Cargando…

You: for sale : protecting your personal data and privacy online /

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sumner, Stuart (Autor)
Otros Autores: Rispoli, Mike (technical editor.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : Syngress is an imprint of Elsevier, 2016.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Foreword
  • About the Author
  • About the Technical Editor
  • Acknowledgments
  • Author�a�?s Note
  • Chapter 1
  • Introduction
  • Why All this Fuss About Privacy?
  • Here�a�?s My Cow, now Where�a�?s My Change?
  • Hey I Thought this Lunch was Free!
  • Why should We care About Privacy?
  • Caution: Hackers at Work
  • Serious Business
  • References
  • Chapter 2
  • The Snowden Revelations
  • A glance at the history books
  • You say incident, I say sham; let�a�?s call the whole thing off
  • Revelations, or just more of the same?PRISM
  • Plus Ca Change
  • Snowden who?
  • Five reasons not to act
  • The �a�?Intelligence/National Security Argument�a�?: no EU Competence
  • The �a�?Terrorism Argument�a�?: Danger of The Whistleblower
  • The �a�?Treason Argument: no Legitimacy for The Whistleblower
  • The �a�?Realism Argument�a�?: General Strategic Interests
  • The �a�?Good Government Argument�a�?: Trust Your Government
  • Five reasons to act
  • The �a�?Mass Surveillance Argument�a�?: in Which Society do We Want to Live?
  • The �a�?Fundamental Rights Argument�a�?
  • The �a�?EU Internal Security Argument�a�?The �a�?Deficient Oversight Argument�a�?
  • The �a�?Chilling Effect on Media�a�? and the Protection of Whistleblowers
  • References
  • Chapter 3
  • Supermarkets and Data Brokers
  • Sign up Here for Privacy Violation
  • Data Mining all the Way to the Womb
  • Broken Privacy
  • Yes but so What!
  • References
  • Chapter 4
  • Google, Apple, Microsoft and the Concept of Evil
  • Citation, Citation Citation
  • How Evil Is �a�?Evil�a�??
  • Google Glass
  • Street View
  • Android
  • What Does all this Mean?
  • Shady Areas and Creepy LinesAppetite for Information
  • Yosemite Wham Bam Thank you Sam
  • References
  • Chapter 5
  • Social Media and the Dangers of Over-Sharing
  • Launching Thefacebook and Dropping The �a�?The�a�?
  • Social Media: Both a Blessing and a Curse
  • Changing the Norm to Suit Yourself
  • 21st Century Ethics
  • Identity Theft
  • References
  • Chapter 6
  • Security, Spear Phishing and Social Engineering
  • Plastic Thinking Test
  • Not a Unique Snowflake After All
  • Target by Name�a�?
  • Phishing, With or Without a Spear
  • RSA Security Discovers It�a�?s Not Very SecureYou Are Screwed
  • References
  • Chapter 7
  • Privacy and the Law
  • Comparing the US and UK Privacy Laws
  • The Need For Collaboration
  • Is the EU �aȶMaking a Fool of Itself�a�??
  • What are These New Rules Anyway?
  • In the Wake of Je Suis Charlie�a�?
  • Across the Pond
  • A Consumer Rights Bill
  • Tackling Identity Theft
  • Safeguarding Student Privacy
  • Protecting Electricity Customer Data with a Code of Conduct
  • Criticism of the Reforms
  • A quick fix
  • References
  • Chapter 8
  • Privacy and Health