Privacy in the Modern Age
Call Number: JC 596.2 .U5 .P77 2015
Publication Date: 2015-05-12
The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don't simply describe these problems or warn about the loss of privacy-they propose solutions. They look closely at business practices, public policy, and technology design, and ask, "Should this continue? Is there a better approach?" They take seriously the dictum of Thomas Edison: "What one creates with his hand, he should control with his head." It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume is a reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day.
Privacy in a Digital, Networked World
Call Number: TK 5105 .S9 .Z23 2015
Publication Date: 2015-10-23
Contents: Introduction -- Database Privacy -- Privacy and big data -- Privacy in crowdsourced platforms -- Privacy in healthcare -- Privacy in peer-to-peer networks -- Privacy in the cloud -- Privacy in vehicular ad hoc networks -- Privacy law and regulation: technologies, implications, and solutions -- Privacy in mobile devices -- Privacy in biometric systems -- Privacy in social networks -- The right to privacy in the age of digital technology -- How to explore consumers' privacy choices with behavioral economics -- Techniques, taxonomy, and challenges of privacy protection in the smart grid -- Location-based privacy, protection, safety, and security
Call Number: HF 5548.37 .G737 .G737
Publication Date: 2015-09-28
Contents: Cyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organization's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future.
Call Number: TK 5105 .S9 .L5 2015
Publication Date: 2015-04-13
This guide makes advanced enterprise security practices accessible to all corporate IT staff and shows you how to identify relevant solutions to secure critical infrastructure, construct policies that provide flexibility to the users and ensure productivity, deploy effective defenses against rapidly-evolving web threats, implement solutions that comply with relevant rules and regulations, and build new security solutions, policies, and products within the enterprise context.
Digination: Identity, Organization, and Public Life in the Age of Small Digital Devices and Big Digital Domains
Call Number: HM 851 .M33
Publication Date: 2014-06-13
The shift from orality to literacy that began with the invention of the phonetic alphabet, and which went into high-gear with Gutenberg's printing press more than 500 years ago, helped make the modern world. Some commentators have argued that this shift from orality to literacy marked a much broader, cultural shift of cataclysmic proportions. Today, with everything from e-mail to blogs, iPods and podcasts, through Google, Yahoo, eBay, and with cutting-edge smart phones, we find ourselves developing relationships with these newest communication tools that aren't simply allowing us to communicate faster, farther and with more ease than ever before. We aren't just moving around ideas, data, and information at unimaginable speed and scale.
Call Number: QA 76.9 .D343 .C4785 2015
Publication Date: 2015-07-30
Social media promises a new age of digital enlightenment, but social data is compromised: it is being seized by specific economic interests, it leads to a fundamental shift in the relationship between research and the public good, and it fosters new forms of control and surveillance. The expert, international contributors to Compromised Data explore the limits and challenges of social data research to invent and develop new modes of doing public research. At is core, this collection argues that we are witnessing a fundamental reshaping of the social through social data mining.
Rethinking the Internet of Things
Call Number: TK5105.875.I57 D33 2013
Publication Date: 2013-12-30
The book discusses the difference between the "normal" Internet and the Internet of Things, describes a new architecture and its components in the "chirp" context, explains the shortcomings of IP for the Internet of Things, describes the anatomy of the Internet of Things, and describes how to build a suitable network to maximize the amazing potential of the Internet of Things.
Being Digital Citizens
Call Number: JF 1525 .A8 .I68 2015
Publication Date: 2015-04-14
The book examines how citizens encounter and perform new sorts of rights, duties, opportunities and challenges through the Internet. By disrupting prevailing understandings of citizenship and cyberspace, the authors highlight the dynamic relationship between these two concepts. Rather than assuming that these are static or established facts of politics and society, this book shows how the challenges and opportunities presented by the Internet inevitably impact the action and understanding of political agency. It investigates how we conduct ourselves in cyberspace through digital acts. This book provides a new theoretical understanding of what it means to be a citizen today for students and scholars across the social sciences.
Web of Deceit
Call Number: HV 6773 .W423 2012
Publication Date: 2012-02-01
Skilled researchers, journalists, and subject experts have come together in this follow-up to Web of Deception to reveal important lessons for staying safe and retaining privacy_online. In the wake of the social media popularity boom-epitomized by MySpace, eBay, and Craigslist and accelerating with Facebook and Twitter-the success of internet con artists and thieves has been quick to follow. Manipulators have been provided with the tools and targets to perpetrate hoaxes and con games on an ever larger scale._An invaluable guide to safe internet usage, this resource explains the importance of guarding privacy and identity online, spotting misinformation, avoiding_charity scams, and evaluating websites.
Filter bubble: What Internet is hiding from you.
Call Number: ZA4237 .P37 2011
The hidden rise of personalization on the Internet is controlling--and limiting--the information we consume. In 2009, Google began customizing its search results. Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, this change is symptomatic of the most significant shift to take place on the Web in recent years--the rise of personalization. Though the phenomenon has gone largely undetected until now, personalized filters are sweeping the Web, creating individual universes of information for each of us. Data companies track your personal information to sell to advertisers, from your political leanings to the hiking boots you just browsed on Zappos. In a personalized world, we will increasingly be typed and fed only news that is pleasant, familiar, and confirms our beliefs--and because these filters are invisible, we won't know what is being hidden from us. Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas.--From publisher description.
Overload! How Too Much Information is Hazardous to Your Organization.
Call Number: HD 30.2 .S686 2011
"This groundbreaking book reveals how different kinds of information overload impacts workers and businesses as a whole. It helps businesses get a grip on the financial costs of e-mail overload and interruptions and how working in an information overloaded environment impacts employee production, efficiency, and moral. The book then shows how to fight information overload, including some interesting cases is what companies like IBM, Morgan Stanley, and Intel are doing about it. Chapter contents follow: Chapter 1 Infromation Revolutions from Papyrus to e-Readers, Chapter 2 The Shift Occurs: The Construction of an Information Society, Chapter 3 Where Information Comes From, Chapter 4 What We do with Information, Chapter 5 What Too much Information is Doing, Chapter 6 Fighting Back, Chapter 7 Managing Information and Maintaining Sanity, Chapter 8 Enterprise of the Future: The All-Informed Organization. Author also wants to provide interactive content through a URL where readers can quiz themselves on their information overload quotient"--
Histories of Computing
Call Number: QA 76.17 .M34 2011
Publication Date: 2011
Thirteen of Mahoney's essays and papers covering historiography, software engineering, and theoretical computer science.
Economic Security: Neglected dimension of national security?
Call Number: HC 110 .D4 .E452 2011
Publication Date: 2011
Contents: Economic security : neglected dimension of national security? / David M. Walker -- Toward a premise for grand strategy / John F. Morton -- Energy security is national security / Keith W. Cooley -- Achieving energy security that feeds the economic component of national security / Louis J. Infante -- A well-educated workforce : vital component of national and economic security / Myra Howze Shiplett ... [et al.] -- Innovation / Carmen Medina -- Conclusion / Sheila R. Ronis.
On August 24-25, 2010, the National Defense University held a conference titled Economic Security: Neglected Dimension of National Security? Selected papers from the conference, edited by Sheila R. Ronis, comprise this volume.
Includes bibliographical references.