Internet abuses and privacy rights / compiled by H. W. Wilson, a division of EBSCO Information Services. - First edition. - xiii, 216 pages : illustrations ; 25 cm. - The reference shelf ; volume 89, number 2 . - Reference shelf ; v. 89, no. 2. .

Includes bibliographical references and index.

personal data dimension -- How to protect your digital privacy in the era of public shaming / Passing the email privacy act has never been more urgent / Practicing good personal cybersecurity isn't just about protecting yourself / watchers : assaults on privacy in America / Open technology : values, compromises, and ownership / Cyberpolitics : neutrality, privacy, and security -- Follow Obama's lead on cybersecurity / Consumers are going to love the end of net neutrality - at first / Government's privacy rights don't exceed the public's / Documents show AT&T secretly sells customer data to law enforcement / Concerns loom over a data-sharing pact to protect privacy of Europeans / Trump's FCC pick quickly targets net neutrality rules / Now it's much easier for government agencies to get NSA surveillance data / risks of sending secret messages in the White House / Cyberthreats of today and tomorrow -- privacy threat from always-on microphones like the Amazon Echo / Incentives need to change for firms to take cyber-security more seriously -- Hacking, cryptography, and the countdown to quantum computing / Dyn DDoS attack and the changing balance of online cyber power / internet of things is a cyberwar nightmare / biggest security threats coming in 2017 / Why does our privacy really matter? / Internet news and the fight for legitimacy -- Fake news expert on how false stories spread and why people believe them -- Who controls your Facebook feed / very real consequences of fake news stories and why your brain can't ignore them / Why do we fall for fake news? / Trump administration plays right into Russia's information warfare strategy / Black hats and white hats : the hacking phenomenon -- perfect weapon : how Russian cyberpower invaded the U.S. / Hacking the attention economy / Partisan politics and the Russia hacking imbroglio / Feds : we can read all your email, and you'll never know / Lobbying muscle may help tech titans "trump" Trump / Reboot the world / Julia Angwin -- Andy Greenberg -- Josephine Wolff -- Jonathan Shaw -- Brynne Morris, Georgia Bullen, Steph Alarcon, Fernanda Lavalle, Nat Meysenberg, Chris Ritzo -- Robert Knake -- Christopher Mims -- Noah Feldman -- Nicky Woolf -- Natalia Drozdiak and Sam Schechner -- Cecelia Kang -- Robyn Greene -- Kaveh Waddell -- Jay Stanley -- Alex Hutchinson -- Kalev Leetaru -- James Stavridis -- Wired staff -- Evan Selinger -- Will Oremus -- Nsikan Akpan -- Shyam Sundar -- David Fidler -- Eric Lipton, David E. Sanger, and Scott Shane -- Danah Boyd -- Jonah Goldberg -- Clark D. Cunningham -- Allan Holmes and Jared Bennett -- Paul Ford. 1. Personal Cybersecurity : -- The The 2. Net neutrality and government surveillance : -- The 3. New challenges to privacy : -- The The The The 4. Internet news and accountability : -- The The 5. The power and influence of technology : -- The

9781682174524 1682174522


Computer crimes--United States--Sources.
Internet--United States--Sources.
Privacy, Right of--United States--Sources.
Network neutrality--United States--Sources.
Electronic surveillance--United States--Sources.
Computer security--United States--Sources.


Sources.

HV 6773.2 / .I58 2017