Internet abuses and privacy rights / compiled by H. W. Wilson, a division of EBSCO Information Services.
Material type:
TextSeries: Reference shelf ; v. 89, no. 2.Publisher: Amenia, New York : Grey House Publishing, 2017Copyright date: 2017Edition: First editionDescription: xiii, 216 pages : illustrations ; 25 cmContent type: - text
- unmediated
- volume
- 9781682174524
- 1682174522
- HV 6773.2 .I58 2017
| Item type | Current library | Call number | Status | Barcode | |
|---|---|---|---|---|---|
Book
|
Storms Research Center Main Collection | HV 6773.2 .I58 2017 (Browse shelf(Opens below)) | Available | 98652704 |
Edition statement supplied by publisher.
Includes bibliographical references and index.
1. Personal Cybersecurity : -- The personal data dimension -- How to protect your digital privacy in the era of public shaming / Julia Angwin -- Passing the email privacy act has never been more urgent / Andy Greenberg -- Practicing good personal cybersecurity isn't just about protecting yourself / Josephine Wolff -- The watchers : assaults on privacy in America / Jonathan Shaw -- Open technology : values, compromises, and ownership / Brynne Morris, Georgia Bullen, Steph Alarcon, Fernanda Lavalle, Nat Meysenberg, Chris Ritzo -- 2. Net neutrality and government surveillance : -- Cyberpolitics : neutrality, privacy, and security -- Follow Obama's lead on cybersecurity / Robert Knake -- Consumers are going to love the end of net neutrality - at first / Christopher Mims -- Government's privacy rights don't exceed the public's / Noah Feldman -- Documents show AT&T secretly sells customer data to law enforcement / Nicky Woolf -- Concerns loom over a data-sharing pact to protect privacy of Europeans / Natalia Drozdiak and Sam Schechner -- Trump's FCC pick quickly targets net neutrality rules / Cecelia Kang -- Now it's much easier for government agencies to get NSA surveillance data / Robyn Greene -- The risks of sending secret messages in the White House / Kaveh Waddell -- 3. New challenges to privacy : -- Cyberthreats of today and tomorrow -- The privacy threat from always-on microphones like the Amazon Echo / Jay Stanley -- Incentives need to change for firms to take cyber-security more seriously -- Hacking, cryptography, and the countdown to quantum computing / Alex Hutchinson -- The Dyn DDoS attack and the changing balance of online cyber power / Kalev Leetaru -- The internet of things is a cyberwar nightmare / James Stavridis -- The biggest security threats coming in 2017 / Wired staff -- Why does our privacy really matter? / Evan Selinger -- 4. Internet news and accountability : -- Internet news and the fight for legitimacy -- Fake news expert on how false stories spread and why people believe them -- Who controls your Facebook feed / Will Oremus -- The very real consequences of fake news stories and why your brain can't ignore them / Nsikan Akpan -- Why do we fall for fake news? / Shyam Sundar -- The Trump administration plays right into Russia's information warfare strategy / David Fidler -- 5. The power and influence of technology : -- Black hats and white hats : the hacking phenomenon -- The perfect weapon : how Russian cyberpower invaded the U.S. / Eric Lipton, David E. Sanger, and Scott Shane -- Hacking the attention economy / Danah Boyd -- Partisan politics and the Russia hacking imbroglio / Jonah Goldberg -- Feds : we can read all your email, and you'll never know / Clark D. Cunningham -- Lobbying muscle may help tech titans "trump" Trump / Allan Holmes and Jared Bennett -- Reboot the world / Paul Ford.
There are no comments on this title.