Sumner, Stuart,
You: for sale : protecting your personal data and privacy online / [electronic resource] Stuart Sumner and Mike Rispoli, technical editor. - 1 online resource
Includes bibliographical references and index.
""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""Foreword""; ""About the Author""; ""About the Technical Editor""; ""Acknowledgments""; ""Author�a�?s Note""; ""Chapter 1 -- Introduction""; ""Why All this Fuss About Privacy?""; ""Here�a�?s My Cow, now Where�a�?s My Change?""; ""Hey I Thought this Lunch was Free!""; ""Why should We care About Privacy?""; ""Caution: Hackers at Work""; ""Serious Business""; ""References""; ""Chapter 2 -- The Snowden Revelations""; ""A glance at the history books""; ""You say incident, I say sham; let�a�?s call the whole thing off"" ""Revelations, or just more of the same?""""PRISM""; ""Plus Ca Change""; ""Snowden who?""; ""Five reasons not to act""; ""The �a�?Intelligence/National Security Argument�a�?: no EU Competence""; ""The �a�?Terrorism Argument�a�?: Danger of The Whistleblower""; ""The �a�?Treason Argument: no Legitimacy for The Whistleblower""; ""The �a�?Realism Argument�a�?: General Strategic Interests""; ""The �a�?Good Government Argument�a�?: Trust Your Government""; ""Five reasons to act""; ""The �a�?Mass Surveillance Argument�a�?: in Which Society do We Want to Live?""; ""The �a�?Fundamental Rights Argument�a�?"" ""The �a�?EU Internal Security Argument�a�?""""The �a�?Deficient Oversight Argument�a�?""; ""The �a�?Chilling Effect on Media�a�? and the Protection of Whistleblowers""; ""References""; ""Chapter 3 -- Supermarkets and Data Brokers""; ""Sign up Here for Privacy Violation""; ""Data Mining all the Way to the Womb""; ""Broken Privacy""; ""Yes but so What!""; ""References""; ""Chapter 4 -- Google, Apple, Microsoft and the Concept of Evil""; ""Citation, Citation Citation""; ""How Evil Is �a�?Evil�a�??""; ""Google Glass""; ""Street View""; ""Android""; ""What Does all this Mean?"" ""Shady Areas and Creepy Lines""""Appetite for Information""; ""Yosemite Wham Bam Thank you Sam""; ""References""; ""Chapter 5 -- Social Media and the Dangers of Over-Sharing""; ""Launching Thefacebook and Dropping The �a�?The�a�?""; ""Social Media: Both a Blessing and a Curse""; ""Changing the Norm to Suit Yourself""; ""21st Century Ethics""; ""Identity Theft""; ""References""; ""Chapter 6 -- Security, Spear Phishing and Social Engineering""; ""Plastic Thinking Test ""; ""Not a Unique Snowflake After All""; ""Target by Name�a�?""; ""Phishing, With or Without a Spear"" ""RSA Security Discovers It�a�?s Not Very Secure""""You Are Screwed""; ""References""; ""Chapter 7 -- Privacy and the Law""; ""Comparing the US and UK Privacy Laws""; ""The Need For Collaboration""; ""Is the EU �a��Making a Fool of Itself�a�??""; ""What are These New Rules Anyway?""; ""In the Wake of Je Suis Charlie�a�?""; ""Across the Pond""; ""A Consumer Rights Bill""; ""Tackling Identity Theft""; ""Safeguarding Student Privacy""; ""Protecting Electricity Customer Data with a Code of Conduct""; ""Criticism of the Reforms""; ""A quick fix""; ""References""; ""Chapter 8 -- Privacy and Health""
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening fo.
9780128034231 0128034238 012803405X 9780128034057
Data protection.
Computer security.
BUSINESS & ECONOMICS--Industrial Management.
BUSINESS & ECONOMICS--Management.
BUSINESS & ECONOMICS--Management Science.
BUSINESS & ECONOMICS--Organizational Behavior.
Computer security.
Data protection.
Electronic books.
Electronic book.
HF5548.37
658.478
You: for sale : protecting your personal data and privacy online / [electronic resource] Stuart Sumner and Mike Rispoli, technical editor. - 1 online resource
Includes bibliographical references and index.
""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""Foreword""; ""About the Author""; ""About the Technical Editor""; ""Acknowledgments""; ""Author�a�?s Note""; ""Chapter 1 -- Introduction""; ""Why All this Fuss About Privacy?""; ""Here�a�?s My Cow, now Where�a�?s My Change?""; ""Hey I Thought this Lunch was Free!""; ""Why should We care About Privacy?""; ""Caution: Hackers at Work""; ""Serious Business""; ""References""; ""Chapter 2 -- The Snowden Revelations""; ""A glance at the history books""; ""You say incident, I say sham; let�a�?s call the whole thing off"" ""Revelations, or just more of the same?""""PRISM""; ""Plus Ca Change""; ""Snowden who?""; ""Five reasons not to act""; ""The �a�?Intelligence/National Security Argument�a�?: no EU Competence""; ""The �a�?Terrorism Argument�a�?: Danger of The Whistleblower""; ""The �a�?Treason Argument: no Legitimacy for The Whistleblower""; ""The �a�?Realism Argument�a�?: General Strategic Interests""; ""The �a�?Good Government Argument�a�?: Trust Your Government""; ""Five reasons to act""; ""The �a�?Mass Surveillance Argument�a�?: in Which Society do We Want to Live?""; ""The �a�?Fundamental Rights Argument�a�?"" ""The �a�?EU Internal Security Argument�a�?""""The �a�?Deficient Oversight Argument�a�?""; ""The �a�?Chilling Effect on Media�a�? and the Protection of Whistleblowers""; ""References""; ""Chapter 3 -- Supermarkets and Data Brokers""; ""Sign up Here for Privacy Violation""; ""Data Mining all the Way to the Womb""; ""Broken Privacy""; ""Yes but so What!""; ""References""; ""Chapter 4 -- Google, Apple, Microsoft and the Concept of Evil""; ""Citation, Citation Citation""; ""How Evil Is �a�?Evil�a�??""; ""Google Glass""; ""Street View""; ""Android""; ""What Does all this Mean?"" ""Shady Areas and Creepy Lines""""Appetite for Information""; ""Yosemite Wham Bam Thank you Sam""; ""References""; ""Chapter 5 -- Social Media and the Dangers of Over-Sharing""; ""Launching Thefacebook and Dropping The �a�?The�a�?""; ""Social Media: Both a Blessing and a Curse""; ""Changing the Norm to Suit Yourself""; ""21st Century Ethics""; ""Identity Theft""; ""References""; ""Chapter 6 -- Security, Spear Phishing and Social Engineering""; ""Plastic Thinking Test ""; ""Not a Unique Snowflake After All""; ""Target by Name�a�?""; ""Phishing, With or Without a Spear"" ""RSA Security Discovers It�a�?s Not Very Secure""""You Are Screwed""; ""References""; ""Chapter 7 -- Privacy and the Law""; ""Comparing the US and UK Privacy Laws""; ""The Need For Collaboration""; ""Is the EU �a��Making a Fool of Itself�a�??""; ""What are These New Rules Anyway?""; ""In the Wake of Je Suis Charlie�a�?""; ""Across the Pond""; ""A Consumer Rights Bill""; ""Tackling Identity Theft""; ""Safeguarding Student Privacy""; ""Protecting Electricity Customer Data with a Code of Conduct""; ""Criticism of the Reforms""; ""A quick fix""; ""References""; ""Chapter 8 -- Privacy and Health""
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening fo.
9780128034231 0128034238 012803405X 9780128034057
Data protection.
Computer security.
BUSINESS & ECONOMICS--Industrial Management.
BUSINESS & ECONOMICS--Management.
BUSINESS & ECONOMICS--Management Science.
BUSINESS & ECONOMICS--Organizational Behavior.
Computer security.
Data protection.
Electronic books.
Electronic book.
HF5548.37
658.478