakes could not be higher: a global architecture of behavior
modification threatens human nature in the twenty-first century
just as industrial capitalism disfigured the natural world in the
twentieth. Zuboff vividly brings to life the consequences as
surveillance capitalism advances from Silicon Valley into every
economic sector. Vast wealth and power are accumulated in ominous
new "behavioral futures markets," where predictions about our
behavior are bought and sold, and the production of goods and
services is subordinated to a new "means of behavioral
modification." The threat has shifted from a totalitarian Big
Brother state to a ubiquitous digital architecture: a "Big Other"
operating in the interests of surveillance capital. Here is the
crucible of an unprecedented form of power marked by extreme
concentrations of knowledge and free from democratic oversight.
Zuboff's comprehensive and moving analysis lays bare the threats to
twenty-first century society: a controlled "hive" of total
connection that seduces with promises of total certainty for
maximum profit -- at the expense of democracy, freedom, and our
human future. With little resistance from law or society,
surveillance capitalism is on the verge of dominating the social
order and shaping the digital future -- if we let it.
One day in the spring of 2013, a box appeared outside a
fourth-floor apartment door in Brooklyn, New York. The recipient,
who didn't know the sender, only knew she was supposed to bring
this box to a friend, who would ferry it to another friend. This
was Edward Snowden's box-printouts of documents proving that the US
government had built a massive surveillance apparatus and used it
to spy on its own people-and the friend on the end of this chain
was filmmaker Laura Poitras. Thus the biggest national security
leak of the digital era was launched via a remarkably analog
network, the US Postal Service. This is just one of the odd, ironic
details that emerges from the story of how Jessica Bruder and Dale
Maharidge, two experienced journalists but security novices (and
the friends who received and ferried the box) got drawn into the
Snowden story as behind-the-scenes players. Their initially
stumbling, increasingly paranoid, and sometimes comic efforts to
help bring Snowden's leaks to light, and ultimately, to understand
their significance, unfold in an engrossing narrative that includes
emails and diary entries from Poitras. This is an illuminating
essay on the status of transparency, privacy, and trust in the age
of surveillance.
|
|