Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
You: for Sale by Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening for years, with firms such as Google capturing everything you type into a browser and selling it to the highest bidder. Apps take information about where you go, and your contact book details, harvest them and sell them on - and people just click the EULA without caring. No one is revealing the dirty secret that is the tech firms harvesting customers' personal data and selling it for vast profits - and people are totally unaware of the dangers. You: For Sale is for anyone who is concerned about what corporate and government invasion of privacy means now and down the road. The book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as facebook and Google, and then tells you what you can do to protect yourself. The book also covers legal and government issues as well as future trends. With interviews of leading security experts, black market data traders, law enforcement and privacy groups, You: For Sale will help you view your personal data in a new light, and understand both its value, and its danger. Provides a clear picture of how companies and governments harvest and use personal data every time someone logs on Describes exactly what these firms do with the data once they have it - and what you can do to stop it Learn about the dangers of unwittingly releasing private data to tech firms, including interviews with top security experts, black market data traders, law enforcement and privacy groups Understand the legal information and future trends that make this one of the most important issues today
Call Number: 364.1633
Publication Date: 2015
Unauthorized Access by Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Securityproposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors--two renowned experts on computer security and law--explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.
Call Number: 323.4 S634u
Publication Date: 2013
The Basics of Digital Privacy by Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You'll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who's watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis! The most straightforward and up-to-date guide to privacy for anyone who goes online for work, school, or personal use Real-world examples show you how cyber criminals commit their crimes, and what you can do to keep your identity and your data safe Written by author Denny Cherry, who teaches top security professionals how to protect huge databases of information Learn the best ways to create secure passwords, chat, text, email and conduct business online without compromising your identity and your personal data
Call Number: 005.8
Publication Date: 2013
Swiped by Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job. One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even purchases made in person are still logged by retailers like Target, who are famously vulnerable to hackers. Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage. The book is also organized around the different problems caused by identity theft: financial, criminal, medical, familial, etc., enabling readers to dip into the sections most relevant to them. Swiped is a practical, lively book that is essential to surviving the ever-changing world of online security. It is invaluable not only for preventing problems but helping cope when they arrive.
Call Number: 364.1633
Publication Date: 2015