You: for sale : protecting your personal data and privacy online /
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam :
Syngress is an imprint of Elsevier,
2016.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Foreword
- About the Author
- About the Technical Editor
- Acknowledgments
- Author�a�?s Note
- Chapter 1
- Introduction
- Why All this Fuss About Privacy?
- Here�a�?s My Cow, now Where�a�?s My Change?
- Hey I Thought this Lunch was Free!
- Why should We care About Privacy?
- Caution: Hackers at Work
- Serious Business
- References
- Chapter 2
- The Snowden Revelations
- A glance at the history books
- You say incident, I say sham; let�a�?s call the whole thing off
- Revelations, or just more of the same?PRISM
- Plus Ca Change
- Snowden who?
- Five reasons not to act
- The �a�?Intelligence/National Security Argument�a�?: no EU Competence
- The �a�?Terrorism Argument�a�?: Danger of The Whistleblower
- The �a�?Treason Argument: no Legitimacy for The Whistleblower
- The �a�?Realism Argument�a�?: General Strategic Interests
- The �a�?Good Government Argument�a�?: Trust Your Government
- Five reasons to act
- The �a�?Mass Surveillance Argument�a�?: in Which Society do We Want to Live?
- The �a�?Fundamental Rights Argument�a�?
- The �a�?EU Internal Security Argument�a�?The �a�?Deficient Oversight Argument�a�?
- The �a�?Chilling Effect on Media�a�? and the Protection of Whistleblowers
- References
- Chapter 3
- Supermarkets and Data Brokers
- Sign up Here for Privacy Violation
- Data Mining all the Way to the Womb
- Broken Privacy
- Yes but so What!
- References
- Chapter 4
- Google, Apple, Microsoft and the Concept of Evil
- Citation, Citation Citation
- How Evil Is �a�?Evil�a�??
- Google Glass
- Street View
- Android
- What Does all this Mean?
- Shady Areas and Creepy LinesAppetite for Information
- Yosemite Wham Bam Thank you Sam
- References
- Chapter 5
- Social Media and the Dangers of Over-Sharing
- Launching Thefacebook and Dropping The �a�?The�a�?
- Social Media: Both a Blessing and a Curse
- Changing the Norm to Suit Yourself
- 21st Century Ethics
- Identity Theft
- References
- Chapter 6
- Security, Spear Phishing and Social Engineering
- Plastic Thinking Test
- Not a Unique Snowflake After All
- Target by Name�a�?
- Phishing, With or Without a Spear
- RSA Security Discovers It�a�?s Not Very SecureYou Are Screwed
- References
- Chapter 7
- Privacy and the Law
- Comparing the US and UK Privacy Laws
- The Need For Collaboration
- Is the EU �aȶMaking a Fool of Itself�a�??
- What are These New Rules Anyway?
- In the Wake of Je Suis Charlie�a�?
- Across the Pond
- A Consumer Rights Bill
- Tackling Identity Theft
- Safeguarding Student Privacy
- Protecting Electricity Customer Data with a Code of Conduct
- Criticism of the Reforms
- A quick fix
- References
- Chapter 8
- Privacy and Health