You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Uncovers why privacy laws fail at protecting us from corporate data harms and charts a path for reform.
NATIONAL BESTSELLER • The story of a small AI company that gave facial recognition to law enforcement, billionaires, and businesses, threatening to end privacy as we know it “The dystopian future portrayed in some science-fiction movies is already upon us. Kashmir Hill’s fascinating book brings home the scary implications of this new reality.”—John Carreyrou, author of Bad Blood A BEST BOOK OF THE YEAR: Financial Times, Los Angeles Times, Wired Winner of the Inc. Non-Obvious Book Award • Longlisted for the Financial Times and Schroders Business Book of the Year Award New York Times tech reporter Kashmir Hill was skeptical when she got a tip about a mysterious app called Clearview...
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security.
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research.
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handl...
In today’s society, the power of someone’s reputation, or influence, has been turned into a job: that of being a social media influencer. This role comes with promises, such as aspirational work, but is rife with challenges, given the controversy that often surrounds influencers. This is the first book on the regulation of social media influencers, that brings together legal, economic and ethical angles to further unveil the implications of influencer marketing.
The case for taking design seriously in privacy law -- Why design is (almost) everything -- Privacy law's design gap -- Privacy values in design -- Setting boundaries for design -- A toolkit for privacy design -- Social media -- Hide and seek technologies -- The internet of things
Drawing on rich, empirical case studies, this innovative book provides a contemporary and comprehensive exploration of the plural, dynamic and precarious processes, materials, practices, interventions and relationships on social network sites, and their resultant power effects, when copyright and data privacy rights are at stake.