You for sale protecting your personal data and privacy online

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people...

Descripción completa

Detalles Bibliográficos
Otros Autores: Sumner, Stuart, author (author), Rispoli, Mike, editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Massachusetts : Syngress 2016.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629703306719
Tabla de Contenidos:
  • Cover; Title Page; Copyright Page; Contents; Foreword; About the Author; About the Technical Editor; Acknowledgments; Author's Note; Chapter 1 - Introduction; Why All this Fuss About Privacy?; Here's My Cow, now Where's My Change?; Hey I Thought this Lunch was Free!; Why should We care About Privacy?; Caution: Hackers at Work; Serious Business; References; Chapter 2 - The Snowden Revelations; A glance at the history books; You say incident, I say sham; let's call the whole thing off; Revelations, or just more of the same?; PRISM; Plus Ca Change; Snowden who?; Five reasons not to act
  • The 'Intelligence/National Security Argument': no EU CompetenceThe 'Terrorism Argument': Danger of The Whistleblower; The 'Treason Argument: no Legitimacy for The Whistleblower; The 'Realism Argument': General Strategic Interests; The 'Good Government Argument': Trust Your Government; Five reasons to act; The 'Mass Surveillance Argument': in Which Society do We Want to Live?; The 'Fundamental Rights Argument'; The 'EU Internal Security Argument'; The 'Deficient Oversight Argument'; The 'Chilling Effect on Media' and the Protection of Whistleblowers; References
  • Chapter 3 - Supermarkets and Data BrokersSign up Here for Privacy Violation; Data Mining all the Way to the Womb; Broken Privacy; Yes but so What!; References; Chapter 4 - Google, Apple, Microsoft and the Concept of Evil; Citation, Citation Citation; How Evil Is 'Evil'?; Google Glass; Street View; Android; What Does all this Mean?; Shady Areas and Creepy Lines; Appetite for Information; Yosemite Wham Bam Thank you Sam; References; Chapter 5 - Social Media and the Dangers of Over-Sharing; Launching Thefacebook and Dropping The 'The'; Social Media: Both a Blessing and a Curse
  • Safeguarding Student PrivacyProtecting Electricity Customer Data with a Code of Conduct; Criticism of the Reforms; A quick fix; References; Chapter 8 - Privacy and Health; Care.Data; Selling your Health Records; Aggregate Data; Anonymized Data; Pseudonymized Data; Clearly Identifiable Data; Privacy Fears can Kill; Can you have too Much Privacy?; Medical Privacy in the Facebook Age; Does Obamacare about Privacy?; References; Chapter 9 - The Internet of Things and the (not so) Smart Grid; And the Point of All This?; Back to the Internet of Things; Data Trawling; The Dangers of Being Smart
  • Striding Over the Creepy Line