data protection

Type: 
Topical Term
Subfield: 
a
Alias: 
data protection

Hacking and data privacy

how exposed are we?
Presents a collection of essays selected from the New York Times that looks at computer hacking and data privacy.
Cover image of Hacking and data privacy

Digital era encryption and decryption

Today's news headlines are plentifully peppered by the latest hacks into some of the world's largest and most reputable companies.

Eyes & spies

how you're tracked and why you should know
2017
"... looks at the way information and data about us is collected and used by individuals, governments, companies, and organizations. Each chapter covers one aspect of the subject, from data collection to computer surveillance to personal privacy. Arguments for both increased security and increased privacy are offered, which encourages readers to think critically about issues and decide for themselves"--Amazon.com.

Privacy and digital security

2015
"In the digital age, journalists have to be concerned about privacy and security like never before. This book teaches students of media about this brave new world. Journalists today need to protect their information and sources in unprecedented ways. Readers also learn how data encryption works. When using the Internet to do research, there’s always the potential for hacking. Finally, an interview with cyber security expert Brock Wood gives readers a sense of real-world threats to their privacy and security. This book is an indispensable resource to students of journalism in a cyber world."--Publisher description.

Future crimes

inside the digital underground and the battle for our connected world
Technological advances have benefited our world in many ways but the flip side is technology has also worked against us. Criminals can hijack the technologies of tomorrow to devastating effect. Taking back control of our own devices will allow us to harness technology's power for the betterment of humanity.

Big data and privacy rights

2017
"Examines how companies, governments, and individuals collect and use massive amounts of personal information, highlighting the privacy concerns that result when these activities are done without public knowledge."--Provided by publisher.

Privacy in the age of big data

recognizing threats, defending your rights, and protecting your family
Highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware.

Future crimes

everything is connected, everyone is vulnerable and what we can do about it

They know everything about you

how data-collecting corporations and snooping government agencies are destroying democracy
2015
"In the first week of June 2013, the American people discovered that for a decade, they had abjectly traded their individual privacy for the chimera of national security. The revelation that the federal government has full access to all phone records and the vast trove of presumably private personal data posted on the Internet has brought the threat of a surveillance society to the fore. But the erosion of privacy rights extends far beyond big government. Big business has long played a leading role in the hollowing outof personal freedoms. In this new book, Robert Scheer shows how our most intimate habits, from private correspondence, book pages read, and lists of friends and phone conversations have been seamlessly combined in order to create a detailed map of an individual's social and biological DNA"--OCLC.

Privacy in the age of big data

recognizing threats, defending your rights, and protecting your family
"Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection, while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Theresa M. Payton and Theodore Claypoole skillfully introduce readers to the many ways we are "watched" and how to change behaviors and activities to recapture and regain more of our privacy."--Book jacket.

Pages

Subscribe to RSS - data protection