1 option
The privacy mission : achieving ethical data for our lives online / Annie Machon.
- Format:
- Book
- Author/Creator:
- Machon, Annie, author.
- Language:
- English
- Subjects (All):
- Data privacy.
- Internet--Moral and ethical aspects.
- Internet.
- Physical Description:
- 1 online resource (243 pages)
- Place of Publication:
- Hoboken, NJ : John Wiley & Sons, Inc., [2022]
- Summary:
- "The subject of data ethics has never been more urgent. This is no longer an academic or niche geek issue as it has been since the inception of the internet and the world wide web. Data ethics is an issue that affects all our lives as we have been forced by covid to live increasingly online. Who controls access to the hardware, who runs the software, who can spy on us, hack us, data farm us? What are the threats that we need to mitigate against democratically, societally and personally? How can corporations protect us rather than predate on us, and how can that help their bottom line? In this book I aim to summarise both the overarching concepts and principles about why this is important, and offer practical solutions for companies, policy makers, academia and individuals to push back against these known threats and also try to future proof themselves going forward. This is information we all need to know and apply as technology accelerates exponentially"-- Provided by publisher.
- Contents:
- Cover
- Title Page
- Copyright Page
- Contents
- Acknowledgements
- Introduction
- Untangling the World Wide Web
- Education for an Empowered Future
- Part I Privacy and Why We Should Care
- Chapter 1 Our Human Rights Online
- Why Does This Matter Now?
- The Privacy Versus Security Debate
- Why Should I Worry About My Online Privacy If I Have Nothing to Hide?
- The Consequences of Digital Convenience
- Carrying Out Your Own Risk Assessment
- Follow the Leader
- Chapter 2 Gamekeeper Turned Poacher
- Chapter 3 How Did We Get Here?
- You and Your Data Are the Product
- Social Media Has "Groomed" Society
- Open-Source Software Is the Antidote
- We Are Still Living in the "Wild West"
- You Have More Power Than You Think
- What World Do You Want to Live In?
- Part II The Dark Triad
- Chapter 4 Spooks
- The 1990s - When the World Changed
- Total Mastery of the Internet
- ThinThread and Trailblazer
- The Snowden Disclosures
- Knowledge Is Power
- Hacking the Spooks
- Cyber Weapons: A Pandora's Box
- Cyber Threats: What You Need to Know
- The Blurred Line Between State and Corporate
- Chapter 5 Corporations
- Nothing Comes for Free . . .
- Blurred Lines
- The Ongoing Issue of Net Neutrality
- The Battle Between Lobbyists and Government
- The Trickle-Down Effect
- Corporate Threats and Opportunities for SMEs
- Sustainability: A Key Battleground
- Different Approaches to Our Tech Evolution
- What Does the Future Hold?
- Chapter 6 Criminals
- The Sophistication of Digital Crime
- What Is the Scale of the Problem?
- Why Should This Matter to You?
- LOVEINT: Where Criminals and Law Enforcement Meet
- Awareness Is Essential for Protection
- How Is Cyber Crime Being Tackled?
- Cyber Criminal or Hacktivist? Who Decides?
- Chapter 7 Media Control
- The Evolution of Media Control
- Manipulating the Press.
- The Power of Press Reports
- Modern Media Censorship
- Striking the Right Balance
- Who Really Has Control?
- Chapter 8 Cyber Warfare
- What Is Cyber Warfare?
- What Infrastructure Is Vulnerable to a Cyber Attack?
- Cyber Propaganda
- Who Are the Key Players in Cyber Warfare?
- Cyber Warfare Goes Beyond Nation States
- Are We Prepared?
- Part III Solutions
- Chapter 9 Individuals
- Awareness Is the First Step
- Countermeasure #1: Open-Source Software
- Countermeasure #2: Open-Source Web Browsers
- Countermeasure #3: Email Encryption Programs
- Countermeasure #4: Privacy-Focused Search Engines
- Countermeasure #5: Tor (The Onion Router)
- Countermeasure #6: Secure, Non-Proprietary Operating Systems
- Countermeasure #7: Virtual Privacy Network (VPN)
- Digital Empowerment
- What About Smartphones?
- What About Smart Home Devices and the Hardware Itself?
- Privacy and Tech Can Go Hand in Hand
- Chapter 10 Corporate
- Why Do Businesses Need to Take This Seriously?
- Countermeasure: Open-Source Software
- Business Reputation: What Is Worth Fighting For?
- Secure Online Communication
- What Can Big Corporations Do to Redress the Balance?
- What About Businesses Buying This Tech?
- Why Do So Few Businesses Consider Open-Source Software?
- The Business Case for Open-Source
- Do Not Forget About Physical Security
- The Business Opportunities in Open-Source and Better Data Security
- Countermeasure: Blockchain Technology
- Chapter 11 Government
- Government Action Has Become Imperative
- Reaching a Fork in the Road
- A Question of Knowledge
- How Can Governments Redress the Balance?
- Education Is the Key
- Countermeasure: Promote Tech Experimentation in Educational Settings
- Creating a Cultural Shift
- The Driving Forces in Cultural Change
- Chapter 12 Utopia or Dystopia?
- The Move Toward the Metaverse.
- Quantum Computing: A Game Changer
- It Is Time for Governments to Wake Up
- Education: The Binding Thread
- The Time to Act Is Now
- Notes
- About the Author
- Index
- EULA.
- Notes:
- Description based on print version record.
- Other Format:
- Print version: Machon, Annie The Privacy Mission
- ISBN:
- 9781119906971
- 1119906970
- 9781119906988
- 1119906989
- OCLC:
- 1343205133
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.