Privacy and data protection Books

199 products


  • The Seven Veils of Privacy: How Our Debates About

    Manchester University Press The Seven Veils of Privacy: How Our Debates About

    1 in stock

    Book SynopsisPrivacy is one of the most contested concepts of our time. This book sets out a rigorous and comprehensive framework for understanding debates about privacy and our rights to it. Much of the conflict around privacy comes from a failure to recognise divergent perspectives. Some people argue about human rights, some about social conventions, others about individual preferences and still others about information and data processing. As a result, ‘privacy’ has become the focus of competing definitions, leading some to denounce the ‘disarray’ in the field. But as this book shows, disagreements about the role and value of privacy obscure a large amount of agreement on the topic. Privacy is not a technical term of law, cybersecurity or sociology, but a word in common use that adequately expresses a few simple and related ideas.Trade Review‘An impressively thorough and systematic – but always accessible – analysis. O'Hara sorts and sifts the different claims for what is and what is not “privacy”. O Privacy, what crimes are committed in thy name! But O'Hara! What fun you've had finding a way through the muddles and misunderstandings to establish a common language for discussing privacy. I wish I'd had access to Kieron O'Hara's excellent survey when I started out as UK Information Commissioner back in 2009. O'Hara's razor should help us to approach debates around public policy on their own merits, avoiding using “privacy” as a mere label either to support or oppose particular causes or proposals.”Christopher Graham, UK Information Commissioner, 2009–16‘O’Hara gives us a refreshingly provocative, learned, distinctive and lively book about privacy that will stimulate important debates. The vast, unwieldy body of privacy scholarship is seen through new lenses, bringing seven different levels of privacy discourse into focus. Each one veils the meaning of privacy, but all contribute to a new framework that helps to make sense of the supposed “chaos” of this subject. Illustrative discussions of seven important privacy topics and debates are related to the sevenfold framework. O’Hara’s examples and personal style keep the reader in mind along the intricate trail of de (or re)constructive analysis, and a fascinating conclusion affords important insights into privacy by refracting the analysis through the COVID-19 pandemic experience.’Charles Raab, Professor Emeritus, University of Edinburgh‘How should we talk about privacy? Before you answer that question, read this book. The seven veils of privacy is deep and erudite, yet accessible and even humorous. O’Hara takes us on a deeply researched and compelling journey through the points of disagreement in our privacy discourse. This book helps us understand why we keep talking past each other and how to have a more productive conversation about one of the most critical values of our time.’Woodrow Hartzog, Professor of Law, Boston University and author of Privacy’s Blueprint: The Battle to Control the Design of New Technologies -- .Table of ContentsIntroduction: the goal of this bookPart I: A concept in disarray?Part II: Explaining the disarrayPart III: A framework for privacy discoursesPart IV: Commentary on the frameworkPart V: Topics in privacy studiesConclusion: privacy in the time of COVIDIndex

    1 in stock

    £76.50

  • Hacking Artificial Intelligence: A Leader's Guide

    Rowman & Littlefield Hacking Artificial Intelligence: A Leader's Guide

    Out of stock

    Book SynopsisSheds light on the ability to hack AI and the technology industry's lack of effort to secure it.

    Out of stock

    £27.00

  • Privacy in the Age of Big Data: Recognizing

    Rowman & Littlefield Privacy in the Age of Big Data: Recognizing

    Out of stock

    Book SynopsisA thorough update to a classic in the field of privacy and big data. We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet.The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people’s sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year.People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end.These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of “contactless everything” became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don’t know how.The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future. While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven’t in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.

    Out of stock

    £27.00

  • Hybridity, Conflict, and the Global Politics of

    Rowman & Littlefield Hybridity, Conflict, and the Global Politics of

    Out of stock

    Book SynopsisCyberspace has become the ultimate frontier and central issue of international conflict, geopolitical competition, and security. Emerging threats and technologies continuously challenge the prospect of an open, secure, and free cyberspace. Additionally, the rising influence of technology on society and culture increasingly pushes international diplomacy to establish responsible state behavior in cyberspace and internet governance toward fragmentation and polarization. In this context, novel normative practices and actors are emerging both inside and outside the conventional sites of international diplomacy and global governance. In Hybridity, Conflict, and the Global Politics of Cybersecurity, Fabio Cristiano and Bibi van den Berg explore the hybridity and conflict inherent to these recent processes of remodulation of the global politics of cybersecurity by analyzing emerging normative practices, threats and technologies, and actors. Through this comprehensive analysis, this edited volume ultimately sheds light on the problematic logic of emergence that informs the global politics of cybersecurity and delineates novel normative paths for cyberspace moving forward. Table of ContentsAcknowledgementsChapter 1: Hybridity and Conflict in Cyberspace: Rethinking the Emergent Character of International Cybersecurity by Fabio Cristiano & Bibi van den BergPart I: Emerging Normative PracticesChapter 2: The New Era of Internet Governance: Technical Fragmentation and Digital Sovereignty Entanglements by Roxana Radu & Giovanni De GregorioChapter 3: Is International Law Fading Away in State Practice on Cyber Operations? by François DelerueChapter 4: The Hybrid Role of the Big Tech Companies and the Impact of Courts on the Making of Cyber Norms by Jan Martin LemnitzerPart II: Emerging Threats and TechnologiesChapter 5: Disinformation Campaigns and Norms of Emergency Communication in Cyberspace by Taylor GrossmanChapter 6: Influence Operations in Cyberspace: How They Really Work by Peter Pijpers & Paul DucheineChapter 7: The Challenges Associated with AI’s Military Innovation: Examining Practitioner Perspectives in the United Kingdom by Amy ErtanPart III: Emerging ActorsChapter 8: The European Normative Venture for ‘Technological Sovereignty’ in Cyberspace by Cedric AmonChapter 9: Views From the Middle: Analysing the Positions of India, Indonesia, and South Africa on Cybersecurity at the UN OEWG by Irene Poetranto, Josh Gold, & Justin LauChapter 10: Will India Negotiate? The Politics of Multilateral Engagement for Fostering Responsible State Behaviour in Cyberspace by Arindrajit Basu & Karthik NachiappanChapter 11: The Hybrid Place: Civil Society in the Open-Ended Working Group by André Barrinha & Louise Marie HurelIndexAbout the Editors and Contributors

    Out of stock

    £76.50

  • The Future of Hacking

    Bloomsbury Academic The Future of Hacking

    15 in stock

    Book Synopsis

    15 in stock

    £23.75

  • We See It All: Liberty and Justice in an Age of

    PublicAffairs We See It All: Liberty and Justice in an Age of

    10 in stock

    Book Synopsis

    10 in stock

    £21.00

  • The Perfect Police State: An Undercover Odyssey

    PublicAffairs,U.S. The Perfect Police State: An Undercover Odyssey

    15 in stock

    Book SynopsisAn in-depth, on-the ground view of how Chinese officials have co-opted technology, infrastructure and the minds of their people to establish the definitive police state.When blocked from facts and truth, and constantly under surveillance, most citizens cannot discern between enemy and friend and don't have the information they need to challenge the government. Society quickly breaks down. Friends betray each other, bosses snitch on employees, teachers rat on their students, and children turn on their parents. Everyone must turn to their government for protection. even if the government is not their true protector. This is the Perfect Police State, and China has created one. In The Perfect Police State Geoffrey Cain, an Asia-based reporter, recounts his travels and investigations into the multifaceted and comprehensive surveillance network in the Western Chinese province of Xinjiang. Drawing on first-hand testimony, and one citizen's tumultuous life and escape from Xinjiang, Cain describes the emergence of China's tech surveillance giants, and the implications for our global order, in an age of Covid-19 and police brutality protests. What results is a vivid and haunting investigation into how China established an effective and enduring technological dystopia.

    15 in stock

    £22.50

  • The New Press Bombs and Bandwidth: The Emerging Relationship

    Out of stock

    Book SynopsisFor governments and businesses, social movements, criminal organizations and terrorists alike, Information technology has become central to the way groups organize themselves and pursue global objectives. With the emergence of the Internet and new digital technologies - and particularly in the post-9/11 era of "homeland security" - the relationship between IT and security has found a new and pressing relevance. Here, a collection of scholars explores the ways IT has made traditional boundaries increasingly irrelevant, challenging traditional concepts of privacy, surveillance, vulnerability and above all, security.

    Out of stock

    £37.95

  • Building Internet Firewalls 2e

    O'Reilly Media Building Internet Firewalls 2e

    Out of stock

    Book SynopsisIn the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: * Firewall technologies: packet filtering, proxying, network address translation, virtual private networks * Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls * Issues involved in a variety of new Internet services and protocols through a firewall * Email and News * Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) * File transfer and sharing services such as NFS, Samba * Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 * Real-time conferencing services such as ICQ and talk * Naming and directory services (e.g., DNS, NetBT, the Windows Browser) * Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); * Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) * Intermediary protocols (e. g., RPC, SMB, CORBA, IIOP) * Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.Table of ContentsPreface I. Network Security 1. Why Internet Firewalls? What Are You Trying to Protect? What Are You Trying to Protect Against? Who Do You Trust? How Can You Protect Your Site? What Is an Internet Firewall? Religious Arguments 2. Internet Services Secure Services and Safe Services The World Wide Web Electronic Mail and News File Transfer, File Sharing, and Printing Remote Access Real-Time Conferencing Services Naming and Directory Services Authentication and Auditing Services Administrative Services Databases Games 3. Security Strategies Least Privilege Defense in Depth Choke Point Weakest Link Fail-Safe Stance Universal Participation Diversity of Defense Simplicity Security Through Obscurity II. Building Firewalls 4. Packets and Protocols What Does a Packet Look Like? IP Protocols Above IP Protocols Below IP Application Layer Protocols IP Version 6 Non-IP Protocols Attacks Based on Low-Level Protocol Details 5. Firewall Technologies Some Firewall Definitions Packet Filtering Proxy Services Network Address Translation Virtual Private Networks 6. Firewall Architectures Single-Box Architectures Screened Host Architectures Screened Subnet Architectures Architectures with Multiple Screened Subnets Variations on Firewall Architectures Terminal Servers and Modem Pools Internal Firewalls 7. Firewall Design Define Your Needs Evaluate the Available Products Put Everything Together 8. Packet Filtering What Can You Do with Packet Filtering? Configuring a Packet Filtering Router What Does the Router Do with Packets? Packet Filtering Tips and Tricks Conventions for Packet Filtering Rules Filtering by Address Filtering by Service Choosing a Packet Filtering Router Packet Filtering Implementations for General-Purpose Computers Where to Do Packet Filtering What Rules Should You Use? Putting It All Together 9. Proxy Systems Why Proxying? How Proxying Works Proxy Server Terminology Proxying Without a Proxy Server Using SOCKS for Proxying Using the TIS Internet Firewall Toolkit for Proxying Using Microsoft Proxy Server What If You Can't Proxy? 10. Bastion Hosts General Principles Special Kinds of Bastion Hosts Choosing a Machine Choosing a Physical Location Locating Bastion Hosts on the Network Selecting Services Provided by a Bastion Host Disabling User Accounts on Bastion Hosts Building a Bastion Host Securing the Machine Disabling Nonrequired Services Operating the Bastion Host Protecting the Machine and Backups 11. Unix and Linux Bastion Hosts Which Version of Unix? Securing Unix Disabling Nonrequired Services Installing and Modifying Services Reconfiguring for Production Running a Security Audit 12. Windows NT and Windows 2000 Bastion Hosts Approaches to Building Windows NT Bastion Hosts Which Version of Windows NT? Securing Windows NT Disabling Nonrequired Services Installing and Modifying Services III. Internet Services 13. Internet Services and Firewalls Attacks Against Internet Services Evaluating the Risks of a Service Analyzing Other Protocols What Makes a Good Firewalled Service? Choosing Security-Critical Programs Controlling Unsafe Configurations 14. Intermediary Protocols Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) NetBIOS over TCP/IP (NetBT) Common Internet File System (CIFS) and Server Message Block (SMB) Common Object Request Broker Architecture (CORBA) and Internet Inter-Orb Protocol (IIOP) ToolTalk Transport Layer Security (TLS) and Secure Socket Layer (SSL) The Generic Security Services API (GSSAPI) IPsec Remote Access Service (RAS) Point-to-Point Tunneling Protocol (PPTP) Layer 2 Transport Protocol (L2TP) 15. The World Wide Web HTTP Server Security HTTP Client Security HTTP Mobile Code and Web-Related Languages Cache Communication Protocols Push Technologies RealAudio and RealVideo Gopher and WAIS 16. Electronic Mail and News Electronic Mail Simple Mail Transfer Protocol (SMTP) Other Mail Transfer Protocols Microsoft Exchange Lotus Notes and Domino Post Office Protocol (POP) Internet Message Access Protocol (IMAP) Microsoft Messaging API (MAPI) Network News Transfer Protocol (NNTP) 17. File Transfer, File Sharing, and Printing File Transfer Protocol (FTP) Trivial File Transfer Protocol (TFTP) Network File System (NFS) File Sharing for Microsoft Networks Summary of Recommendations for File Sharing Printing Protocols Related Protocols 18. Remote Access to Hosts Terminal Access (Telnet) Remote Command Execution Remote Graphical Interfaces 19. Real-Time Conferencing Services Internet Relay Chat (IRC) ICQ talk Multimedia Protocols NetMeeting Multicast and the Multicast Backbone (MBONE) 20. Naming and Directory Services Domain Name System (DNS) Network Information Service (NIS) NetBIOS for TCP/IP Name Service and Windows Internet Name Service The Windows Browser Lightweight Directory Access Protocol (LDAP) Active Directory Information Lookup Services 21. Authentication and Auditing Services What Is Authentication? Passwords Authentication Mechanisms Modular Authentication for Unix Kerberos NTLM Domains Remote Authentication Dial-in User Service (RADIUS) TACACS and Friends Auth and identd 22. Administrative Services System Management Protocols Routing Protocols Protocols for Booting and Boot-Time Configuration ICMP and Network Diagnostics Network Time Protocol (NTP) File Synchronization Mostly Harmless Protocols 23. Databases and Games Databases Games 24. Two Sample Firewalls Screened Subnet Architecture Merged Routers and Bastion Host Using General-Purpose Hardware IV. Keeping Your Site Secure 25. Security Policies Your Security Policy Putting Together a Security Policy Getting Strategic and Policy Decisions Made What If You Can't Get a Security Policy? 26. Maintaining Firewalls Housekeeping Monitoring Your System Keeping up to Date How Long Does It Take? When Should You Start Over? 27. Responding to Security Incidents Responding to an Incident What to Do After an Incident Pursuing and Capturing the Intruder Planning Your Response Being Prepared V. Appendixes A. Resources B. Tools C. Cryptography Index

    Out of stock

    £47.99

  • AHS Internet Password Logbook

    Cool Springs Press AHS Internet Password Logbook

    15 in stock

    15 in stock

    £9.49

  • Serious Cryptography: A Practical Introduction to

    No Starch Press,US Serious Cryptography: A Practical Introduction to

    1 in stock

    Book SynopsisSerious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related toTrade Review“A superb introduction to modern encryption and cryptography. For those looking to quickly get up to speed on the topics, this makes for an excellent go-to guide.”—Ben Rothke, RSA Conference“It's really a love letter to cryptography.”—Nadim Kobeissi“For those who really want to understand how cryptography works, and who need to use it in practice, I thoroughly recommend Serious Cryptography.”—Martijn Grooten, Virus Bulletin“Impressive in its breadth...the state of the art in applied cryptography is distilled here in a mere 282 pages.”—Federico Lucifredi, The Hub“Aumasson successfully ensures that the reader has a strong understanding of cryptography’s core ideas... Serious Cryptography is a must read for anyone wanting to enter cryptographic engineering.”—Infosecurity Magazine“Each chapter not only explains concepts and key implementation details, but also highlights possible pitfalls, common mistakes, and finishes with a list of recommended materials.”—Artificial Truth"Jean-Philippe Aumasson's Serious Cryptography is a classic (and serious) introduction to the field."—Mary Branscombe, ZDNet"It's advanced but the best book I've ever read for PKI is Serious Cryptography by Aumasson. Probably don't want to start with it but if you get serious you'll want to read it."—Chris Sandvick, @ChrisSandvick"My favorite reference."—Colin O'Flynn, Circuit Cellar"For those wanting to go beyond the basics of cryptography in the blockchain, 'Serious Cryptography' by Jean-Philippe Aumasson is an invaluable resource."—Halborn SecurityTable of ContentsForeword by Matthew D. GreenPrefaceAbbreviationsChapter 1: EncryptionChapter 2: RandomnessChapter 3: Cryptographic SecurityChapter 4: Block CiphersChapter 5: Stream CiphersChapter 6: Hash FunctionsChapter 7: Keyed HashingChapter 8: Authenticated EncryptionChapter 9: Hard ProblemsChapter 10: RSAChapter 11: Diffie–HellmanChapter 12: Elliptic CurvesChapter 13: TLSChapter 14: Quantum and Post-QuantumIndex

    1 in stock

    £35.99

  • Surviving Cyberwar

    Government Institutes Inc.,U.S. Surviving Cyberwar

    Out of stock

    Book SynopsisMilitary and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: ·begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; ·follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; ·moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; ·provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and ·finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs. Trade ReviewRichard Stiennon's Surviving Cyberwar is not only a valuable primer on the alarmingly advanced state of the art of cyber conflict but a much-needed guide for companies, governments, and others on how to think about protecting themselves. -- Joseph Menn, author of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet.Table of ContentsChapter 1 Titan Rain and Shawn Carpenter Chapter 2 The Red Wars Chapter 3 Countering Cyber Espionage Chapter 4 Toppling Email Servers Chapter 5 The Pentagon Chapter 6 Geopolitical Cyber Hotspots Chapter 7 DDoS Defense Chapter 8 Crowd Sourcing Cyber Attacks Chapter 9 Oh Estonia Chapter 10 Cyberwar Cuts a Swath through Eastern Europe Chapter 11 Georgia: The First Cyberwar Chapter 12 Conflict Causes Change Chapter 13 Four Pillars of Cyberwar Chapter 14 Cyber Preparedness Chapter 15 Repercussions

    Out of stock

    £71.10

  • Surviving Cyberwar

    Government Institutes Inc.,U.S. Surviving Cyberwar

    Out of stock

    Book SynopsisMilitary and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: ·begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; ·follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; ·moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; ·provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and ·finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs. Trade ReviewRichard Stiennon's Surviving Cyberwar is not only a valuable primer on the alarmingly advanced state of the art of cyber conflict but a much-needed guide for companies, governments, and others on how to think about protecting themselves. -- Joseph Menn, author of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet.Table of ContentsChapter 1 Titan Rain and Shawn Carpenter Chapter 2 The Red Wars Chapter 3 Countering Cyber Espionage Chapter 4 Toppling Email Servers Chapter 5 The Pentagon Chapter 6 Geopolitical Cyber Hotspots Chapter 7 DDoS Defense Chapter 8 Crowd Sourcing Cyber Attacks Chapter 9 Oh Estonia Chapter 10 Cyberwar Cuts a Swath through Eastern Europe Chapter 11 Georgia: The First Cyberwar Chapter 12 Conflict Causes Change Chapter 13 Four Pillars of Cyberwar Chapter 14 Cyber Preparedness Chapter 15 Repercussions

    Out of stock

    £43.20

  • Social Security Numbers & ID Theft

    Nova Science Publishers Inc Social Security Numbers & ID Theft

    1 in stock

    Book SynopsisThis book explores the use of Social Security Numbers (SSN) and Identity Theft. The SSN was created in 1936 for the purpose of tracking workers'' earnings for benefits purposes. Since that time, however, SSN usage has expanded to encompass a myriad of purposes well beyond the operation of the Social Security system. This book describes how criminals acquire SSNs and how they use them to commit identity theft. How organisations such as financial institutions, insurers, universities, health care entities, government agencies, and innumerable other organisations use this nine-digit sequence as a default identifier is also examined. Furthermore, existing statutes, regulations and private sector efforts designed to protect SSNs are looked at, including data security and data breach notification laws. This book concludes with specific FTC recommendations, which address both the supply and demand aspects of the SSN problem by proposing actions that would make SSNs less available to identify thieves, and would make it more difficult for them to misuse those SSNs they are able to obtain. This is an edited, excerpted and augmented edition of a Federal Trade Commission and GAO publication.

    1 in stock

    £92.99

  • Privacy: An Overview of Federal Law Governing

    Nova Science Publishers Inc Privacy: An Overview of Federal Law Governing

    1 in stock

    Book Synopsis

    1 in stock

    £80.24

  • Exploding Data: Reclaiming Our Cyber Security in

    Grove Press / Atlantic Monthly Press Exploding Data: Reclaiming Our Cyber Security in

    15 in stock

    Book SynopsisA powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security.The most dangerous threat we-individually and as a society-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack. In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data-more widespread by business than by government, and impossible to stop-should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analysed or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not only the simple loss of privacy, which is almost impossible to protect, but also that of individual autonomy-the ability to make personal choices free of manipulation or coercion. Offering colourful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today and charts a forceful new strategy that balances the needs of government, business and individuals alike.Trade ReviewEssential reading for leaders, legislators and those committed to preserving the balance between individual empowerment and individual freedom in the latest phase of our digital age. -- Rt Hon Lord (John) Reid, former UK Home Secretary and Secretary of State for DefenceMichael Chertoff provides an eye-opening account of just how effectively our personal data is being harvested by the private sector and how it can be used to manipulate us by hostile groups and governments. As a former Homeland Security Secretary and a distinguished lawyer his warnings, and advice on sensible steps that could be taken now to manage the risks, carry great weight. -- Sir David Omand, former Director of GCHQ/former UK Security and Intelligence CoordinatorThis important book offers highly intelligent commentary, of a kind I have not read elsewhere, on the challenges posed by the technology revolution and the accompanying 'explosion' of data...a 'must read' for experts and the general public alike. -- Sir John Scarlett, Chief of the Secret Intelligence Service (MI6) 2004-2009Important and insightful...an authoritative guide to understanding the legal and security challenges posed by the rapidly evolving digitally driven cyber landscape. * Washington Times *...works as both a Big Data primer and a clear-sighted road map for legislative changes * Publishers Weekly *A serious but accessible book on an important subject that affects us all. * Booklist *Few people - maybe only Michael Chertoff - could write a book like this. It combines his unique experience as Federal prosecutor, judge, assistant attorney general on 9/11 and then Secretary of Homeland Security to describe in layman's language the ubiquity of 'digital exhaust' we leave for others to learn about us and lawfully or unlawfully track us. This must-read book describes the barriers to 'opting out' and the need to modernise legal authorities if we are to protect both security and privacy. -- Jane Harman, CEO of the Wilson Center and former member of U.S. House of Representatives Intelligence and Homeland Security committeesWhen George Orwell wrote 1984, little did he suspect that most of us would willingly carry the tools of our surveillance in our pockets. Michael Chertoff brings his unmatched legal skills and experience to propose tougher restrictions on the use, retention and dissemination of the data that is exploding around us. This important book is a vote for sanity in the midst of chaotic change. -- Joseph S. Nye, Jr., author of THE FUTURE OF POWER

    15 in stock

    £17.00

  • Spies & Snitches: Electronic Privacy Protection &

    Nova Science Publishers Inc Spies & Snitches: Electronic Privacy Protection &

    1 in stock

    Book SynopsisThere is no comprehensive federal privacy statute that protects personal information. Instead, a patchwork of federal laws and regulations govern the collection and disclosure of personal information and has been addressed by Congress on a sector-by-sector basis. Some contend that this patchwork of laws and regulations is insufficient to meet the demands of today''s technology. Congress, the Obama Administration, businesses, public interest groups and citizens are all involved in the discussion of privacy solutions. This book examines some of these efforts with respect to the protection of personal information and provides a brief overview of selected recent developments in the area of federal privacy law.

    1 in stock

    £189.74

  • Microservices Security in Action

    Manning Publications Microservices Security in Action

    15 in stock

    Book SynopsisMicroservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundamentals to secure both the application perimeter and service-to-service communication. Following a hands-on example, readers explore how to deploy and secure microservices behind an API gateway as well as how to access microservices accessed by a single-page application (SPA). Key Features Key microservices security fundamentals Securing service-to-service communication with mTLS and JWT Deploying and securing microservices with Docker Using Kubernetes security Securing event-driven microservices Using the Istio Service Mesh For developers well-versed in microservices design principles who have a basic familiarity with Java. About the technology As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk. Prabath Siriwardena is the vice president of security architecture at WSO2, a company that produces open source software, and has more than 12 years of experience in the identity management and security domain. Nuwan Dias is the director of API architecture at WSO2 and has worked in the software industry for more than 7 years, most of which he spent focusing on the API management domain. Both have helped build security designs for Fortune 500 companies including Boeing, Verizon, Nissan, HP, and GE.

    15 in stock

    £50.39

  • Data Security Breaches: Notification Laws,

    Nova Science Publishers Inc Data Security Breaches: Notification Laws,

    1 in stock

    Book Synopsis

    1 in stock

    £106.49

  • Wiretaps & Electronic Eavesdropping: Federal Law

    Nova Science Publishers Inc Wiretaps & Electronic Eavesdropping: Federal Law

    1 in stock

    Book Synopsis

    1 in stock

    £106.49

  • iRules: What Every Tech-Healthy Family Needs to

    Potter/Ten Speed/Harmony/Rodale iRules: What Every Tech-Healthy Family Needs to

    10 in stock

    Book Synopsis

    10 in stock

    £13.49

  • Consumer Privacy in the 21st Century: Best

    Nova Science Publishers Inc Consumer Privacy in the 21st Century: Best

    2 in stock

    Book SynopsisIn today''s world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers'' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.

    2 in stock

    £146.24

  • Privacy: Select Issues & Laws for the 21st

    Nova Science Publishers Inc Privacy: Select Issues & Laws for the 21st

    2 in stock

    Book SynopsisThis book is a study of select issues and laws relating to privacy in the 21st century. Topics examined include an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA); background and issues related to the USA PATRIOT Act reauthorisation on government collection of private information; the United States v. Jones court case involving GPS monitoring, property and privacy; Fourth Amendment implications and legislative responses to drones in domestic surveillance operations; and the privacy and security concerns surrounding smart meter technology.

    2 in stock

    £206.24

  • Data for All

    Manning Publications Data for All

    1 in stock

    Book SynopsisGain in-depth knowledge about how companies manipulate and exploit personal data. A book that does not require particular technical knowledge – just mere curiosity to explore the subject. From tech experts to the general public, Data for All is the ground-breaking guide to help with the ways third parties use personal data. Written by bestselling author John K Thompson, this edition will aid your understanding of areas, such as The types of data you generate with every action, every day Where your data is stored, who controls it, and how much money they make from it How you can manage access and monetisation of your own data Restricting data access to only companies and organisations you want to support The history of how we think about data, and why that is changing The new data ecosystem is being built right now for your benefit About the technology For years, companies have had free rein to use every click, purchase, and “like” you make, to earn money. Now, across the globe, new laws have been written, passed, and are coming into force, giving individuals the right to access, delete, and monetise their own data. This book provides a vision of how you can use these laws, regulations, and services to directly benefit from your data in new and lucrative ways.

    1 in stock

    £35.09

  • A Corporate Librarian's Guide to Information

    Business Expert Press A Corporate Librarian's Guide to Information

    15 in stock

    Book SynopsisWith the expansion of technology and governance, the information governance industry has experienced dramatic and often, sudden changes. Among the most important shifts are the proliferation of data privacy rules and regulations, the exponential growth of data and the need for removing redundant, obsolete, and trivial information and the growing threat of litigation and regulatory fines based on a failure to properly keep records and manage data. At the same time, longstanding information governance standards and best practices exist, which transcend the sudden vicissitudes of the day.This volume focuses on these core IG principles, with an emphasis on how they apply to our target audience, which includes law librarians, legal and research staff and other individuals and departments in both the public and private sectors who engage deeply with regulatory compliance matters.Core topics that will be addressed include: the importance of implementing and maintaining cohesive records management workflows that implement the classic principles of capturing, checking, recording, consolidation, and review; the classic records management principles of Accountability, Transparency, Integrity, Protection, Compliance, Accessibility, Retention and Disposition; and archives Management and the two principles of Providence and Original Order.

    15 in stock

    £21.80

  • Your Data, Their Billions: Unraveling and

    Permuted Press Your Data, Their Billions: Unraveling and

    10 in stock

    Book Synopsis“Big tech” knows all your secrets and sells them to the highest bidder—this guide for the everyday tech user explains how it happens, why it matters, and how to protect yourself and your most precious commodities, your identity and privacy. THE GUIDE TO USING EVERYDAY TECH—FROM GOOGLE SEARCHES AND AMAZON TO GPS AND FACEBOOK—WITH EYES WIDE OPEN. What if somebody knew everything about you? Your . . . • relationships: work, social, and private • family history, finances, and medical records • even your exact location . . . at any time of the day • personal preferences and purchases Somebody does. That somebody is “Big Tech.” Facebook, Google, Amazon, Apple, and Microsoft know more about you than you do. And they make billions of dollars by cashing in on your private data. Our personal data, which Big Tech companies get for free, is the engine that drives the unregulated, free-for-all, Wild West world called the digital marketplace. These corporate giants may bring us information and entertainment, convenience and connection, but they also do a lot of harm by: • threatening our privacy, discovering and disseminating our personal information. • spreading dangerous misinformation from foreign governments and bad actors. • manipulating our behavior, affecting what we see, buy . . . even who we vote for. So, what can we do about it? This eye-opening book provides vital information that has been out of reach to those who need it most—the millions of Facebook, Google, Amazon, Apple, and Microsoft users who have come to love and depend upon these digital products. Veteran consumer advocate Jane Hoffman makes the complex world of Big Tech simple to grasp as she reveals exactly how Big Tech uses—and abuses—your personal information. And she proposes a bold blueprint for reforming these corporate behemoths—including a data dividend. Your Data, Their Billions is a guidebook to everything at stake in our digital society, from Big Tech’s overreach into our daily lives to its practices that threaten our democracy. Knowledge is power—and it starts here.

    10 in stock

    £19.00

  • Cyber Warfare and Terrorism: Concepts,

    Information Science Reference Cyber Warfare and Terrorism: Concepts,

    1 in stock

    Book Synopsis

    1 in stock

    £395.20

  • Privacy: Past, Present, and Future

    Academica Press Privacy: Past, Present, and Future

    2 in stock

    Book SynopsisTop analyst Leslie Gruis’s timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept.All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.

    2 in stock

    £112.50

  • The Privacy Pirates: How Your Privacy is Being

    Academica Press The Privacy Pirates: How Your Privacy is Being

    1 in stock

    Book SynopsisIn The Privacy Pirates, former National Security Agency intelligence officer Dr. Leslie Gruis explains the origins of American privacy and its deep connection to freedom and the American dream. She discusses some of the controversial issues, covering everything from attempts to protect privacy rights—many unsuccessful—to abuses of privacy by large companies and accusations of privacy invasion by the government. All of it is explained in plain language, with humor and clarity, and is accompanied at the start of every chapter by the compelling story of 14-year-old Alice and her family as they attempt to negotiate a modern world full of Privacy Pirates."Your rights are under attack from the Privacy Pirates," says Gruis. "Government intrusion is nothing compared to the things companies like Facebook and Google are getting away with every day." Take the journey with Alice, get informed about your privacy rights, and learn how you, too, can defeat the Privacy Pirates.

    1 in stock

    £22.91

  • Cyber Attack Survival Manual: From Identity Theft

    Weldon Owen Cyber Attack Survival Manual: From Identity Theft

    10 in stock

    Book SynopsisAs we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves.  Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.  But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target - along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.  Packaged in a durable, wipe-clean flexicover with metallic corner-guards, this practical manual withstands heavy-duty use indoors and out.With all the surrounding threats, what better person to prepare the public, than a team of internationally known cybersecurity experts? Nick Selby is a police detective specializing in sharing intelligence and busting cybercriminals. He knows how these crimes happen, who does them, and how to make your life safer. In The Cyber Attack Survival Manual he and a veritable brain trust of experts from the world of intelligence, digital currency, vehicle-hacking, and sophisticated crimeware, share the best techniques for everyone. This indispensable, step-by-step guide to cyber defense includes: Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards and much more. Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, BitCoins, and what they mean to individuals and society at large. Global issues: the NSA, how hackers can crash your car, and is China really planning to crash Google? Crucial to surviving the worst the Internet can throw at you, The Cyber Attack Survival Manual is the must-have book of the 21st century. Think you don’t need this book because, “I have nothing to hide”? Selby and Vescent, along with Eric Olson, Moeed Siddiui, and John Bear, show you why you’re wrong (everyone now has something to hide) - and how lack of security can endanger your finances, your safety, and your reputation.

    10 in stock

    £21.38

  • Online Danger: How to Protect Yourself and Your

    Morgan James Publishing llc Online Danger: How to Protect Yourself and Your

    Out of stock

    Book SynopsisCyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don’t require advanced (or even any) technical knowledge. In this book, cyber security expert, Dr. Eric Cole, provides a layman’s look at how to protect yourself online. Dr. Cole makes the case that everyone is a potential target, not just the rich and famous. And we all have the ability to make it more difficult for cyber criminals to make us their next victim. He explains in plain language how to make your computer safer, protect your email, and guard your online accounts. Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet applies to organizations as well as individuals, and across professions. Doctors, lawyers, and teachers – anyone responsible for safeguarding a client’s or student’s data – will learn something they can use right away. Whether you’re a parent wanting to know how to keep your children safe as they use the Internet, or a senior citizen who doesn’t want to fall prey to an online scammer, or a daily technology user who wants to learn more about how to protect themselves in cyberspace, this book is for you.

    Out of stock

    £12.34

  • IDIC Designs, LLC Small Business Cybersecurity Planning: An Owner's

    1 in stock

    Book Synopsis

    1 in stock

    £6.61

  • The Online World, What You Think You Know and

    Silversmith Press The Online World, What You Think You Know and

    Out of stock

    Book SynopsisEvery Child Who Has Access to a Smartphone, Tablet, Computer, or Video Games is at Risk!But NOW You Can Help Keep Them Safe.Would you ever consider putting your child on a plane and sending them to a foreign country alone? Of course, you wouldn''t. And while that seems like an extreme example...guess what, mom and dad-that''s exactly what you do when you hand your child a device without preparation. There are hundreds of millions of users on any given platform on any given day. Suffice it to say, when you give your child access to the online world, you give the world access to your child."The most dangerous neighborhood for your child to be in is in your own house, online."--Eleanor Gaetan, Director of Public Policy at the National Center on Sexual ExploitationAside from the half-million predators targeting millions upon millions of kids each day, drug dealers, pornography, sextortion, cyberbullying, gaming addiction are all threats to our children. While most experts agree that you should just keep your kids off the internet, in today''s world, that''s almost impossible.Technology will find it''s way into your child''s life and so parents, we must prepare our children for this world so we can keep them healthy and safe.Finally--A Solution Parents Love That Kids Can Live With!This is the first book with a plan designed to keep kids safe anywhere they go online! In "The Online World: What You Think You Know and What You Don''t" Rania Mankarious, Public Safety Expert and CEO of Crime Stoppers Houston, pulls back the curtain to the online world and helps parents take all the intangible gray space that can seem so overwhelming, and turn it into defined territories with boundaries to protect our tweens and teens. In this book, Rania shares her 4-Tool Strategy that will guide you and your child through real discussions about how to safely navigate the online world. Tool #1 Will: Define with clarity your child''s purpose for being online and how they will portray themselves to the online community.  Tool #2 Will: Pull back the curtain on who really is in your child''s online community, and how to recognize the three red flags everyone should be aware of.Tool #3 Will: Make your child aware of the many internal and external dangers of the online world, and develop an exit strategy so they are prepared when a threat comes their way.Tool #4 Will: Teach your child what it means to post safely-and give them a framework they will be excited to follow!What Rania has discovered is that if we focus on these four areas, and empower our kids with knowledge and strategy, we can address ALL the possible areas of online concern for parents. Best of all, these solutions will stand over time, regardless of how the landscape of the online world changes. Order your copy today and protect the kids you love!

    Out of stock

    £18.95

  • The Online World, What You Think You Know and

    Silversmith Press The Online World, What You Think You Know and

    1 in stock

    Book Synopsis

    1 in stock

    £23.70

  • Data Protection Officer

    BCS Learning & Development Limited Data Protection Officer

    1 in stock

    Book SynopsisSince the role of Data Protection Officer (DPO) was designated under EU GDPR in 2018, the understanding of what the DPO role entails and how DPOs solve problems day-to-day continues to grow. This book provides a practical guide to the DPO role, encompassing the key activities you’ll need to manage to succeed in the role. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips also embedded throughout the book and case studies included to support practice-based learning.Trade ReviewStrikes a good balance between the regulation and the day to day role of the DPO – gives good practical guidance and references, and I think would make an ideal guide for those new into the DPO world. For those already undertaking the role, it helps to refocus, and provides some valuable information on key processes and procedures. -- Andy Searle * Group Data Protection Officer, Howden Group *We are only just entering the age of data. Its power to transform humanity through new sophistication of data processing is unprecedented and unlimited. But with that power comes responsibility, and the role of the data protection officer has become key to risk management, business improvement and indeed, the protection of the values of a democratic society. This practical guide, the first of its kind, offers fresh insight into how a DPO can marshal and hone their skills in the battle for compliance, ethics and business value, in any organisation. -- Jos Creese FBCS FSIM * CEO and Founder Creese Consulting Limited, past president, BCS *This book is the perfect manual for new DPOs to get started in the field, and for more seasoned privacy professionals as a reference guide. This book not only contains the essentials of data protection law, but also guides the reader through the daily activities of a DPO. The authors have done a great job in making a complex issue accessible. -- Paul Breitbarth * Director, EU Policy & Strategy - TrustArc Inc. & Senior Visiting Fellow - European Center on Privacy and Cybersecurity, Maastricht University *Both authors bring a wealth of experience to this ‘manual’ for Data Protection Officers. Written in a clear and helpful style, it’s jam-packed with tips and resources. I particularly liked the softer tips needed for a DPO to succeed, and the two DPO case studies at the end are very useful. It’s refreshing to read a data protection book that is *not* written in legalese. -- Tim Clements FBCS CITP FIP CIPP/E CIPM CIPT CDPSE CRISC CGEIT * Business Owner and Privacy Professional, Purpose and Means, Denmark *Johnssén’s and Edvardsen’s DPO handbook offers a concise mix of privacy law and data protection best practice aimed at the inhouse legal counsels and compliance professionals alike. The authors successfully balance informational writing and quality insights from their experiences as professionals in privacy leadership roles across European established companies and startups. What speaks to me is the many practical tips drawn from a corporate setting of what works and what does not and how successful organizations implement data protection compliance. -- Mathias Strand * Assistant General Counsel, Microsoft Western Europe *Table of Contents Data Protection Fundamentals The Data Protection Officer The Data Protection Processes Understanding Risk Review Your Organisation's Data Protection Practices Standards, Frameworks and Tools DPO Case Studies

    1 in stock

    £18.99

  • Data Protection and Compliance: Second edition

    BCS Learning & Development Limited Data Protection and Compliance: Second edition

    1 in stock

    Book SynopsisLarge-scale data loss and data privacy compliance breaches continue to make headline news, highlighting the need for stringent data protection policies, especially when personal or commercially sensitive information is at stake. While regulations and legislation exist to address these issues, how organisations can best tailor their compliance approaches to their own operational circumstances has remained an open question. The focus of this book is on operationalising a truly risk-based approach to data protection and compliance, beyond just emphasis on regulatory frameworks and legalistic compliance.Trade ReviewThe past few years has seen transformative changes in privacy, particularly in the UK, where GDPR and Brexit have created a host of new and potentially divergent data protection laws. In this book, Stewart and his team distill several decades of accumulated privacy, data protection and information governance experience and know-how into a guide that’s essential reading for data protection newcomers and experienced practitioners alike. -- Toby Hayes FBCS CITP FIP CIPP/E CIPMAn ideal resource and must read for new and seasoned privacy practitioners, Data Protection and Compliance provides a comprehensive overview of UK privacy requirements together with a practical focus on hot topics and emerging issues to watch out for. Uniquely, the book helps the reader understand how the breadth of the legal, policy and practical requirements all fit together with a contextual summary and tables, untangling the deluge of privacy data. -- Vivienne Artz OBE, NED, GLEIF, former CPO LSEG/Refinitiv/Thomson ReutersStewart Room and his team apply their extensive knowledge of data protection law and practice to provide an invaluable resource on data protection that rightly goes beyond interpreting and understanding the law, and unpacks what this means on the ground for compliance leaders and their advisors. Full of practical insights on governance, risk and compliance in the data protection domain, every DPO should have this on their desk! -- Stephen Deadman, VP, DPO, MetaIn a rapidly expanding digitised global economy, this book is a must-read and a go-to resource for legal and privacy professionals and all others interested in this field. Seeing data processing as a power for good, it contains a wealth of legal knowledge and practical insights into the key issues within the world of data protection. Highly recommended. -- Olivia Shirville CIPP/E CIPM, Lead Privacy Counsel (EMEA), AonOne of the biggest challenges to data protection law is how to effectively operationalise compliance and manage risk effectively within an evolving business structure. This book shows appreciation for this challenge and provides clear methods and concepts to address it. Operational landscape of data protection is summed up concisely and the concept of ‘Technology Reference Architecture’ linked to Privacy by Design, is incredibly insightful and relevant for businesses. I recommend this book for all data privacy practitioners, including in-house lawyers. -- Nargis Hassani, SolicitorData Protection and Compliance tackles a rapidly evolving and complex regulatory landscape, in an easy to understand and practical manner. With data driving the digital evolution for most organisations, the ability to comprehend and apply an appropriate compliance framework, with respect to people, processes and systems, is increasingly challenging. For those organisations putting data at the heart of their business strategy, this is a comprehensive resource, which pulls together a wealth of subject matter expertise, tried and tested practical compliance approaches and useful insights into the rationale behind the legislation. Highly recommended. -- Janine McKelvey, BT General Counsel - Digital & Innovation, BT Group Data Protection and Ethics OfficerThere are many misconceptions about what is and isn’t Data Protection, alongside the misinformation and scaremongering that arose in the early days of the GDPR. This book distils the considerable knowledge of its author and fellow contributors to deliver the key facts with clarity, supported with reference to landmark cases and regulatory texts. The chapter on Operational Data Protection is a timely reminder that Data Protection is people, paper (processes) and technology, and that all three are required to be effective. -- David Francis CIPP/E CIPT CIPM, Group Data Protection Officer, CanopiusStewart Room and his co-authors have certainly discovered the special sauce when seeking to create a book that will appeal to so many. Data Protection and Compliance, 2nd edition, is truly inimitable amongst a minefield of technical, legal, and business publications on data protection and privacy. Taking the reader on a journey through history to providing practical operational advice is not only educationally important but also invaluable to practitioners across the multidisciplinary spectrum, regardless of their sector or experience. -- Jane Wainwright, Director, Office of the Data Protection Officer, MetaThe 4th industrial revolution is upon us. Data Protection and Compliance provides a timely and thorough orientation of the regulatory landscape but then importantly turns to the pragmatic steps that must be taken to operationalise data protection. While the explanations of the laws are comprehensive, the book embraces the notion of data protection as a foundation for accelerating innovation – seminal reading for all data practitioners. -- Jason du Preez, CEO, PrivitarData Protection and Compliance provides a clear and practical guide to the operationalisation of the GDPR. It outlines a structured and measured approach that doesn’t focus on compliance for compliance sake, but encourages doing the right thing for the benefit of both the processing organisation and the data subject. It will serve as a useful reference manual on the bookshelf of any data protection professional. -- Lisa Townsend CIPP/E CIPP/US CIPM, DPO, Wella CompanyAn invaluable source of astute guidance and pragmatic advice from one of the leading practitioners in this area as he leads you through the world of data protection and compliance in a way that demystifies the complexities of the subject matter. This book justifies a spot on the bookshelves of anyone practicing the law of data protection or just seeking to understand this area and how it impacts your day-to-day life. -- John Skelton, General Counsel (Shared Specialist Services) & Group DPO, Centrica plcData Protection and Compliance is the book you need to bridge the gap between current legal developments and the practical steps companies can take to implement a successful data protection programme. The book offers something for everyone, whether you’re starting out in data protection or an experienced practitioner looking to fine tune your data protection compliance programme. -- Andrea Chard LLM LLB BA, Group Data Protection Officer, easyJetThis is your ‘one-stop shop’ resource for data protection guidance! This book effortlessly and coherently brings together the legislative and relevant case law on data protection into a well structured and easy to follow book. This is a must have for any data protection professional looking to operationalise and embed data protection compliance within an organisation through a risk-based approach. -- Harrison Barrett CIPM CIPP/E, Deputy Data Protection Officer, CanopiusCuts nicely through the “noise” of data protection regulation and developments, making this a uniquely comprehensive guide for any practitioner wanting to understand data protection practices better. The book provides detail where it needs to, and is succinct on more straightforward topics. The handy “tables” are a useful ready-reckoner that moves the fingertips to the nub of the topic in an instant, a winner for the busy privacy team! -- Sonal Khimji FIP CIPM CIPP/E, Director and Founder, Omnigov LimitedThis revised edition of a venerable classic is a welcome addition to the reference library of data protection professionals navigating the landscape of data protection in the UK, post-Brexit. -- Daragh O Brien FICS IAPP FIP, Managing Director, CastlebridgeData Protection and Compliance is an excellent resource for anyone working in a data protection role. It’s a rare text that balances theory, practical application and the social and political context in which the legal and regulatory framework is developing; key to designing and implementing an effective, risk-based approach to operationalising data protection. I’d highly recommend Data Protection and Compliance as a solid addition to anyone’s data protection bookshelf. -- Naureen Hussain, Director of Data Estate, Virgin Media O2An indispensable book for data protection practitioners. The text includes exceptional detail, historical context, and relatable, pragmatic insights for this vast and complicated field. The style is approachable and delivers accessible, common-sense tables and summaries that will be the go-to resource for those advising businesses. A particularly useful reference for in-house privacy professionals as we face the ‘regulatory bear market’ and the need to push privacy into the very fabric of our electronically mediated lives. Well done, Stewart and team! You have re-forged a much-needed tool for our increasingly complex world with this edition. -- Eric Heath, Chief Privacy Officer and Deputy General Counsel, AncestryAn excellent guide to data protection and compliance. Takes the reader through an easy to follow journey to achieve and maintain regulatory compliance. Naturally focuses on GDPR but keeps relevant to other international laws. Illustrates impact of Brexit, highlights issues of data sovereignty and discusses challenges with global data processing in an increasingly digital world. A great reference for ins and outs of data protection law and regulatory compliance, as well as for dealing with consequences of non-compliance and data breaches. -- Ashish Bhatt, Information and Data Management Officer, Queen’s University Kingston, ON Canada'Data Protection and Compliance: Second edition' is a must have companion for anyone involved in the data protection or compliance space. It begins with a useful introduction to data protection itself, the link into the General Data Protection Regulations (GDPR) and the Data Protection Act 2018 (DPA), providing an easy-to-read breakdown of the many complexities and challenges that organisations face when collecting, processing, and managing personal data. The book is full of useful guidance, advice, and good practice that all organisations should follow and is thoroughly recommended. -- Jim Fox CISM MBCS, Cyber & Information Security Risk Management ExecutiveA fascinating read, highly thought provoking and one that will be returned to as a phenomenal reference book. -- Angela McLoughlin MBCS, Business Analyst, Director Angel Analysis Ltd.Table of ContentsPart I - The Big Picture 1. Introduction to data protection 2. Introduction to the GDPR 3. Introduction to ePrivacy 4. Introduction to operational data protection Part II - Core Law 5. The principles of data protection 6. The rights of data subjects Part III - Operating Internationally 7. National supervision within an international framework 8. Transferring data between the GDPR landmass and third countries 9. Data protection beyond the GDPR landmass Part IV - Delivery 10. Mechanisms to support operational compliance 11. Programmatic approaches for delivering data protection by design and default 12. Being accountable for records of processing, legitimate interests and risk management 13. 'The journey to code' Part V - Adverse Scrutiny 14. How to prepare for the risks of challenge and 'adverse scrutiny' 15. Complaints, rights requests, regulatory investigations and litigation 16. Regulatory action 17. Handling personal data breaches

    1 in stock

    £44.99

  • Data Strategy: From definition to execution

    BCS Learning & Development Limited Data Strategy: From definition to execution

    1 in stock

    Book SynopsisData can be a cost for some organizations, but for those who succeed, it is a way to drive profitability, customer loyalty, and outperform others in their field. A well thought out, fit-for-purpose data strategy is vital for every modern data-driven organisation – public or private sector. This book is your essential guide to planning, developing and implementing a data strategy, presenting a framework which takes you from strategy definition to successful strategy delivery and execution with support and engagement from stakeholders. It covers vital topics such as data-driven business transformation, change enablers, benefits realisation and measurement. Written by an experienced practitioner with over 30 years in the field, this book guides the reader through the complexity of working across an organisation to achieve a successful outcome. Whether you’re just starting to consider a data strategy or are looking to improve your existing approach, this book is a valuable resource for any modern data-driven organization. Offers a structured guide for those embarking on a data strategy from definition to a successful implementation. Incorporates insights from a model that has been developed through a highly successful workshop delivered to many practitioners across the globe. Provides case studies, example scenarios and reader questions throughout the book are designed to stimulate real-world thinking and help you put the framework into practice in the context of your own organisation. Trade ReviewThis is the most comprehensive, practical and useful guide to data strategy that I have come across. I have developed a few data strategies and would have found it easier and produced a better strategy if I had read Ian Wallis' book first. This is a book that is informed by deep, real-world experience of data strategy and the many change challenges involved. It has all the frameworks, tools and thinking you could need, laid out in a clear and readable way. For anyone involved in data or digital strategies it is a must read. -- Tony Gosling, Chief Digital Officer, RSBG UK GroupWhether you are new to the area or just an old dog learning new tricks, this book offers vast experience, anecdotes and learnings from the front line for you to apply in the modern era of data. There is just so much to learn and revisit, e.g. on defensive vs offensive, dynamic data strategy, secret to success in R.A.V.E. – but most of all it’s a journey not a destination. -- Graeme McDermott, Chief Data Officer, Tempcover'Data Strategy: From definition to execution' is an excellent resource for newbies to data strategy and more seasoned professionals alike. It provides a well-organised, clear approach to developing a data strategy through its complete life cycle, alongside the potential pitfalls of getting a strategy from paper into reality. The author’s style is engaging and well thought out, clearly coming from a place of significant experience – if you’re writing a data strategy (or if you’re planning to) I heartily recommend this book, you’re bound to learn something useful! -- Jon Alvis, Data Governance SME, Member of BSI AMT/004 Group (for ISO 8000)This really is everything you need to know about writing and delivering a data strategy! I found it filled with great analogies and stories from across the public and private sector. With the ten top things to remember at the end of every chapter, it really helped to summarise the key points. I particularly liked that it covered all the salient points of a data strategy, from control to exploitation, from strategy development to implementation and everything in between. A must read for those embarking on their data strategy journey! -- Lisa Allen, Vice Chair, DAMA UKEssential reading for anyone starting out on implementing, or reviewing a current data strategy. This book provides insights the author has gained from many years implementing data strategies across many enterprises. Providing a through exposition on the do’s and don'ts, highlighting the importance of having a measurable implementation plan, and that the strategy needs to be linked to enterprise business goals.. This is a valuable guide and a perfect antidote for those who operate in organisations where ignorance masquerades as knowledge! -- Godfrey Morgan, Head of Strategy & Governance, People Analytics & Insight, CPO, HMRCIan Wallis has produced an excellent guide to crafting and executing a data strategy. It is eminently readable, always relatable but crucially entirely practical in its approach to enabling Data Strategists - whether that is your job title or not - to plan, produce and implement meaningful data strategies in any organisation. Ian guides the reader through the steps needed to get senior level buy in, tell the story of the strategy, ground the plan in reality and be positioned to secure backing and resource for the successful creation of a fully formed strategy. All with a view to see your business extract value from one of its greatest assets – data. The author's practical approach to implementation, his real life experiences, but only occasional references to what might be seen as technical speak, brings this thinking to life making this a very digestible guide. The thoughtful ‘top ten takeaways’ provide very handy references points and reminders at the end of each chapter, and his work is both an excellent standalone learning piece as well as a ‘return to’ check in guide. It’s a great read and he knows his stuff. -- Colin Grieves, Managing Director, UK&I at Experian, Marketing ServicesTo be a leader in a sector and across multiple markets it is essential to have a functional data strategy. However, the line between success and failure in defining and implementing such strategy is becoming increasingly blurred due to the complexity of the topic. Data Strategy is your guide to avoid the noise and to focus on the areas that really can make a difference to setting up an operational and effective data strategy. -- Dr Marzia Bolpagni, Head of BIM International, Associate Director, MaceWhether new to developing a data strategy or looking to enhance an existing one this book is an essential read. It offers unique insight to the author’s extensive experience combined with relevant reference material to help direct personal research. I found the takeaway points at the end of each chapter particularly useful. It is helping to define an approach and make the challenge of updating the data strategy achievable. -- Karen Alford FCCA, FCRM Manager, Digital Asset Data and Information, Environment AgencyThis guide on how to plan, craft and execute a data strategy is outstanding in its level of detail and completeness. The author weaves his extensive and varied experience as a data practitioner into the fabric of theory to create a wonderful, practical, 'how to' guide. He takes you through the early planning stages, points out the pitfalls to avoid, shares some highly useful tips (e.g. CLEAR) and shows you how to navigate the rocky waters to implementation and the measurement of value of your data strategy. Whether you are creating a data strategy for the first time or looking to be even better next time, this is a must read! -- Glenn Waine, VP / Head of Data Science and Analytics, Gale PartnersI read this book cover-to-cover in one day. Why? It's the first to fully weave the fundamentals of strategy and cultural change into the 'technical' aspects of creating and executing on a well thought out data strategy. A must-read for all who desire tangible, long-term results from the use of data in decision-making throughout an enterprise. Masterfully written, Ian! -- Lori L. Silverman, CEO/Founder & Shift Strategist, Partners for Progress; co-author, 'Business Storytelling for Dummies'Table of Contents Introduction: Why is a Strategy Relevant Today? Positioning the Data Strategy Setting the Scope of the Data Strategy Composing the Data Strategy Creating a Route Map Content, Structure and Alignment Communications, Culture and Change Readiness Executing the Strategy: Part 1, The Plan Executing the Strategy: Part 2, Delivery Flexibility in Execution Assessing Value in Data Strategy Implementation Data Strategy: Completing the Journey from Definition to Execution

    1 in stock

    £28.49

  • Information Risk Management: A practitioner's

    BCS Learning & Development Limited Information Risk Management: A practitioner's

    1 in stock

    Book SynopsisInformation risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline.Trade ReviewInformation risk management is an integral part of every business and the author presents its lifecycle in an easy-to-follow and well-organised format with real-life examples, tools and templates. I highly recommend the book also as a valuable reference for legislation, standards, methodologies and frameworks for risk professionals to follow. -- Sema Yuce CISM CRISC CISA, Director at Truth ISC Technology and Security Consultancy Ltd.This book is essential reading for any risk management practitioner. The author’s many years of practical experience in the subject shine through, it is clearly written and easy to follow. The book sets out the best approach when identifying and evaluating risk and the factors to consider when treating it in a pragmatic way. The examples give context and aid understanding and the appendices are comprehensive and a go-to source of useful information on risk. Highly recommended, this will be on my bookshelf. -- David Alexander, Information Security Group, Royal Holloway, University of LondonThis book should be mandatory reading within any business to understand the scale and scope of the landscape within which their information security and assurance professionals need to operate. -- Andrea Simmons PhD FBCS CITP CISM CISSP MA CIPP/E CIPMTable of Contents1. The need for information risk management 2. Review of information security fundamentals 3. The information risk management programme 4. Risk identification 5. Threat and vulnerability assessment 6. Risk analysis and risk evaluation 7. Risk treatment 8. Risk reporting and presentation 9. Communication, consultation, monitoring and review 10. The NCSC Certified Certification scheme 11. HMG Security-related documents 12. Appendix A – Taxonomies and descriptions 13. Appendix B – Typical threats and hazards 14. Appendix C – Typical vulnerabilities 15. Appendix D – Information Risk Controls 16. Appendix E – Methodologies, guidelines and tools 17. Appendix F - Templates 18. Appendix G – HMG cyber security guidelines 19. References and further reading

    1 in stock

    £42.74

  • A Practical Guide to Privacy in Libraries

    Facet Publishing A Practical Guide to Privacy in Libraries

    Out of stock

    Book SynopsisPrivacy is a core value of librarianship and yet as a concept, it is difficult to define and in practice, a challenge to uphold. This groundbreaking new book considers how privacy issues can arise in a library context and what library and information professionals can do to protect the privacy of their users. A Practical Guide to Privacy in Libraries features a wide range of practical examples of such issues, providing insights and practical steps which readers can follow. In-depth case studies and scenarios support the examples laid out in the book, while examples of data breaches which have occurred in a library setting, and the lessons we can learn from them, are also included. The book also covers the main legislation governing data protection – GDPR – which will be particularly relevant to European librarians, and international librarians offering services to EU citizens.The book provides a range of tools through which libraries can communicate how they handle the personal data of their users whilst ensuring that they are following best practice with their privacy policy statements, their privacy audits and data protection impact assessments. Privacy is not the same thing as data protection, and the book outlines the differences between these two concepts. Nevertheless, the book has been written with the requirements of data protection law very much in mind.Written in a highly practical manner, this book is essential reading for library and information professionals who need to understand and support privacy in the library setting and a useful reference for students and researchers in the field who need to understand this topic in practice. Trade Review'Pedley is an expert in information law, and his book is a guide for working professionals to use as a reference in the development and management of user privacy policies... The book's 13 main chapters are divided into brief, cogent subsections, and a detailed table of contents makes it easy to find materials on the topics addressed and to get the specific guidance offered at the point of need. Though aimed to meet the needs of librarians working in the UK, the book treats North American examples and principles thoroughly, making it useful for audiences in the US and Canada…This is a book for working administrators and for collections supporting library and information science or curricula addressing issues of privacy. Summing Up: Recommended. Graduate students, researchers, faculty, and professionals' * CHOICE *'Essential reading for library and information professionals who need to understand and support privacy in the library setting and a useful reference for students and researchers in the field who need to understand this topic in practice, A Practical Guide to Privacy in Libraries is an ideal textbook for library system in-service training programs, and must be considered a core and unreservedly recommended addition to community, college, and university Library Science collections and supplemental studies reading lists.' -- James A. Cox * Midwest Book Review *Table of ContentsDisclaimerList of figures and tablesTable of statutes, etc.Table of casesAbbreviationsGlossary of terms Preface1 General law and background1.1 Legal system 1.1.1 Common law system 1.1.2 Civil law system 1.2 Court system 1.2.1 England and Wales 1.2.2 Scotland 1.2.3 Northern Ireland 1.2.4 Judicial reviews 1.2.5 Tribunals 1.3 Sources of law 1.3.1 Progress of UK legislation1.3.2 Law reports 1.3.3 Public international law 1.3.4 Websites 1.4 Legal concepts/terminology1.4.1 Criminal law 1.4.2 Civil law1.4.3 Tort (England, Wales, Northern Ireland)/Delict (Scotland)1.4.4 Contract law 1.4.5 Property1.5 Conclusions References2 Library law2.1 Localism Act 2011 2.2 Public Services (Social Value) Act 2012 2.3 Sustainable Communities Act 2007 and Sustainable Communities Act 2007 (Amendment) Act 20102.4 Public Libraries and Museums Act 19642.5 Local byelaws 2.6 Literary and Scientific Institutions Act 1854 2.7 Library Offences Act 1898 2.8 Prison library service 2.9 School library service 2.10 Equality Act 2010 (section 149: Public sector equality duty) References 283 Copyright3.1 General principles3.1.1 Copyright ownership 3.1.2 Term of protection 3.1.2.1 Unpublished works and the 2039 rule 3.2 Economic and moral rights 3.2.1 Risk management 3.3 Legislative framework 3.3.1 Berne Convention for the Protection of Literary and Artistic Works3.3.2 Universal Copyright Convention3.3.3 Trade-Related Aspects of Intellectual Property Rights3.3.4 World Intellectual Property Organization Copyright Treaty3.3.5 European directives on copyright matters3.3.5.1 On the legal protection of computer programs3.3.5.2 On rental and lending right3.3.5.3 Harmonising the term of copyright protection 3.3.5.4 On the legal protection of databases3.3.5.5 On the harmonisation of certain aspects of copyright and related rights3.3.5.6 On the resale right for the benefit of the author of an original work of art3.3.5.7 On the enforcement of intellectual property rights3.3.5.8 Directive on the term of protection of copyright and certain related rights amending the previous 2006 Directive (‘Term Directive’)3.3.5.9 Directive on certain permitted uses of orphan works3.3.5.10 Directive on collective management of copyright and related rights and multi-territorial licensing ofrights in musical works for online use in the internal market3.3.5.11 Directive on certain permitted uses of certain works and other subject matter protected by copyright and related rights for the benefit of persons who are blind, visually impaired or otherwise print-disabled3.3.6 European Regulations on copyright matters3.3.6.1 Regulation on the cross-border exchange between the Union and third countries of accessible format copies of certain works and other subject matter protected by copyright and related rights for the benefit of persons who are blind, visually impaired or otherwise print-disabled3.3.6.2 Regulation on cross-border portability of online content services in the internal marketThe Intellectual Property (Copyright and Related Rights) (Amendment) (EU Exit) Regulations 20193.3.7 UK legislation 3.3.8 Supplementary case law 3.4 Acts permitted in relation to copyright works 3.4.1 Fair dealing 3.4.1.1 What is substantial? 3.4.2 Non-commercial research 3.4.3 Private study 3.4.4 Illustration for instruction 3.4.5 Quotation 3.4.6 Criticism and review 3.4.7 News reporting 3.4.8 Caricature, parody and pastiche 3.4.9 Text and data mining for non-commercial research3.4.10 The library provisions in the CDPA 3.4.10.1 Copying by librarians on behalf of their users 3.4.10.2 Libraries and educational establishments making works available through dedicated terminals3.5 Licensing 3.5.1 Copyright Licensing Agency 3.5.2 NLA Media Access 3.5.3 Design Artists Copyright Society 3.5.4 Ordnance Survey 3.5.5 The National Archives 3.5.6 Creative Commons 3.6 Digital copyright 3.6.1 Internet 3.6.2 Right of communication to the public 3.6.3 Hyperlinking and deep linking 3.6.4 Database regulations 3.6.5 Archiving and preservation of digital content 3.6.6 Licensing of electronic resources 3.6.7 Digital rights management systems 3.6.8 Digital signatures and copyright declaration forms 3.7 Copyright clearance 3.7.1 Databases of rights owners 3.7.2 Orphan works 3.7.2.1 Orphan works licences 3.8 Open access 3.8.1 Further information 3.9 Ethical and professional issues and conflicts 3.10 Further information References 4 Legal deposit4.1 Introduction 4.2 General principles 4.2.1 Print material 4.2.2 Non-print material 4.3 Enforcement 4.4 Copyright and use of legal deposit material 4.5 Online defamation 4.6 The future 4.7 Further information References 5 Breach of confidence5.1 General principles 5.2 Obligation of confidence and the Freedom of Information Act 5.3 Remedies5.4 Trade secrets5.5 Case law on breach of confidence6 Contracts and licensing agreements6.1 General principle6.2 Negotiating licences 6.2.1 Factors that can make or break a deal6.3 Consortia and standard licences 6.4 Technology solutions 6.5 Use of passwords for licensed products 6.5.1 Usage data 6.6 Further information References7 Data protection7.1 Introduction 7.2 General principles 7.2.1 The GDPR and the DPA 2018 are constantly evolving 7.2.2 Related legislation 7.3 The six data protection principles 7.3.1 First principle7.3.2 Second principle7.3.3 Third principle 7.3.4 Fourth principle 7.3.5 Fifth principle 7.3.6 Sixth principle 7.4 Accountability 7.4.1 Documentation requirements7.4.2 Codes of conduct 7.4.3 Certification7.5 Processing of personal data 7.5.1 Legal bases for processing 7.5.2 Processing of special categories (sensitive personal data) 7.5.3 Consent7.5.4 Transfers of personal data to a third country or an international organisation7.6 Exemptions7.7 Privacy notices 7.8 Register of fee payers7.9 Rights of the data subject 7.9.1 Compensation 7.9.2 Credit reference agencies 7.10 Data breaches 7.10.1 Causes of data breaches7.11 Data protection impact assessments 7.12 Fines and prosecutions 7.12.1 Prosecutions7.13 Data protection issues for libraries 7.13.1 E-books – privacy concerns 7.13.2 Electoral roll information in libraries 7.13.3 Radio Frequency Identification 7.13.4 Outsourcing7.14 Data protection standards7.15 How to protect your information 7.16 Identity theft7.17 Further information References 8 Privacy 8.1 General principles8.2 Obligation of confidence versus breach of privacy8.3 Codes of practice8.4 Injunctions8.5 Privacy and libraries8.6 Case law8.7 Further information References9 Freedom of information9.1 General principles of freedom of information 9.2 The Freedom of Information Act 2000 (FOIA) 9.2.1 Local authorities 9.3 Publication schemes 9.4 Datasets 9.5 Copyright implications of the FOIA 9.6 Freedom of information and library and information professionals 9.7 Freedom of information rights and request procedures 9.8 Exemptions and appeals 9.9 Enforcement 9.10 The Environmental Information Regulations 2004 (EIR) 9.10.1 What is environmental information?9.11 Freedom of information in Scotland 9.12 Freedom of information and data protection 9.12.1 Fees and charges 9.12.2 The time limit for responding to requests9.12.3 The exemptions 9.13 European Union documents 9.14 Further information and keeping up to date 9.14.1 Organisations 9.14.2 Journals 9.14.3 News feeds References 10 Human rights10.1 General principles10.1.1 Human Rights Act 1998 10.1.2 Fundamental Rights Agency 10.2 Guiding principles for library and information professionals 10.3 Human rights and data protection 10.4 Human rights and copyright10.5 Human rights and freedom of expression 10.6 Further informationReferences 11 Re-use of public sector information11.1 Background11.2 General principles11.3 Public task11.3.1 The ‘public task’ of public sector libraries11.4 UK government licensing framework 11.4.1 UK Open Government Licence11.4.2 The non-commercial government licence 11.4.3 The charged licence 11.5 Right to data 11.6 Charging 11.6.1 Public/private partnerships and exclusivity deals 11.7 Complaints procedure 11.8 New Open Data and PSI Directive 11.9 Further information 11.9.1 Organisations 11.9.2 Publications References 12 Defamation12.1 Introduction 12.2 General principles 12.3 Slander 12.4 Libel 12.5 Defences to libel 12.5.1 Truth 12.5.2 Honest opinion (previously known as fair comment) 12.5.3 Publication on a matter of public interest (Defamation Act 2013 section 4)12.5.4 Operators of websites who didn’t post the statement on the website (Defamation Act 2013 section 5)12.5.5 Peer-reviewed statements in scientific or academic journals (Defamation Act 2013 section 6)12.5.6 Privilege (Defamation Act 2013 section 7) 12.5.7 The offer to make amends 12.6 Remedies 12.6.1 Civil action for damages 12.6.2 Costs 12.6.3 An injunction/interdict to prevent repetition 12.7 Defamation and the internet 12.7.1 The liability of internet service providers for other people’s material12.7.2 The application of the limitation period to online archives and the introduction of the single publication rule12.7.3 Exposure of internet publishers to liability in other jurisdictions12.7.4 The risk of prosecution for contempt of court12.7.5 Social networking sites 12.7.6 E-mail libel 12.8 Checklist References Notes 13 Professional liability13.1 General principles 13.2 Contract 13.3 Tort (delict in Scotland)13.4 Liability and electronic information13.5 Liability for copyright infringement13.6 Risk management13.7 Indemnity and insurance References 14 Cybersecurity and cybercrime14.1 Background14.2 Cybersecurity and cyber essentials 14.3 Council of Europe Convention on Cybercrime 14.4 The Computer Misuse Act 1990 14.5 The Network and Information Systems Regulations14.6 Hacking14.7 Viruses, worms and Trojans 14.8 Intellectual property infringement 14.8.1 Plagiarism 14.8.2 Software piracy 14.8.3 Making illegal downloads of music files 14.8.4 Other examples of copyright abuse 14.9 Pornography 14.10 Fraud 14.10.1 Phishing14.10.2 Pharming 14.11 Denial of service attacks 14.12 Acceptable use policies14.13 Communications Act 2003 References 15 Disability discrimination15.1 General principles 15.2 Copyright and the disability exceptions 15.3 The Right to Read 15.4 Website accessibility 15.5 Further information 16 Other legal issues relevant to librarians16.1 Introduction 16.2 Police, surveillance and libraries 16.3 Cloud computing 16.3.1 Escrow agreements16.3.2 Data protection issues16.3.3 Ownership of the data16.4 Stocking extremist/controversial literature16.5 Censorship16.6 Theft or mutilation of rare books16.6.1 Examples of theft by library users16.6.2 Examples of theft by library staff16.7 Lending of audio books and e-books by public libraries16.8 Further informationReferences AppendicesAppendix 1 Brexit and the orphan works exception Appendix 2 CILIP's ethical framework Index

    Out of stock

    £56.25

  • The Snowden Files: The Inside Story of the

    Guardian Faber Publishing The Snowden Files: The Inside Story of the

    1 in stock

    Book SynopsisIt began with an unsigned email: "I am a senior member of the intelligence community". What followed was the most spectacular intelligence breach ever, brought about by one extraordinary man, Edward Snowden. The consequences have shaken the leaders of nations worldwide, from Obama to Cameron, to the presidents of Brazil, France, and Indonesia, and the chancellor of Germany. Edward Snowden, a young computer genius working for America's National Security Agency, blew the whistle on the way this frighteningly powerful organisation uses new technology to spy on the entire planet. The spies call it "mastering the internet". Others call it the death of individual privacy. This is the inside story of Snowden's deeds and the journalists who faced down pressure from the US and UK governments to break a remarkable scoop. Snowden's story reads like a globe-trotting thriller, from the day he left his glamorous girlfriend in Hawaii, carrying a hard drive full of secrets, to the weeks of secret-spilling in Hong Kong and his battle for asylum. Now stuck in Moscow, a uniquely hunted man, he faces US espionage charges and an uncertain future in exile. What drove Snowden to sacrifice himself? Award-winning Guardian journalist Luke Harding asks the question which should trouble every citizen of the internet age. Luke Harding's other books include Wikileaks: Inside Julian Assange's War on Secrecy and Mafia State: How One Reporter Became an Enemy of the Brutal New Russia.

    1 in stock

    £11.69

  • Privacy, Security and Accountability: Ethics, Law

    Rowman & Littlefield International Privacy, Security and Accountability: Ethics, Law

    Out of stock

    Book SynopsisWhat is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability – and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.Trade ReviewPrivacy, Security, and Accountability is a terrific collection of essays by leading thinkers on privacy and security. These essays explore philosophically the role of privacy and security in democratic society. The chapters have depth and tackle the enduring questions in insightful and interesting ways. Rich with theory, the book is also accessible and timely. -- Daniel J. Solove, John Marshall Harlan Research Professor of Law, George Washington University Law School and author of Understanding PrivacyThis is a very timely collection, with an impressive line-up of contemporary privacy scholars. With its focus on problems in surveillance and security, Adam Moore compiles a singularly interesting volume - a contribution of exceeding importance for current and future debates, in academia as well as in society at large. -- Beate Roessler, Professor of Ethics, University of AmsterdamTable of ContentsIntroduction: The Value of Privacy, Security, and Accountability, Adam D. Moore and Michael A. Katell / 1. The Duty to Protect Your Own Privacy, Anita Allen / 2. Respect for Context as a Benchmark for Privacy Online: What it is and isn’t, Helen Nissenbaum / 3. Privacy and the Dead, James S. Taylor / 4. Connecting Informational, Fourth Amendment, and Constitutional Privacy, Judith Wagner DeCew / 5. Privacy, Freedom of Speech and the Sexual Lives of Office Holders, Dorota Mokrosinska / 6. Democracy, Privacy, and Security, Annabelle Lever / 7. Transparency for Democracy: The Case of Open Government Data, Kay Mathieson / 8. Why Security Trumps Privacy, Kenneth Einar Himma / 9. Why Privacy and Accountability Trump Security, Adam D. Moore / 10. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program, Alan Rubel / 11. Mass Surveillance, Privacy, and Freedom: A Case for Public Access to Government Surveillance Information, Bryce Newell / 12. Post-911 Government Surveillance, Suppression & Secrecy, Nadine Strossen / Selected Bibliography / Index

    Out of stock

    £114.30

  • Privacy, Security and Accountability: Ethics, Law

    Rowman & Littlefield International Privacy, Security and Accountability: Ethics, Law

    Out of stock

    Book SynopsisWhat is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability – and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.Trade ReviewPrivacy, Security, and Accountability is a terrific collection of essays by leading thinkers on privacy and security. These essays explore philosophically the role of privacy and security in democratic society. The chapters have depth and tackle the enduring questions in insightful and interesting ways. Rich with theory, the book is also accessible and timely. -- Daniel J. Solove, John Marshall Harlan Research Professor of Law, George Washington University Law School and author of Understanding PrivacyThis is a very timely collection, with an impressive line-up of contemporary privacy scholars. With its focus on problems in surveillance and security, Adam Moore compiles a singularly interesting volume - a contribution of exceeding importance for current and future debates, in academia as well as in society at large. -- Beate Roessler, Professor of Ethics, University of AmsterdamTable of ContentsIntroduction: The Value of Privacy, Security, and Accountability, Adam D. Moore and Michael A. Katell / 1. The Duty to Protect Your Own Privacy, Anita Allen / 2. Respect for Context as a Benchmark for Privacy Online: What it is and isn’t, Helen Nissenbaum / 3. Privacy and the Dead, James S. Taylor / 4. Connecting Informational, Fourth Amendment, and Constitutional Privacy, Judith Wagner DeCew / 5. Privacy, Freedom of Speech and the Sexual Lives of Office Holders, Dorota Mokrosinska / 6. Democracy, Privacy, and Security, Annabelle Lever / 7. Transparency for Democracy: The Case of Open Government Data, Kay Mathieson / 8. Why Security Trumps Privacy, Kenneth Einar Himma / 9. Why Privacy and Accountability Trump Security, Adam D. Moore / 10. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program, Alan Rubel / 11. Mass Surveillance, Privacy, and Freedom: A Case for Public Access to Government Surveillance Information, Bryce Newell / 12. Post-911 Government Surveillance, Suppression & Secrecy, Nadine Strossen / Selected Bibliography / Index

    Out of stock

    £39.90

  • The Fight for Privacy: Protecting Dignity,

    Vintage Publishing The Fight for Privacy: Protecting Dignity,

    1 in stock

    Book Synopsis'Devastating and urgent, this book could not be more timely' Caroline Criado Perez, award-winning and bestselling author of Invisible WomenDanielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone.The boundary that once protected our intimate lives from outside interests is an artefact of the twentieth century. In the twenty-first, we have embraced a vast array of technology that enables constant access and surveillance of the most private aspects of our lives. From non-consensual pornography, to online extortion, to the sale of our data for profit, we are vulnerable to abuse -- and our laws have failed miserably to keep up.With vivid examples drawn from interviews with victims, activists and lawmakers from around the world, The Fight for Privacy reveals the threat we face and argues urgently and forcefully for a reassessment of privacy as a human right. As a legal scholar and expert, Danielle Citron is the perfect person to show us the way to a happier, better protected future.Trade ReviewIt's so refreshing to read an argument for privacy that centres women - Citron presents a crucial analysis that has been sorely missing from this important debate until now. Devastating and urgent, this book could not be more timely -- Caroline Criado Perez, author of Invisible WomenThe Fight for Privacy is nothing less than the battle to keep our intimate, private selves free from exploitation. A vitally important book -- Cordelia Fine, author of A Mind Of Its OwnDanielle Keats Citron has given us a crucial book for understanding the crisis of privacy invasion, and the unrelenting damage that comes from intimate, nonconsensual surveillance. This book should be required reading for every policy maker, parent, or person who wants to reimagine privacy protections. If you care about anyone, anywhere, you should read this book -- Safiya Noble, author of Algorithms of OppressionProfessor Citron - the brilliant, ground-breaking law professor and civil rights advocate - continues her important and impactful work in helping governments, society, and the titans of the technology sector to understand that our collective failure to protect our intimate privacy amounts to a massive failing to protect our basic civil rights. Through heart-breaking accounts form victims, a careful and detailed exposition of how a range of technologies are being weaponized against us, and a detailed review of the ethical and legal landscape governing these issues, The Fight for Privacy is a must read by anyone who cares about civil rights -- Hany Farid, UC BerkeleyThis is a terrific, though terrifying, exposé about how often our intimate activities and intimate information about us end up on social media. Professor Danielle Citron makes a compelling case for a 'right to intimate privacy' under the law. This beautifully written book deserves a wide audience and hopefully will inspire needed meaningful change in the law * Erwin Chemerinsky, Dean and Jesse H. Choper Distinguished Professor of Law, University of California, Berkeley School of Law *When your wristwatch monitors your location and your health status and your window-shopping and purchases generate information sold and combined with other information about you, the accumulation of 'little assents' produce constant surveillance, risks of manipulation, and the elimination of privacy. Danielle Citron's expert and engaging treatment of 'technology-enabled privacy violations' shows why victims, digital platforms, and legislators alike turn to her for advice and for fights to reclaim privacy morally, legally, and practically -- Martha Minow, former Dean, Harvard Law SchoolPrivacy is politics, and if we want it back we must fight for it. In this open-hearted and down-to-earth book Danielle Citron offers reasons for optimism among the ruins of our once cherished privacy. She details the devastating effects of the loss of 'intimate privacy' and argues that new rights and laws for the digital age are both long overdue and within our grasp. Lawmakers and citizens alike, this book is for you -- Shoshana Zuboff, author of The Age of Surveillance Capitalism, Professor Emeritus, Harvard Business SchoolDanielle Citron's book makes privacy undeniably and uncomfortably personal, shining a light on the ways technology is used to pry open the most intimate corners of our lives. Hers is a powerful and urgent manifesto for the protection of "intimate privacy" in the United States and beyond -- Susie Alegre, author of Freedom to Think, international human rights lawyerThe Fight for Privacy is a tour de force. Arguing convincingly that our intimate privacy is a moral necessity being eroded in frightening and accelerating ways, Citron offers trenchant clarity and lucid hope for achieving justice in our digital future. A must read -- Kate Manne, author of Entitled: How Male Privilege Hurts Women

    1 in stock

    £17.09

  • The Fight for Privacy: Protecting Dignity,

    Vintage Publishing The Fight for Privacy: Protecting Dignity,

    Out of stock

    Book Synopsis'Devastating and urgent, this book could not be more timely' Caroline Criado Perez, award-winning and bestselling author of Invisible WomenDanielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone.The boundary that once protected our intimate lives from outside interests is an artefact of the twentieth century. In the twenty-first, we have embraced a vast array of technology that enables constant access and surveillance of the most private aspects of our lives. From non-consensual pornography, to online extortion, to the sale of our data for profit, we are vulnerable to abuse -- and our laws have failed miserably to keep up.With vivid examples drawn from interviews with victims, activists and lawmakers from around the world, The Fight for Privacy reveals the threat we face and argues urgently and forcefully for a reassessment of privacy as a human right. As a legal scholar and expert, Danielle Citron is the perfect person to show us the way to a happier, better protected future.Trade ReviewIt's so refreshing to read an argument for privacy that centres women - Citron presents a crucial analysis that has been sorely missing from this important debate until now. Devastating and urgent, this book could not be more timely -- Caroline Criado Perez, author of Invisible WomenThe Fight for Privacy is nothing less than the battle to keep our intimate, private selves free from exploitation. A vitally important book -- Cordelia Fine, author of A Mind Of Its OwnDanielle Keats Citron has given us a crucial book for understanding the crisis of privacy invasion, and the unrelenting damage that comes from intimate, nonconsensual surveillance. This book should be required reading for every policy maker, parent, or person who wants to reimagine privacy protections. If you care about anyone, anywhere, you should read this book -- Safiya Noble, author of Algorithms of OppressionProfessor Citron - the brilliant, ground-breaking law professor and civil rights advocate - continues her important and impactful work in helping governments, society, and the titans of the technology sector to understand that our collective failure to protect our intimate privacy amounts to a massive failing to protect our basic civil rights. Through heart-breaking accounts form victims, a careful and detailed exposition of how a range of technologies are being weaponized against us, and a detailed review of the ethical and legal landscape governing these issues, The Fight for Privacy is a must read by anyone who cares about civil rights -- Hany Farid, UC BerkeleyThis is a terrific, though terrifying, exposé about how often our intimate activities and intimate information about us end up on social media. Professor Danielle Citron makes a compelling case for a 'right to intimate privacy' under the law. This beautifully written book deserves a wide audience and hopefully will inspire needed meaningful change in the law * Erwin Chemerinsky, Dean and Jesse H. Choper Distinguished Professor of Law, University of California, Berkeley School of Law *

    Out of stock

    £13.49

  • Data Protection: for voluntary organisations

    Directory of Social Change Data Protection: for voluntary organisations

    15 in stock

    Book SynopsisVital to the effective functioning of voluntary organisations is the trust of people - the beneficiaries, clients, regulators, donors, volunteers and paid staff. Open, fair and well-managed data protection practice is not just desirable in helping to achieve that trust, but essential. Get it wrong and there is reputational damage and costs attached. Data Protection for voluntary organisations will enable you to set a shining example of best practice and also comply with UK data legislation and the General Data Protection Regulation (GDPR) in force since 2018. This book will help you: * Understand the key principles and elements of data protection * Recognise your main responsibilities as a data controller * Distinguish when you can and can't retain data * Appreciate what the rights of the data subject are Who is this book for? A must-read for anyone in the UK voluntary sector who wants to get beyond tick-box data management. Invaluable to data managers or those who handle personal information such as IT, personnel, marketing and fundraising departments. For professional advisers, and academics it will also offers a valuable summary drawing out key data protection points by examining and interpreting the primary legislation.Trade Review'I have worked with Paul for many years now and I have always appreciated his ability to share his enthusiasm for this complex subject and how it applies to our sector. Written in a very understandable and user-friendly way, this book is truly accessible.' Jeni Woods, Quality Manager, Grace Eyre Foundation --------------------------------‘A detailed and methodical approach to data protection. This comprehensive guide is an accessible source of information filled with valid and relevant examples. I found it a particularly great help in getting to grips with specific areas, such as consent and contracts.’ Kirsty Cunningham, Head of Fundraising, St Martin-in-the-Fields Charity‘------------------There are not many people within the charity sector who are specialists in data protection. Paul uses simple, straightforward language to cover all key aspects of this complex but vitally important subject. Brilliantly practical!’ Peter Dean, Director of Finance, Riding for the Disabled Association

    15 in stock

    £27.00

  • Surveillance Valley: The Secret Military History

    Icon Books Surveillance Valley: The Secret Military History

    10 in stock

    Book Synopsis** Featured as a Guardian Long Read **'[A] fast-paced, myth busting exposé' Max Blumenthal, author of The Management of Savagery'Contentious... forceful... salutary' The New YorkerEVERYTHING WE HAVE BEEN TOLD ABOUT THE DEMOCRATIC NATURE OF THE INTERNET IS A MARKETING PLOY.As the Cambridge Analytica scandal has shown, private corporations consider it their right to use our data (and by extension, us) which ever way they see fit. Tempted by their appealing organisational and diagnostic tools, we have allowed private internet corporations access to the most intimate corners of our lives.But the internet was developed, from the outset, as a weapon.Looking at the hidden origins of many internet corporations and platforms, Levine shows that this is a function, not a bug of the online experience. Conceived as a surveillance tool by ARPA to control insurgents in the Vietnam War, the internet is now essential to our lives. This book investigates the troubling and unavoidable truth of its history and the unfathomable power of the corporations who now more or less own it.Without this book, your picture of contemporary society will be missing an essential piece of the puzzle.'A masterful job of research and reporting about the military origins of the 'world wide web' and how its essential nature has not changed in the years since its creation during the Cold War.' - Tim Shorrock, author of Spies For HireTrade ReviewContentious... forceful... salutary * The New Yorker *'Surveillance Valley is perhaps one of the most deeply disturbing books of the year. It leaves no illusions intact ...' -- Scroll.inGripping and hugely readable, Surveillance Valley is an essential book which painstakingly pieces together the complex origins, and current role, of a technology that has become so ingrained in our lives -- All About History

    10 in stock

    £9.99

  • Research Handbook on the Law of Virtual and

    Edward Elgar Publishing Ltd Research Handbook on the Law of Virtual and

    15 in stock

    Book SynopsisThe proliferation of virtual and augmented reality technologies into society raise significant questions for judges, legal institutions, and policy makers. For example, when should activities that occur in virtual worlds, or virtual images that are projected into real space (that is, augmented reality), count as protected First Amendment 'speech'? When should they instead count as a nuisance or trespass? Under what circumstances would the copying of virtual images infringe intellectual property laws, or the output of intelligent virtual avatars be patentable inventions or works of authorship eligible for copyright? And when should a person (or computer) face legal consequences for allegedly harmful virtual acts?The Research Handbook on the Law of Virtual and Augmented Reality addresses these questions and others, drawing upon free speech doctrine, criminal law, the law of data protection and privacy, and of jurisdiction, as well as upon potential legal rights for increasingly intelligent virtual avatars in VR worlds. The Handbook offers a comprehensive look at challenges to various legal doctrines raised by the emergence - and increasing use of - virtual and augmented reality worlds, and at how existing law in the USA, Europe, and other jurisdictions might apply to these emerging technologies, or evolve to address them. It also considers what legal questions about virtual and augmented reality are likely to be important, not just for judges and legal scholars, but also for the established businesses and start-ups that wish to make use of, and help shape, these important new technologies.This comprehensive Research Handbook will be an invaluable reference to those looking to keep pace with the dynamic field of virtual and augmented reality, including students and researchers studying intellectual property law as well as legal practitioners, computer scientists, engineers, game designers, and business owners.Contributors include: W. Barfield, P.S. Berman, M.J. Blitz, S.J. Blodgett-Ford, J. Danaher, W. Erlank, J.A.T. Fairfield, J. Garon, G. Hallevy, B. Lewis, H.Y.F. Lim, C. Nwaneri, S.R. Peppet, M. Risch, A.L. Rossow, J. Russo, M. Supponen, A.M. Underhill, B.D. Wassom, A. Williams, G. YadinTrade Review'The Research Handbook on the Law or Virtual and Augmented Reality is an extraordinary contribution to the scholarship in this rapidly developing area. The work boasts an impressive list of contributors, and the depth and breadth of topics is quite striking. One might think that such a work would be of interest primarily to lawyers involved in the computer game industry, or in law and technology. But this area of law now reaches into daily life, and both practicing attorneys and scholars in the areas of tort law (defamation, privacy law, right of publicity), constitutional law, intellectual property, criminal law, and business law will also find much to interest them, and a great deal of insight to assist them in analyzing the very real questions that this area of law now presents us. Recommended.' --Christine Corcos, Louisiana State University and A&M, USThe Research Handbook on the Law of Virtual and Augmented Reality offers an all-encompassing view on this field of legal research, containing 20 chapters from scholars in US, Asia, and the European Union, that explore how these jurisdictions might apply to VA/R-technologies and apps. Woodrow Barfield and Marc Blitz have edited an outstanding volume that should be read by all, including students and policy makers.' --Ugo Pagallo, Università degli Studi di Torino, ItalyTable of ContentsContents: Section I. Introduction to the Law of Virtual and Augmented Reality 1. The Law of Virtual Reality and Increasingly Smart Virtual Avatars Woodrow Barfield and Alexander Williams 2. Starting Up in Virtual Reality: Examining Virtual Reality as a Space for Innovation Crystal Nwaneri 3. Virtual Rule of Law Michael Risch 4. Mixed Reality: How the Laws of Virtual Worlds Govern Everyday Life Josh A.T. Fairfield Part II Intellectual Property Law 5. Virtual Copyright Michael Risch and Jack Russo 6. Trademark and the Right of Publicity in Augmented Reality Brian D. Wassom, Amber M. Underhill and Andrew L. Rossow 7. Virtual Trade Dress Jack Russo Part III Issues of Constitutional and Criminal Law 8. First Amendment, Video Games and Virtual Marc Jonathan Blitz 9. Virtual Reality, Haptics, and First Amendment Protection for Sexual Sensation Brooke Lewis 10. Augmented and Virtual Reality, Freedom of Expression, and the Personalization of Public Space Marc Jonathan Blitz 11. Beyond Unauthorized Access: Laws of Virtual Reality Hacking Gilad Yadin 12. The Law and Ethics of Virtual Sexual Assault John Danaher 13. Criminal Liability for Intellectual Property Offenses of Artificially Intelligent Entities in Virtual and Augmented Reality Environments Gabriel Hallevy Part IV Applying the Law to Different Applications of Virtual and Augmented Reality 14. Advertising Legal Issues in Virtual and Augmented Reality S. J. Blodgett- Ford, Woodrow Barfield and Alexander Williams 15. Data Privacy Legal Issues in Virtual and Augmented Reality Advertising S. J. Blodgett- Ford and Mirjam Supponen 16. Reordering the Chaos of the Virtual Arena: Harmonizing Law and Framing Collective Bargaining for Avatar Actors and Digital Athletes Jon Garon Part V Contract, Property Law, and Jurisdiction 17. Property Rights in Virtual and Augmented Reality: Second Life Versus Pokémon Go Hannah YeeFen LIM 18. Freedom of Contract in Augmented Reality Scott R. Peppet 19. Law and Property in Virtual Worlds Wian Erlank 20. Legal Jurisdiction and the Deterritorialization of Social Life Paul Schiff Berman Index

    15 in stock

    £255.00

  • The Politics of Personal Information:

    Berghahn Books The Politics of Personal Information:

    Out of stock

    Book Synopsis In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation. During this era of cultural change and political polarization, the expansion, bureaucratization, and computerization of population surveillance disrupted the norms that had governed the exchange and use of personal information in earlier decades and gave rise to a set of distinctly postindustrial social conflicts centered on the use of personal information as a means of social governance in the welfare state. Combining vast archival research with a groundbreaking theoretical analysis, this book gives a definitive account of the politics of personal information in West Germany at the dawn of the information society.Trade Review “This is an important book crafted by a master of intellectual history. It will be widely consumed and discussed among German historians and a wide range of intellectuals interested in the origins of the modern surveillance state. Essential.” • Choice “This book unites disparate episodes in West German history into a careful and illuminating exploration of Germans’ attitudes toward the privacy of their own personal data, the changing implications for those attitudes as technological capacity expands, and the very conception of governmentality as the state inescapably can see more and more into the intimate lives of its citizens.” • Kenneth Ledford, Case Western Reserve University “Frohman has done a truly masterful job of capturing the debates around privacy and surveillance, demonstrating with the help of the West German case how these concepts have evolved alongside information technologies. For those looking for a path forward, a way out of the panopticon or Big Brother’s grasp, the book’s most vital contribution is its use of privacy not only to theorize the information state but to actively contest the new forms of power that state pursues.” • Karrin Hanshew, Michigan State UniversityTable of Contents List of Illustrations List of Abbreviations Acknowledgements Introduction: Surveillance, Privacy, and Power in the Information Society Part I: Population Registration, Power, and Privacy Chapter 1. The Federal Population Registration, Administrative Power, and the Politicization of Privacy Part II: Negotiating Communicative Norms in the Computer Age: The Information Question and the Federal Privacy Protection Law, 1970–1990 Chapter 2. Rethinking Privacy in the Age of the Mainframe: From the Private Sphere to Informational Self-Determination Chapter 3. The Legislative Path to the Federal Privacy Protection Law, 1970-77 Chapter 4. “Only Sheep Let Themselves Be Counted”: The 1983/87 Census Boycotts, the Census Decision, and the Question of Statistical Governance Chapter 5. Out of the Frying Pan and into the Fire: The Census Decision, Party Politics, and the Revision of the Federal Privacy Protection Law Part III: The Precautionary Turn: Security, Surveillance, and the Changing Nature of the State Chapter 6. Paper, Power, and Policing: The Federal Criminal Police on the Cusp of the Computer Age Chapter 7. The Quest for Security and the Meaning of Privacy: Computers, Networks, and the Securitization of Space, Place, Movement, and Identity Chapter 8. Mapping the Radical Milieu: Terrorism, Counterterrorism, and the New Police Surveillance Chapter 9. The Reform of Police Law: Datenschutz, the Defense of Law, and the Debate over Precautionary Surveillance Conclusion Selected Bibliography

    Out of stock

    £99.00

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account