Library Logo
Normal view MARC view ISBD view

You: for sale : protecting your personal data and privacy online / [electronic resource]

by Sumner, Stuart [author.]; Rispoli, Mike [technical editor.].
Material type: materialTypeLabelBookPublisher: Amsterdam : Syngress is an imprint of Elsevier, 2016.Description: 1 online resource.ISBN: 9780128034231; 0128034238; 012803405X; 9780128034057.Subject(s): Data protection | Computer security | BUSINESS & ECONOMICS -- Industrial Management | BUSINESS & ECONOMICS -- Management | BUSINESS & ECONOMICS -- Management Science | BUSINESS & ECONOMICS -- Organizational Behavior | Computer security | Data protection | Electronic books | Electronic bookOnline resources: ScienceDirect
Contents:
""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""Foreword""; ""About the Author""; ""About the Technical Editor""; ""Acknowledgments""; ""Author�a�?s Note""; ""Chapter 1 -- Introduction""; ""Why All this Fuss About Privacy?""; ""Here�a�?s My Cow, now Where�a�?s My Change?""; ""Hey I Thought this Lunch was Free!""; ""Why should We care About Privacy?""; ""Caution: Hackers at Work""; ""Serious Business""; ""References""; ""Chapter 2 -- The Snowden Revelations""; ""A glance at the history books""; ""You say incident, I say sham; let�a�?s call the whole thing off""
""Revelations, or just more of the same?""""PRISM""; ""Plus Ca Change""; ""Snowden who?""; ""Five reasons not to act""; ""The �a�?Intelligence/National Security Argument�a�?: no EU Competence""; ""The �a�?Terrorism Argument�a�?: Danger of The Whistleblower""; ""The �a�?Treason Argument: no Legitimacy for The Whistleblower""; ""The �a�?Realism Argument�a�?: General Strategic Interests""; ""The �a�?Good Government Argument�a�?: Trust Your Government""; ""Five reasons to act""; ""The �a�?Mass Surveillance Argument�a�?: in Which Society do We Want to Live?""; ""The �a�?Fundamental Rights Argument�a�?""
""The �a�?EU Internal Security Argument�a�?""""The �a�?Deficient Oversight Argument�a�?""; ""The �a�?Chilling Effect on Media�a�? and the Protection of Whistleblowers""; ""References""; ""Chapter 3 -- Supermarkets and Data Brokers""; ""Sign up Here for Privacy Violation""; ""Data Mining all the Way to the Womb""; ""Broken Privacy""; ""Yes but so What!""; ""References""; ""Chapter 4 -- Google, Apple, Microsoft and the Concept of Evil""; ""Citation, Citation Citation""; ""How Evil Is �a�?Evil�a�??""; ""Google Glass""; ""Street View""; ""Android""; ""What Does all this Mean?""
""Shady Areas and Creepy Lines""""Appetite for Information""; ""Yosemite Wham Bam Thank you Sam""; ""References""; ""Chapter 5 -- Social Media and the Dangers of Over-Sharing""; ""Launching Thefacebook and Dropping The �a�?The�a�?""; ""Social Media: Both a Blessing and a Curse""; ""Changing the Norm to Suit Yourself""; ""21st Century Ethics""; ""Identity Theft""; ""References""; ""Chapter 6 -- Security, Spear Phishing and Social Engineering""; ""Plastic Thinking Test ""; ""Not a Unique Snowflake After All""; ""Target by Name�a�?""; ""Phishing, With or Without a Spear""
""RSA Security Discovers It�a�?s Not Very Secure""""You Are Screwed""; ""References""; ""Chapter 7 -- Privacy and the Law""; ""Comparing the US and UK Privacy Laws""; ""The Need For Collaboration""; ""Is the EU �a��Making a Fool of Itself�a�??""; ""What are These New Rules Anyway?""; ""In the Wake of Je Suis Charlie�a�?""; ""Across the Pond""; ""A Consumer Rights Bill""; ""Tackling Identity Theft""; ""Safeguarding Student Privacy""; ""Protecting Electricity Customer Data with a Code of Conduct""; ""Criticism of the Reforms""; ""A quick fix""; ""References""; ""Chapter 8 -- Privacy and Health""
Summary: Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening fo.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Online resource; title from PDF title page (EBSCO, viewed August 26, 2015).

Includes bibliographical references and index.

""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""Foreword""; ""About the Author""; ""About the Technical Editor""; ""Acknowledgments""; ""Author�a�?s Note""; ""Chapter 1 -- Introduction""; ""Why All this Fuss About Privacy?""; ""Here�a�?s My Cow, now Where�a�?s My Change?""; ""Hey I Thought this Lunch was Free!""; ""Why should We care About Privacy?""; ""Caution: Hackers at Work""; ""Serious Business""; ""References""; ""Chapter 2 -- The Snowden Revelations""; ""A glance at the history books""; ""You say incident, I say sham; let�a�?s call the whole thing off""

""Revelations, or just more of the same?""""PRISM""; ""Plus Ca Change""; ""Snowden who?""; ""Five reasons not to act""; ""The �a�?Intelligence/National Security Argument�a�?: no EU Competence""; ""The �a�?Terrorism Argument�a�?: Danger of The Whistleblower""; ""The �a�?Treason Argument: no Legitimacy for The Whistleblower""; ""The �a�?Realism Argument�a�?: General Strategic Interests""; ""The �a�?Good Government Argument�a�?: Trust Your Government""; ""Five reasons to act""; ""The �a�?Mass Surveillance Argument�a�?: in Which Society do We Want to Live?""; ""The �a�?Fundamental Rights Argument�a�?""

""The �a�?EU Internal Security Argument�a�?""""The �a�?Deficient Oversight Argument�a�?""; ""The �a�?Chilling Effect on Media�a�? and the Protection of Whistleblowers""; ""References""; ""Chapter 3 -- Supermarkets and Data Brokers""; ""Sign up Here for Privacy Violation""; ""Data Mining all the Way to the Womb""; ""Broken Privacy""; ""Yes but so What!""; ""References""; ""Chapter 4 -- Google, Apple, Microsoft and the Concept of Evil""; ""Citation, Citation Citation""; ""How Evil Is �a�?Evil�a�??""; ""Google Glass""; ""Street View""; ""Android""; ""What Does all this Mean?""

""Shady Areas and Creepy Lines""""Appetite for Information""; ""Yosemite Wham Bam Thank you Sam""; ""References""; ""Chapter 5 -- Social Media and the Dangers of Over-Sharing""; ""Launching Thefacebook and Dropping The �a�?The�a�?""; ""Social Media: Both a Blessing and a Curse""; ""Changing the Norm to Suit Yourself""; ""21st Century Ethics""; ""Identity Theft""; ""References""; ""Chapter 6 -- Security, Spear Phishing and Social Engineering""; ""Plastic Thinking Test ""; ""Not a Unique Snowflake After All""; ""Target by Name�a�?""; ""Phishing, With or Without a Spear""

""RSA Security Discovers It�a�?s Not Very Secure""""You Are Screwed""; ""References""; ""Chapter 7 -- Privacy and the Law""; ""Comparing the US and UK Privacy Laws""; ""The Need For Collaboration""; ""Is the EU �a��Making a Fool of Itself�a�??""; ""What are These New Rules Anyway?""; ""In the Wake of Je Suis Charlie�a�?""; ""Across the Pond""; ""A Consumer Rights Bill""; ""Tackling Identity Theft""; ""Safeguarding Student Privacy""; ""Protecting Electricity Customer Data with a Code of Conduct""; ""Criticism of the Reforms""; ""A quick fix""; ""References""; ""Chapter 8 -- Privacy and Health""

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening fo.

There are no comments for this item.

Log in to your account to post a comment.
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login