Choose an application
Choose an application
Choose an application
Choose an application
Naturalism --- Materialism --- Mechanism (Philosophy) --- Philosophy --- Positivism --- Science
Choose an application
Online surveillance of our behavior by private companies is on the increase, particularly through the Internet of Things and the increasing use of algorithmic decision-making. This troubling trend undermines privacy and increasingly threatens our ability to control how information about us is shared and used. Written by a computer scientist and a legal scholar, The Privacy Fix proposes a set of evidence-based, practical solutions that will help solve this problem. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. Bridging the gap between computer scientists, economists, lawyers, and public policy makers, this book provides theoretically and practically sound public policy guidance about how to preserve privacy in the onslaught of surveillance. It emphasizes the need to make tradeoffs among the complex concerns that arise, and it outlines a practical norm-creation process to do so.
Privacy, Right of. --- Self-realization. --- Electronic surveillance --- Artificial intelligence --- Electronic monitoring in the workplace --- Government policy. --- Law and legislation. --- Labor laws and legislation --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Fulfillment (Ethics) --- Self-fulfillment --- Ethics --- Success --- Satisfaction --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Law and legislation
Choose an application
Choose an application
Choose an application
Choose an application
"The wave of data breaches raises two pressing questions : Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better? : Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations"--
Computer networks --- Computer security --- Business --- Computer crimes --- Security measures --- Government policy. --- Data processing --- Security measures. --- Risk assessment.
Choose an application