el cat en
База данных: Electronic library
Page 1, Results: 5
Отмеченные записи: 0
1.
Подробнее
DDC 342.7308/58
H 31
Hartzog, Woodrow, (1978-).
Privacy's blueprint : : the battle to control the design of new technologies / / Woodrow Hartzog. - Cambridge, Massachusetts : : Harvard University Press,, ©2018. - 1 online resource : : il. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/CE616B74-D556-4C8E-8720-705068485E73. - ISBN 9780674985124 (electronic bk.). - ISBN 0674985125 (electronic bk.)
Online resource; title from PDF title page (EBSCO, viewed March 15, 2018).
Параллельные издания: Print version: : Hartzog, Woodrow, 1978- Privacy's blueprint. - Cambridge, Massachusetts : Harvard University Press, 2018. - ISBN 9780674976009
Содержание:
Why design is everything -- Privacy law's design gap -- Privacy values in design -- Setting boundaries for design -- A toolkit for privacy design -- Social media -- Hide and seek technologies -- The internet of things.
~РУБ DDC 342.7308/58
Рубрики: Privacy, Right of--United States.
Design and technology--United States.
Data protection--Law and legislation--United States.
LAW--Constitutional.
LAW--Public.
Data protection--Law and legislation.
Design and technology.
Privacy, Right of.
LAW / Privacy
United States.
Аннотация: "Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves--even when the odds are deliberately stacked against them. In Privacy's Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy's Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust."
H 31
Hartzog, Woodrow, (1978-).
Privacy's blueprint : : the battle to control the design of new technologies / / Woodrow Hartzog. - Cambridge, Massachusetts : : Harvard University Press,, ©2018. - 1 online resource : : il. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/CE616B74-D556-4C8E-8720-705068485E73. - ISBN 9780674985124 (electronic bk.). - ISBN 0674985125 (electronic bk.)
Online resource; title from PDF title page (EBSCO, viewed March 15, 2018).
Параллельные издания: Print version: : Hartzog, Woodrow, 1978- Privacy's blueprint. - Cambridge, Massachusetts : Harvard University Press, 2018. - ISBN 9780674976009
Содержание:
Why design is everything -- Privacy law's design gap -- Privacy values in design -- Setting boundaries for design -- A toolkit for privacy design -- Social media -- Hide and seek technologies -- The internet of things.
Рубрики: Privacy, Right of--United States.
Design and technology--United States.
Data protection--Law and legislation--United States.
LAW--Constitutional.
LAW--Public.
Data protection--Law and legislation.
Design and technology.
Privacy, Right of.
LAW / Privacy
United States.
Аннотация: "Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves--even when the odds are deliberately stacked against them. In Privacy's Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy's Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust."
2.
Подробнее
DDC 342.7308/58
Z 64
Ziegler, Mary, (1982-).
Beyond abortion : : Roe v. Wade and the battle for privacy / / Mary Ziegler. - Cambridge, Massachusetts : : Harvard University Press,, ©2018. - 1 online resource (383 pages). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/C1F8A8DB-DE35-41AE-85EB-70D377791C63. - ISBN 9780674919419 (electronic bk.). - ISBN 0674919416 (electronic bk.)
Description based on online resource; title from PDF title page (EBSCO, viewed March 6, 2018).
Содержание:
A history of privacy politics -- Sexual liberty -- Mental illness and the right to refuse treatment -- Deregulation and the future of medicine -- Death, discrimination, and equality -- Conscientious objection, Roe, and the role of the judiciary.
~РУБ DDC 342.7308/58
Рубрики: Privacy, Right of--United States.
Sexual freedom--United States.
Mental health laws--United States.
Terminal care--Law and legislation--United States.
LAW / Constitutional.
LAW / Public.
Mental health laws.
Privacy, Right of.
Sexual freedom.
Terminal care--Law and legislation.
LAW / Privacy
United States.
Аннотация: More than four decades into the culture wars, Roe v. Wade has become shorthand for the American abortion debate. Rights to Privacy: The Forgotten Legacy of Roe v. Wade illuminates an entirely different and unexpected legacy of America's most controversial Supreme Court decision. Drawing on archives and extensive interviews with key participants, Rights to Privacy opens a window onto an intense debate about the right to privacy that continues to this day. In the 1970s and beyond, activists set out bold ideas about government responsibility, sexual consent, consumer rights, digital data, individual identity, and end-of-life care. These unanticipated visions of a right to choose gradually (but never completely) gave way to a more limited freedom from government. Ziegler captures the rise of contemporary ideas about privacy, all the while explaining the continuing hold that this right--and Roe--have on the public imagination.--
Z 64
Ziegler, Mary, (1982-).
Beyond abortion : : Roe v. Wade and the battle for privacy / / Mary Ziegler. - Cambridge, Massachusetts : : Harvard University Press,, ©2018. - 1 online resource (383 pages). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/C1F8A8DB-DE35-41AE-85EB-70D377791C63. - ISBN 9780674919419 (electronic bk.). - ISBN 0674919416 (electronic bk.)
Description based on online resource; title from PDF title page (EBSCO, viewed March 6, 2018).
Содержание:
A history of privacy politics -- Sexual liberty -- Mental illness and the right to refuse treatment -- Deregulation and the future of medicine -- Death, discrimination, and equality -- Conscientious objection, Roe, and the role of the judiciary.
Рубрики: Privacy, Right of--United States.
Sexual freedom--United States.
Mental health laws--United States.
Terminal care--Law and legislation--United States.
LAW / Constitutional.
LAW / Public.
Mental health laws.
Privacy, Right of.
Sexual freedom.
Terminal care--Law and legislation.
LAW / Privacy
United States.
Аннотация: More than four decades into the culture wars, Roe v. Wade has become shorthand for the American abortion debate. Rights to Privacy: The Forgotten Legacy of Roe v. Wade illuminates an entirely different and unexpected legacy of America's most controversial Supreme Court decision. Drawing on archives and extensive interviews with key participants, Rights to Privacy opens a window onto an intense debate about the right to privacy that continues to this day. In the 1970s and beyond, activists set out bold ideas about government responsibility, sexual consent, consumer rights, digital data, individual identity, and end-of-life care. These unanticipated visions of a right to choose gradually (but never completely) gave way to a more limited freedom from government. Ziegler captures the rise of contemporary ideas about privacy, all the while explaining the continuing hold that this right--and Roe--have on the public imagination.--
3.
Подробнее
DDC 342.7308/58
R 82
Rothman, Jennifer E. , (1969-).
The right of publicity : : privacy reimagined for a public world / / Jennifer E. Rothman. - 4159/9780674986336. - Cambridge, Massachusetts : : Harvard University Press,, ©2018. - 1 online resource ( час. мин.), 4159/9780674986336. - In English. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/033C9495-7B06-47D2-859C-4EC5A6F72C79. - ISBN 9780674986336 (electronic bk.). - ISBN 0674986334 (electronic bk.). - ISBN 0674986350. - ISBN 9780674986350
Print version record.
Параллельные издания: Print version: : Rothman, Jennifer E., 1969- Right of publicity. - Cambridge, Massachusetts : Harvard University Press, 2018. - ISBN 9780674980983
Содержание:
Part I. The big bang: The original "right of publicity" -- From the ashes of privacy -- A star is born -- Part II. The inflationary era: A star explodes -- A star expands -- Part III. Dark matter: The (in)alienable right of publicity -- The black hole of the First Amendment -- A collision course with copyright -- Epilogue: The big crunch.
~РУБ DDC 342.7308/58
Рубрики: Publicity (Law)--United States.
Privacy, Right of--United States.
Personality (Law)--United States.
Intellectual property--United States.
LAW--Constitutional.
LAW--Public.
Intellectual property.
Personality (Law)
Privacy, Right of.
Publicity (Law)
LAW / Privacy
United States.
Аннотация: The Right of Publicity: Privacy Reimagined for a Public World provides the first serious scholarly analysis of an increasingly important legal claim--the right of publicity. This unwieldy law, often the darling of celebrities, protects against the use of a person's identity without permission. Often erroneously thought to have been created in the 1950s, the law has expanded into a new type of intellectual property right that limits free speech and interferes with authors' use of copyrighted works. Most troublingly, the right of publicity now threatens to undermine the very rights of the individuals it was designed to protect. By revisiting the real story of how the right of publicity came to be what it is today, the author provides a path forward for limiting the right. The book tackles a host of current issues, from the use of celebrities' images on merchandise and in social media, to claims by student-athletes that they should be paid when their likenesses appear in videogames and photographs, to the objections of subscribers to the use of their names and images in sponsored advertisements in social media, to efforts to get one's image and name removed from revenge porn and mugshot websites, to the taxation and control of dead celebrities' lucrative identities.--
R 82
Rothman, Jennifer E. , (1969-).
The right of publicity : : privacy reimagined for a public world / / Jennifer E. Rothman. - 4159/9780674986336. - Cambridge, Massachusetts : : Harvard University Press,, ©2018. - 1 online resource ( час. мин.), 4159/9780674986336. - In English. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/033C9495-7B06-47D2-859C-4EC5A6F72C79. - ISBN 9780674986336 (electronic bk.). - ISBN 0674986334 (electronic bk.). - ISBN 0674986350. - ISBN 9780674986350
Print version record.
Параллельные издания: Print version: : Rothman, Jennifer E., 1969- Right of publicity. - Cambridge, Massachusetts : Harvard University Press, 2018. - ISBN 9780674980983
Содержание:
Part I. The big bang: The original "right of publicity" -- From the ashes of privacy -- A star is born -- Part II. The inflationary era: A star explodes -- A star expands -- Part III. Dark matter: The (in)alienable right of publicity -- The black hole of the First Amendment -- A collision course with copyright -- Epilogue: The big crunch.
Рубрики: Publicity (Law)--United States.
Privacy, Right of--United States.
Personality (Law)--United States.
Intellectual property--United States.
LAW--Constitutional.
LAW--Public.
Intellectual property.
Personality (Law)
Privacy, Right of.
Publicity (Law)
LAW / Privacy
United States.
Аннотация: The Right of Publicity: Privacy Reimagined for a Public World provides the first serious scholarly analysis of an increasingly important legal claim--the right of publicity. This unwieldy law, often the darling of celebrities, protects against the use of a person's identity without permission. Often erroneously thought to have been created in the 1950s, the law has expanded into a new type of intellectual property right that limits free speech and interferes with authors' use of copyrighted works. Most troublingly, the right of publicity now threatens to undermine the very rights of the individuals it was designed to protect. By revisiting the real story of how the right of publicity came to be what it is today, the author provides a path forward for limiting the right. The book tackles a host of current issues, from the use of celebrities' images on merchandise and in social media, to claims by student-athletes that they should be paid when their likenesses appear in videogames and photographs, to the objections of subscribers to the use of their names and images in sponsored advertisements in social media, to efforts to get one's image and name removed from revenge porn and mugshot websites, to the taxation and control of dead celebrities' lucrative identities.--
4.
Подробнее
DDC 025.0425
B 35
Beckstrom, Matthew,.
Casting light on the dark web : : a guide for safe exploration / / Matthew Beckstrom, Brady Lund. - Lanham, Maryland : : Rowman & Littlefield,, [2019]. - 1 online resource (xvi, 116 pages). : il. - (Rowman & Littlefield's LITA guides). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/6B930A85-6892-466A-919A-B6E84093F052. - ISBN 1538120941 (electronic book). - ISBN 9781538120941 (electronic book)
Description based on online resource; title from digital title page (viewed on September 19, 2019).
Параллельные издания: Print version: : Beckstrom, Matthew, author. Casting light on the dark web. - Lanham, Maryland : Rowman & Littlefield, [2019]. - ISBN 9781538120934
Содержание:
What is the dark web? -- Ways to access the dark web -- What is the value of the dark web? -- What can it do for me? -- History of the internet and dark web -- Beginner's overview of information theory -- Basic history of the internet -- Understanding privacy needs on the early internet -- From the deep web to the dark web -- Tor -- Freenet -- I2P -- How it works : The dark details -- Understanding the internet -- The dark web -- Distinguishing fact from fiction : Is the dark web really dark? -- How do we define the dark web? -- Myth 1: The dark web is the place where terrorists go to buy weapons and plan attacks -- Myth 2 : The dark web is mostly a marketplace for illicit drugs -- Myth 3 : The dark web has no value to an 'upstanding' citizen -- Myth 4 : It is illegal to use the dark web -- Myth 5 : The dark web will steal my personal information -- Myth 6 : I need to buy some special hardware or software in order to use the dark web -- Some prominent reports on the dark web -- How to access the dark web -- How to install Tor -- How to install Freenet -- How to install I2P -- Similarities and differences between platforms -- Choosing which platform to use -- Is installing the dark web legal? -- Should I allow my child download a dark web platform? -- How to browse using the dark web -- How to browse Tor -- How to browse Freenet -- How to browse I2P -- Brief history of dark websites -- Major dark websites -- Legal and ethical issues with the dark web -- History of legal and ethical issues on the dark web -- Examples of the illegal content available on the dark web -- How to avoid illegal content on the dark web -- Limiting others' access to illegal content on the dark web -- Can the dark web be taken down? Why you should care -- Research and advocacy on the dark web -- Dark web research -- Infrastructure -- Advocacy -- Financial opportunity -- Reaping the rewards of the dark web -- A tale of internet past -- The big pitch -- Final words -- The end.
~РУБ DDC 025.0425
Рубрики: Invisible Web--Safety measures.
Dark Web--Safety measures.
Internet searching.
Privacy, Right of.
Internet searching.
Privacy, Right of.
Аннотация: "This book is an easy-to-read and comprehensive guide to understanding how the Dark Web works and why you should be using it! Readers are led on a tour from how to download the platform for personal or public use, to how it can best be utilized for finding information. This guide busts myths and informs readers, remaining jargon-free"--
Доп.точки доступа:
Lund, Brady, (1994-) \author.\
B 35
Beckstrom, Matthew,.
Casting light on the dark web : : a guide for safe exploration / / Matthew Beckstrom, Brady Lund. - Lanham, Maryland : : Rowman & Littlefield,, [2019]. - 1 online resource (xvi, 116 pages). : il. - (Rowman & Littlefield's LITA guides). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/6B930A85-6892-466A-919A-B6E84093F052. - ISBN 1538120941 (electronic book). - ISBN 9781538120941 (electronic book)
Description based on online resource; title from digital title page (viewed on September 19, 2019).
Параллельные издания: Print version: : Beckstrom, Matthew, author. Casting light on the dark web. - Lanham, Maryland : Rowman & Littlefield, [2019]. - ISBN 9781538120934
Содержание:
What is the dark web? -- Ways to access the dark web -- What is the value of the dark web? -- What can it do for me? -- History of the internet and dark web -- Beginner's overview of information theory -- Basic history of the internet -- Understanding privacy needs on the early internet -- From the deep web to the dark web -- Tor -- Freenet -- I2P -- How it works : The dark details -- Understanding the internet -- The dark web -- Distinguishing fact from fiction : Is the dark web really dark? -- How do we define the dark web? -- Myth 1: The dark web is the place where terrorists go to buy weapons and plan attacks -- Myth 2 : The dark web is mostly a marketplace for illicit drugs -- Myth 3 : The dark web has no value to an 'upstanding' citizen -- Myth 4 : It is illegal to use the dark web -- Myth 5 : The dark web will steal my personal information -- Myth 6 : I need to buy some special hardware or software in order to use the dark web -- Some prominent reports on the dark web -- How to access the dark web -- How to install Tor -- How to install Freenet -- How to install I2P -- Similarities and differences between platforms -- Choosing which platform to use -- Is installing the dark web legal? -- Should I allow my child download a dark web platform? -- How to browse using the dark web -- How to browse Tor -- How to browse Freenet -- How to browse I2P -- Brief history of dark websites -- Major dark websites -- Legal and ethical issues with the dark web -- History of legal and ethical issues on the dark web -- Examples of the illegal content available on the dark web -- How to avoid illegal content on the dark web -- Limiting others' access to illegal content on the dark web -- Can the dark web be taken down? Why you should care -- Research and advocacy on the dark web -- Dark web research -- Infrastructure -- Advocacy -- Financial opportunity -- Reaping the rewards of the dark web -- A tale of internet past -- The big pitch -- Final words -- The end.
Рубрики: Invisible Web--Safety measures.
Dark Web--Safety measures.
Internet searching.
Privacy, Right of.
Internet searching.
Privacy, Right of.
Аннотация: "This book is an easy-to-read and comprehensive guide to understanding how the Dark Web works and why you should be using it! Readers are led on a tour from how to download the platform for personal or public use, to how it can best be utilized for finding information. This guide busts myths and informs readers, remaining jargon-free"--
Доп.точки доступа:
Lund, Brady, (1994-) \author.\
5.
Подробнее
DDC 005.8
S 43
Security, privacy, and forensics issues in big data / / [edited by] Ramesh C. Joshi, Brij B. Gupta. - 4018/978-1-5225-9742-1. - Hershey, Pennsylvania : : IGI Global,, [2020]. - 1 online resource. ( час. мин.), 4018/978-1-5225-9742-1. - (Advances in Information Security, Privacy, and Ethics (AISPE) Book Series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A950C774-1418-44B4-A065-AC99B7006896. - ISBN 1522597441 (electronic book). - ISBN 9781522597445 (electronic bk.)
Description based on online resource; title from digital title page (viewed on December 02, 2019).
Параллельные издания: Print version: :
Содержание:
Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution.
~РУБ DDC 005.8
Рубрики: Big data.
Cyber intelligence (Computer security)
Privacy, Right of.
Digital forensic science.
Big data.
Cyber intelligence (Computer security)
Digital forensic science.
Privacy, Right of.
Аннотация: "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--
Доп.точки доступа:
Joshi, R. C., \editor.\
Gupta, Brij, (1982-) \editor.\
IGI Global,
S 43
Security, privacy, and forensics issues in big data / / [edited by] Ramesh C. Joshi, Brij B. Gupta. - 4018/978-1-5225-9742-1. - Hershey, Pennsylvania : : IGI Global,, [2020]. - 1 online resource. ( час. мин.), 4018/978-1-5225-9742-1. - (Advances in Information Security, Privacy, and Ethics (AISPE) Book Series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A950C774-1418-44B4-A065-AC99B7006896. - ISBN 1522597441 (electronic book). - ISBN 9781522597445 (electronic bk.)
Description based on online resource; title from digital title page (viewed on December 02, 2019).
Параллельные издания: Print version: :
Содержание:
Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution.
Рубрики: Big data.
Cyber intelligence (Computer security)
Privacy, Right of.
Digital forensic science.
Big data.
Cyber intelligence (Computer security)
Digital forensic science.
Privacy, Right of.
Аннотация: "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--
Доп.точки доступа:
Joshi, R. C., \editor.\
Gupta, Brij, (1982-) \editor.\
IGI Global,
Page 1, Results: 5