My Account Log in

1 option

The privacy mission : achieving ethical data for our lives online / Annie Machon.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Machon, Annie, author.
Language:
English
Subjects (All):
Data privacy.
Internet--Moral and ethical aspects.
Internet.
Physical Description:
1 online resource (243 pages)
Place of Publication:
Hoboken, NJ : John Wiley & Sons, Inc., [2022]
Summary:
"The subject of data ethics has never been more urgent. This is no longer an academic or niche geek issue as it has been since the inception of the internet and the world wide web. Data ethics is an issue that affects all our lives as we have been forced by covid to live increasingly online. Who controls access to the hardware, who runs the software, who can spy on us, hack us, data farm us? What are the threats that we need to mitigate against democratically, societally and personally? How can corporations protect us rather than predate on us, and how can that help their bottom line? In this book I aim to summarise both the overarching concepts and principles about why this is important, and offer practical solutions for companies, policy makers, academia and individuals to push back against these known threats and also try to future proof themselves going forward. This is information we all need to know and apply as technology accelerates exponentially"-- Provided by publisher.
Contents:
Cover
Title Page
Copyright Page
Contents
Acknowledgements
Introduction
Untangling the World Wide Web
Education for an Empowered Future
Part I Privacy and Why We Should Care
Chapter 1 Our Human Rights Online
Why Does This Matter Now?
The Privacy Versus Security Debate
Why Should I Worry About My Online Privacy If I Have Nothing to Hide?
The Consequences of Digital Convenience
Carrying Out Your Own Risk Assessment
Follow the Leader
Chapter 2 Gamekeeper Turned Poacher
Chapter 3 How Did We Get Here?
You and Your Data Are the Product
Social Media Has "Groomed" Society
Open-Source Software Is the Antidote
We Are Still Living in the "Wild West"
You Have More Power Than You Think
What World Do You Want to Live In?
Part II The Dark Triad
Chapter 4 Spooks
The 1990s - When the World Changed
Total Mastery of the Internet
ThinThread and Trailblazer
The Snowden Disclosures
Knowledge Is Power
Hacking the Spooks
Cyber Weapons: A Pandora's Box
Cyber Threats: What You Need to Know
The Blurred Line Between State and Corporate
Chapter 5 Corporations
Nothing Comes for Free . . .
Blurred Lines
The Ongoing Issue of Net Neutrality
The Battle Between Lobbyists and Government
The Trickle-Down Effect
Corporate Threats and Opportunities for SMEs
Sustainability: A Key Battleground
Different Approaches to Our Tech Evolution
What Does the Future Hold?
Chapter 6 Criminals
The Sophistication of Digital Crime
What Is the Scale of the Problem?
Why Should This Matter to You?
LOVEINT: Where Criminals and Law Enforcement Meet
Awareness Is Essential for Protection
How Is Cyber Crime Being Tackled?
Cyber Criminal or Hacktivist? Who Decides?
Chapter 7 Media Control
The Evolution of Media Control
Manipulating the Press.
The Power of Press Reports
Modern Media Censorship
Striking the Right Balance
Who Really Has Control?
Chapter 8 Cyber Warfare
What Is Cyber Warfare?
What Infrastructure Is Vulnerable to a Cyber Attack?
Cyber Propaganda
Who Are the Key Players in Cyber Warfare?
Cyber Warfare Goes Beyond Nation States
Are We Prepared?
Part III Solutions
Chapter 9 Individuals
Awareness Is the First Step
Countermeasure #1: Open-Source Software
Countermeasure #2: Open-Source Web Browsers
Countermeasure #3: Email Encryption Programs
Countermeasure #4: Privacy-Focused Search Engines
Countermeasure #5: Tor (The Onion Router)
Countermeasure #6: Secure, Non-Proprietary Operating Systems
Countermeasure #7: Virtual Privacy Network (VPN)
Digital Empowerment
What About Smartphones?
What About Smart Home Devices and the Hardware Itself?
Privacy and Tech Can Go Hand in Hand
Chapter 10 Corporate
Why Do Businesses Need to Take This Seriously?
Countermeasure: Open-Source Software
Business Reputation: What Is Worth Fighting For?
Secure Online Communication
What Can Big Corporations Do to Redress the Balance?
What About Businesses Buying This Tech?
Why Do So Few Businesses Consider Open-Source Software?
The Business Case for Open-Source
Do Not Forget About Physical Security
The Business Opportunities in Open-Source and Better Data Security
Countermeasure: Blockchain Technology
Chapter 11 Government
Government Action Has Become Imperative
Reaching a Fork in the Road
A Question of Knowledge
How Can Governments Redress the Balance?
Education Is the Key
Countermeasure: Promote Tech Experimentation in Educational Settings
Creating a Cultural Shift
The Driving Forces in Cultural Change
Chapter 12 Utopia or Dystopia?
The Move Toward the Metaverse.
Quantum Computing: A Game Changer
It Is Time for Governments to Wake Up
Education: The Binding Thread
The Time to Act Is Now
Notes
About the Author
Index
EULA.
Notes:
Description based on print version record.
Other Format:
Print version: Machon, Annie The Privacy Mission
ISBN:
9781119906971
1119906970
9781119906988
1119906989
OCLC:
1343205133

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account