data protection

Type: 
Topical Term
Subfield: 
a
Alias: 
data protection

Slaying digital dragons

tips and tools for protecting your body, brain, psyche, and thumbs from the digital dark side
2021
"This frank and humorous guide helps teens learn how to lead a safe and healthy digital life, join the resistance, and protect themselves from Big Tech's attempted takeover of their brain, body, emotions, privacy, and future"--Provided by publisher.

Is safety more important than privacy?

2022
"Fears about terrorism and other safety concerns have been prevalent for decades, but recent advancements in technology have given law enforcement and national security officials the ability to monitor suspected criminals. Some people believe this is not only desirable, but necessary. Others worry about the ways this power could potentially be abused. The many angles of conflict between safety and privacy are presented to readers through compelling photographs and fascinating fact boxes that supplement the neutral main text. This informative reading experience allows readers to gain a deeper understanding of the arguments and formulate their own opinions"--Provided by publisher.

Protect your data and identity online

2022
"School, work, banking, and shopping have all moved online in our modern world. This can be convenient for users, but it also means that sensitive data is at risk. Criminals seek to steal that data to carry out crimes. 'Protect Your Data and Identity Online' examines these risks and explains how users can take steps to defend themselves"--Provided by publisher.

The hidden history of big brother in America

how the death of privacy and the rise of surveillance threaten us and our democracy
2022
"This book deals with two very large and often amorphous concepts: privacy and surveillance in the context of both government and the marketplace. Both concepts have undergone changes over the millennia of recorded human history, and those changes have dramatically sped up and expanded over the past few centuries, starting with the widespread use of the printing press in the mid- to late-15th century when books and newspapers began to proliferate across Europe and the rest of the "civilized" world by the end of the 17th century. The development of radio, television and the internet in the 20th century heightened the need to define more clearly what both concepts meant and how they applied both to governments (the "public sector") and individual and corporate players (the "private sector"). The Thought Police and Big Brother are terms introduced into the popular lexicon by George Orwell in his novel 1984; Big Brother was the overweening all-powerful government of Orwell's novel, and the Thought Police were those who managed to burrow so deeply into every citizen's behavior, speech and even thoughts that they could control or punish behavior based on the slightest deviations from orthodoxy. Orwell was only slightly off the mark. Big Brother types of government, and Thought Police types of social control, are now widespread in the world and incompatible with democracy, as I'll show in more detail later in the book. Most concerning for Americans and citizens of other "democratic" nations, the mentality of both have heavily infiltrated both American government and corporate sectors, reaching so deeply into the day-to-day details of our lives that the techniques and technologies they use can - and do -not only control, but predict our behavior"--.

The art of invisibility

the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
2019
"[Kevin Mitnick maintains that] your every step online is being tracked and stored, and your identity literally stolen ... [He] uses true-life stories to show exactly what is happening without your knowledge, teaching you 'the art of invisibility' -- online and real-world tactics to protect you and your family, using easy step-by-step instructions ... [Covers] everything from password protection and smart Wi-FI usage to advanced techniques designed to maximize your anonymity"--Provided by publisher.

Protecting financial data

Protecting Financial Data examines how people can become targets for cybercriminals, the dangers of identity theft, and how people can protect their financial data from attacks. Features include worksheets, key takeaways, a glossary, further readings, websites, source notes, and an index. Aligned to Common Core Standards and correlated to state standards. Essential Library is an imprint of Abdo Publishing, a division of ABDO.

This is how they tell me the world ends

the cyber- weapons arms race
2020
"Zero day: a software bug that allows a hacker to break into your devices and move around undetected. For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar to hackers willing to sell their lock-picking code and their silence. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. [The author] lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel"--OCLC.

Personal data collection

Presents the history of data collection and examines how data is used for research, sales, and surveillance. Explores concerns surrounding personal data collection, and discusses its future. Includes sidebars, graphs, facts, primary sources, critical thinking questions, color photographs, a glossary, and further resources.

Surveillance

Presents the history of surveillance and examines how the government and private companies conduct surveillance using GPS, drones, body cameras, facial recognition, and cookies. Explores concerns surrounding surveillance, and discusses the future of surveillance technology. Includes sidebars, graphs, facts, primary sources, critical thinking questions, color photographs, a glossary, and further resources.

Personal data management

2018
Discusses personal data management, covering how to protect personal data, what data is at risk, how to create a strong password, and more.

Pages

Subscribe to RSS - data protection