Engaging Privacy and Information Technology in a Digital Age
Title | Engaging Privacy and Information Technology in a Digital Age PDF eBook |
Author | National Research Council |
Publisher | National Academies Press |
Pages | 450 |
Release | 2007-06-28 |
Genre | Computers |
ISBN | 0309134005 |
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.
Engaging Privacy and Information Technology in a Digital Age
Title | Engaging Privacy and Information Technology in a Digital Age PDF eBook |
Author | National Research Council |
Publisher | National Academies Press |
Pages | 451 |
Release | 2007-07-28 |
Genre | Computers |
ISBN | 0309103924 |
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.
The Digital Person
Title | The Digital Person PDF eBook |
Author | Daniel J Solove |
Publisher | NYU Press |
Pages | 295 |
Release | 2004 |
Genre | Computers |
ISBN | 0814740375 |
Daniel Solove presents a startling revelation of how digital dossiers are created, usually without the knowledge of the subject, & argues that we must rethink our understanding of what privacy is & what it means in the digital age before addressing the need to reform the laws that regulate it.
How's Life in the Digital Age? Opportunities and Risks of the Digital Transformation for People's Well-being
Title | How's Life in the Digital Age? Opportunities and Risks of the Digital Transformation for People's Well-being PDF eBook |
Author | OECD |
Publisher | OECD Publishing |
Pages | 176 |
Release | 2019-02-26 |
Genre | |
ISBN | 9264311807 |
This report documents how the ongoing digital transformation is affecting people’s lives across the 11 key dimensions that make up the How’s Life? Well-being Framework (Income and wealth, Jobs and earnings, Housing, Health status, Education and skills, Work-life balance, Civic engagement and ...
Protecting Individual Privacy in the Struggle Against Terrorists
Title | Protecting Individual Privacy in the Struggle Against Terrorists PDF eBook |
Author | National Research Council |
Publisher | National Academies Press |
Pages | 376 |
Release | 2008-09-26 |
Genre | Computers |
ISBN | 0309134447 |
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
Information Technology Control and Audit
Title | Information Technology Control and Audit PDF eBook |
Author | Sandra Senft |
Publisher | CRC Press |
Pages | 804 |
Release | 2008-11-18 |
Genre | Computers |
ISBN | 1420065548 |
The headline-grabbing financial scandals of recent years have led to a great urgency regarding organizational governance and security. Information technology is the engine that runs modern organizations, and as such, it must be well-managed and controlled. Organizations and individuals are dependent on network environment technologies, increasing t
Information Technology Control and Audit, Third Edition
Title | Information Technology Control and Audit, Third Edition PDF eBook |
Author | Sandra Senft |
Publisher | CRC Press |
Pages | 803 |
Release | 2010-12-12 |
Genre | Computers |
ISBN | 1439838607 |
The headline-grabbing financial scandals of recent years have led to a great urgency regarding organizational governance and security. Information technology is the engine that runs modern organizations, and as such, it must be well-managed and controlled. Organizations and individuals are dependent on network environment technologies, increasing the importance of security and privacy. The field has answered this sense of urgency with advances that have improved the ability to both control the technology and audit the information that is the lifeblood of modern business. Reflects the Latest Technological Advances Updated and revised, this third edition of Information Technology Control and Audit continues to present a comprehensive overview for IT professionals and auditors. Aligned to the CobiT control objectives, it provides a fundamental understanding of IT governance, controls, auditing applications, systems development, and operations. Demonstrating why controls and audits are critical, and defining advances in technology designed to support them, this volume meets the increasing need for audit and control professionals to understand information technology and the controls required to manage this key resource. A Powerful Primer for the CISA and CGEIT Exams Supporting and analyzing the CobiT model, this text prepares IT professionals for the CISA and CGEIT exams. With summary sections, exercises, review questions, and references for further readings, it promotes the mastery of the concepts and practical implementation of controls needed to effectively manage information technology resources. New in the Third Edition: Reorganized and expanded to align to the CobiT objectives Supports study for both the CISA and CGEIT exams Includes chapters on IT financial and sourcing management Adds a section on Delivery and Support control objectives Includes additional content on audit and control of outsourcing, change management, risk management, and compliance