One of the biggest issues for all users in the online world is security and privacy. Whether it is browsing the web, using email or communicating via social media, people are increasingly aware of the threats that are ever-present in the online world. However, recognizing these threats is the first step to preventing them, and a good understanding ......
Homes that contain devices that can be controlled by smart speakers, voice commands and apps are becoming a reality for an increasing number of people. What was once the stuff of science fiction is now firmly established as part of the real world and is easily accessible for anyone who wants to add an exciting new dimension to their home. 100 Top ......
It is the future, so decode and use shorthand to communicate faster and with less thumb and finger strain. Emoticons are a lot of fun but more importantly add emotional tone so messages are not taken the wrong way. And for parents, this is your decoder guide to a new life language for kids, so stay in the conversation. Suggested uses: ......
Recognizing Threats, Defending Your Rights, and Protecting Your Family
Thoroughly updates the first edition by addressing the significant advances in data-driven technologies, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of a world rife with ransomware and hacking.
A Leader's Guide from Deepfakes to Breaking Deep Learning
Sheds light on the ability to hack AI and the technology industry’s lack of effort to secure vulnerabilities.
We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, ......
This book is designed for use as a primary textbook for a course in cloud computing or as a resource for professionals in industry seeking to explore cloud services. The book highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. It also provides ......
The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be ......
A Field Manual for Teaching and Parenting in the Digital Arena
The key to preventing online child predation is Stakeholder Involvement. Parents and guardians need to place themselves in the forefront of their kids' minds when it comes to their devices. Educational professionals need to use their unique positions to educate their students and detect online predation and problems in their schools.
The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be ......
Explains why digital dossiers pose a grave threat to our privacy. This book sets forth a different understanding of what privacy is. It recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our digital world.
This edited volume explores how emerging normative practices, threats/technologies, and actors shape the global politics of cybersecurity through hybridity and conflict. It ultimately argues that, for the prospect of governing such a complex environment, hybridity and conflict are to be considered as inherent features of cyberspace.
Designed for students and professionals, this text introduces the major concepts of cybersecurity using numerous examples and practical applications. As the field of cybersecurity has moved beyond computer networks and the Internet into phones, the Internet of Things, and autonomous vehicles, it advocates a comprehensive approach to security that ......
Privacy, Mass Surveillance, and the Struggle to Reform the NSA
America's mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration's own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: ......
In this revelation of how digital dossiers are created (usually without our knowledge), Daniel J. Solove argues that we must rethink our understanding of what privacy is and what it means in the digital age, and then reform the laws that define and regulate it.
How vulnerable are the internet and world wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? This book is suitable for anyone who wants to know where the new digital economy is heading.
The transformation of society brought about by the wide dispersion of computers has given rise to moral dilemmas. This is a collection of twenty-six essays, which offer answers to the ethical questions raised by the interaction of people and computers.
Press stories portray the Internet as full of pornography, paedophilia, bomb-making recipes, lewd and lawless behaviour, and copyright violation, but some people argue that such reports greatly overstate the case. This book assesses the issues which will affect the future of the Internet.
Electronic information networks offer extraordinary advantages to business, government, and individuals in terms of power, capacity, speed, accessibility, and cost.