Catalog Search Results
Author
Language
English
Description
"April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, explores the most common types of data being collected about individuals today and delve into how it is being used-sometimes against us-by the private sector, the government, and even our employers and schools"--
Author
Language
English
Description
"The essential road map for understanding-and defending-your right to privacy in the twenty-first century. Privacy is disappearing. From our sex lives to our workout routines, the details of our lives once relegated to pen and paper have joined the slipstream of new technology. As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights advocate Danielle Citron has spent decades working with lawmakers...
Author
Language
English
Formats
Description
"The surprising story of the fitful development of the right to privacy-and its battle against the public's right to know--across American history. There is no hotter topic than the desire to constrain tech companies like Facebook from exploiting our personal data, or to keep Alexa from spying on you. Privacy has also provoked constitutional crisis (presidential tax returns) while Justice Clarence Thomas seeks to remove the protection of journalists...
Author
Pub. Date
2023.
Language
English
Description
"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by...
Author
Language
English
Description
"In this riveting feat of reporting, Kashmir Hill illuminates the improbable rise of Clearview AI and how Hoan Ton-That, a computer engineer and Richard Schwartz, a Giuliani associate, launched a terrifying facial recognition app with society-altering potential. They were assisted by a cast of controversial characters, including conservative provocateur Charles Johnson and billionaire Trump backer Peter Thiel. The app can scan a blurry portrait, and,...
Author
Publisher
Adams Media
Pub. Date
2019.
Language
English
Description
"We all know that the Internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store--and even you have the ability to unknowingly reveal your private information to everyone...
Author
Publisher
Knopf Doubleday Publishing Group
Pub. Date
2015
Language
English
Formats
Description
One woman's quest to discover the truth behind her husband's death will pit her against a new generation of cutting-edge surveillance technology and the most dangerous conspiracy in America—Invasion of Privacy is the riveting, new standalone suspense novel from New York Times bestselling author Christopher Reich.
On a remote, dusty road forty miles outside of Austin, Texas,...
On a remote, dusty road forty miles outside of Austin, Texas,...
Publisher
The Great Courses
Pub. Date
2016.
Language
English
Description
Because our privacy laws are so far behind today’s technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other.
Author
Publisher
Rowman & Littlefield
Pub. Date
[2014]
Language
English
Description
Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection, while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Theresa M. Payton and Theodore Claypoole skillfully introduce readers to the many ways we are "watched" and how to change behaviors and activities...
Author
Pub. Date
2013.
Language
English
Description
When Mae Holland is hired to work for the Circle, the world's most powerful internet company, she feels she's been given the opportunity of a lifetime. Run out of a sprawling California campus, the company links users' personal emails, social media, banking, and purchasing with their universal operating system, resulting in one online identity and a new age of civility and transparency. As Mae tours the open-plan office spaces, the towering glass...
Author
Publisher
Melville House
Pub. Date
[2021]
Language
English
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
Author
Publisher
linkedin.com
Pub. Date
2023.
Language
English
Description
Get ready to tackle the second domain of the Certified Information Privacy Manager (CIPM) certification exam.
Are you preparing to get certified as a professional information privacy manager? This course, part of a seven-course cert prep series, provides you with all the detailed information you need to get ready for the Privacy Program Framework domain of the Certified Information Privacy Manager (CIPM) exam. Join instructor Mike Chapple as he takes...
Author
Publisher
linkedin.com
Pub. Date
2023.
Language
English
Description
Get ready to tackle the first domain of the Certified Information Privacy Manager (CIPM) certification exam.
Are you preparing to get certified as a professional information privacy manager? This course, part of a seven-course cert prep series, provides you with all the detailed information you need to get ready for the Privacy Program Development domain of the Certified Information Privacy Manager (CIPM) exam. Join instructor Mike Chapple as he...
Author
Publisher
linkedin.com
Pub. Date
2017.
Language
English
Description
Protect your customers, your employees, and your organization. Create a successful privacy program by building privacy into the very foundation of your company culture.
Every news cycle, we seem to hear about another privacy-related problem, whether it's a data breach, a controversial policy, or the launch of a product that collects personal information. Privacy is on the minds of investors, customers, and employees. As we enter the next phase of...
Author
Publisher
linkedin.com
Pub. Date
2023.
Language
English
Description
Discover the many Internet of Things (IoT) devices that can pose a risk to our privacy, and how standards, regulations, and proper device selection can help ensure data privacy.
The Internet of Things (IoT) connects people, infrastructures, and things to improve our lives and enhance production of goods and services. The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our...
Author
Publisher
linkedin.com
Pub. Date
2020.
Language
English
Description
Explore the current privacy landscape. Learn how to collect and manage data in line with privacy best practices, and discover how to properly classify and inventory data.
Companies often collect customer data with third parties to enable better products and growing engagement, as well as for safety reasons. But users expect—and deserve—that their information is handled with great care. In this course, instructor Nishant Bhajaria steps through...
Author
Publisher
linkedin.com
Pub. Date
2020.
Language
English
Description
Balance growth with trust. Learn how to share data with appropriate privacy controls, including how to use k-anonymity and l-diversity to protect your users' information.
Data sharing is vital for online businesses. Companies share user data with vendors to help grow their business, boost user engagement, and personalize their products. In addition, companies often have to share data with governments and other regulatory bodies for compliance reasons....
Author
Publisher
linkedin.com
Pub. Date
2022.
Language
English
Description
Explore the fundamentals of implementing the NIST Privacy Framework and managing security risks faced by your organization.
These days, a large-scale security breach seems to be an almost-daily occurrence. Standing in the balance is the personal information of millions of people, alongside the private records of your entire organization. Losses incurred by a security breach can spell disaster, but you can always do more to mitigate the risk. In this...
Author
Publisher
linkedin.com
Pub. Date
2020.
Language
English
Description
Grow your business and meet the challenges of modern security. Develop a privacy program to manage risk, provide solutions, and inform decision-making at an executive level.
Privacy is top of mind for all of today's business leaders, because it is getting attention from regulators, media, privacy activists, and customers. However, amid a profusion of laws, product offerings by vendors, and media coverage, executives often struggle to get clear guidance...
In Marina
Didn't find what you need? Items that were published more than six months ago and which are not owned by AACPL can be requested from other Marina libraries in Maryland.
Didn't find a newly published title?
Looking for a title that was published in the past six months? You can submit a purchase suggestion. Please do not submit purchase suggestions for titles that have not yet been published. Submit Request