Privacy Library: Books
◈ Last edit: Mar 14, 2021
◈ 298 Privacy-related Books
◈ Textbooks, Research, & Fiction

Unique data. Hand-curated.
Privacy Library: Books
Short Title | Year | Author(s) | Format | Content | Tag | Surveil | Infosec | Amazon | GoodRead | LINK 1 | LINK 2 | LINK 3 | Audible | Source | Publisher | Rating | Votes | Image | Pages | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1984 | 1949 | 1984 | George Orwell | $7 | Book/Audio | Fiction: Literature & Fiction > Genre Fiction | x | a classic literary example of political and dystopian fiction. Many terms used in the novel have entered common usage, including Big Brother, doublethink, thoughtcrime, Newspeak, Room 101, telescreen, 2 + 2 = 5, prole, and memory hole. Nineteen Eighty-Four also popularised the adjective "Orwellian", connoting things such as official deception, secret surveillance, brazenly misleading terminology, and manipulation of recorded history by a totalitarian or authoritarian state. | https://www.amazon.com/1984-Signet-Classics-George-Orwell/dp/0451524934 | Amazon | LINK1 | LINK2 | https://en.wikipedia.org/wiki/Nineteen_Eighty-Four | https://www.sparknotes.com/lit/1984/ | AUD | https://www.audible.com/pd/1984-Audiobook/B002V19RO6?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/1984-Signet-Classics-George-Orwell/dp/0451524934 | Privacy Stan | https://twitter.com/Privacy_Stan | Simon Prebble | 682 | 9780451524935,978-0451524935 | 4.7 | 32407 | https://www.amazon.com/George-Orwell/e/B000AQ0KKY/ref=dp_byline_cont_book_1 | Cover | English | 328 | BEST | ||||||||||||
2020 California Consumer Privacy Act (CCPA) Definitive Guide | 2019 | The 2020 California Consumer Privacy Act (CCPA) Definitive Guide: An Applied Solution Using NIST 800-171 | Mark A. Russo | $35 | Book | Law > Business | CCPA | x | In this edition we have included information and changes affecting businesses attempting to meet the current CCPA deadlines. The author has included an additional chapter on current 2019-2020 amendments, and provides a plain-English interpretation for the reader. Understanding what the CCPA is and how to effectively apply the NIST 800-171 Security Framework is the approach of this how-to guide. The 2020 California Consumer Privacy Act (CCPA) Guide designed to provide clear direction and understanding of how to implement the CCPA either in a business, agency or organization. The CCPA provides provisions specific to California residents and the companies regarding the 2018 compulsory law to protect personal information statewide. While NIST 800-series cybersecurity publications tell a business “what” is required, they do not necessarily help in telling “how” to meet the 110 security control requirements in NIST 800-171. This book is also written to explain what the National Institute of Standards and Technology (NIST) 800-171 security controls require and how to meet them effectively for the purposes of CCPA compliance. And, will walk you and your IT staff through the security controls in enough detail to ensure a complete and "good faith" security effort has occurred.Mr. Russo is the former Chief Information Security Officer (CISO) for the Department of Education where he and his team were responsible for closing over 95% of the outstanding security findings identified by the House Oversight Committee in 2016 . He was also a Senior Information Security Engineer with the Department of Defense's (DOD) F-35 Joint Strike Fighter program. He has an extensive background in cybersecurity and is an expert in the Risk Management Framework (RMF) and DOD Instruction 8510 which implements RMF throughout the DOD and the federal government. He holds both a Certified Information Systems Security Professional (CISSP) certification and a CISSP in information security architecture (ISSAP). He holds a 2017 certification as a Chief Information Security Officer (CISO) from the National Defense University, Washington, DC. He retired from the US Army Reserves in 2012 as the Senior Intelligence Officer.He speaks regularly within the federal government and Intelligence Community on advanced topics regarding the evolution of cybersecurity in the 21st Century. | https://www.amazon.com/California-Consumer-Privacy-Definitive-Guide/dp/1688805036/ref=tmm_pap_swatch_0 | Amazon | https://www.amazon.com/California-Consumer-Privacy-Definitive-Guide/dp/1688805036/ref=tmm_pap_swatch_0 | CIPP/M IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPM_Authoritative_Resource_List_4.1.0.pdf | 1688805036, 978-1688805033 | Paperback : 283 pages | Independently published (August 27, 2019) | Independently published | 27-Aug-2019 | 4 | 3 | Cover | BEST | ||||||||||||||||||
99 Privacy Breaches to Beware of | 2018 | 99 Privacy Breaches to Beware of: Practical Data Protection Tips from Real-Life Experiences | Kevin Shepherdson, William Hioe, Lynn Boxall | $15 | Book | Data protection laws are new in Singapore, Malaysia, Philippines, Indonesia and Thailand. In Europe, the General Data Protection Regulation (GDPR) ― a single law across all of EU – comes into force from May 2018. There are also strict laws in the US that govern the processing of personal data. / Over a hundred countries in the world have a comprehensive data protection law and it is very easy for individuals and companies to breach these laws. Data or privacy breaches are on the rise and businesses can be prosecuted under data protection laws. Fines for non-compliance can be from S$1 million in Singapore, up to three years jail in Malaysia, and up to 4% of global revenues for EU countries. / The focus on this book is operational compliance. The book is for everyone as all of us in the course of our daily work process personal data. Organised into sections, each idea provides practical advice and examples of how a breach of the law may happen. Examples cover HR, Finance, Admin, Marketing, etc, allowing the reader to relate to his or her own area of work | https://www.amazon.com/Privacy-Breaches-Beware-Protection-Experiences-ebook/dp/B07JZD5599 | Amazon | https://www.amazon.com/Privacy-Breaches-Beware-Protection-Experiences-ebook/dp/B07JZD5599 | CIPP/M IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPM_Authoritative_Resource_List_4.1.0.pdf | 9814794643 | 520 pages | Marshall Cavendish International (Asia) Pte Ltd; 2nd Edition | Marshall Cavendish International | (Asia) Pte Ltd; 2nd Edition | BEST | ||||||||||||||||||||||||
A Democratic Conception of Privacy | 2013 | A Democratic Conception of Privacy | Annabelle Lever | Book | Textbooks > Humanities | https://www.amazon.com/Democratic-Conception-Privacy-Annabelle-Lever/dp/149187838X | Amazon | https://www.amazon.com/Democratic-Conception-Privacy-Annabelle-Lever/dp/149187838X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 149187838X,978-1491878385 | https://www.amazon.com/Annabelle-Lever/e/B00580SXHO/ref=dp_byline_cont_book_1 | Cover | English | 174 | BEST | |||||||||||||||||||||||||
A Scanner Darkly | 2006 | A Scanner Darkly | Richard Linklater | Movie | Action, Adventure, Drama, Fantasy, Science Fiction | x | Set in suburban Orange County, California, in a future where America has lost the war on drugs, one reluctant undercover cop (Reeves) is ordered to start spying on his friends. | https://www.amazon.com/Scanner-Darkly-Keanu-Reeves/dp/B000M0QMQY | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0405296/ | https://www.amazon.com/Scanner-Darkly-Widescreen-Keanu-Reeves/dp/B000JMK6LW | https://en.wikipedia.org/wiki/A_Scanner_Darkly_(film) | https://www.amazon.com/Scanner-Darkly-Keanu-Reeves/dp/B000M0QMQY | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||
Active Measures | 2020 | Active Measures | Thomas Rid | Book/Audio | Politics & Social Sciences > Politics & Government | Disinformation | https://www.amazon.com/Active-Measures-History-Disinformation-Political/dp/0374287260 | Amazon | GR | https://www.goodreads.com/book/show/38524785-antisocial-media | AUD | https://www.audible.com/pd/Active-Measures-Audiobook/1250261678?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/Active-Measures-History-Disinformation-Political/dp/0374287260 | Privacy Stan | https://twitter.com/Privacy_Stan | Derek Perkins | 885 | 0374287260 (ISBN13: 9780374287269) | 4.25 · Rating details · 325 ratings · 41 reviews | Hardcover, 528 pages | Published April 21st 2020 by Farrar, Straus and Giroux | Farrar, Straus and Giroux | 21-Apr-2020 | 4.5 | 216 | https://www.amazon.com/Thomas-Rid/e/B001HOFGX4/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||
After Snowden | 2015 | After Snowden: Privacy, Secrecy, and Security in the Information Age | Ronald Goldfarb (editor) | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/gp/product/125006760X | Amazon | https://www.amazon.com/gp/product/125006760X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.7 | 4 | Cover | BEST | |||||||||||||||||||||||||||
Age of Surveillance Capitalism | 2019 | Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power | Shoshana Zuboff | $20 | Book/Audio | x | The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. / In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. / Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." / The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. / With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it. | https://www.amazon.com/gp/product/1610395697 | Amazon | AUD | https://www.audible.com/pd/The-Age-of-Surveillance-Capitalism-Audiobook/1478947276?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/gp/product/1610395697 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Nicol Zanzarella | 1456 | 1610395697, 978-1610395694 | Hardcover : 704 pages | PublicAffairs; 1st edition (January 15, 2019) | PublicAffairs | 15-Jan-2019 | 1st edition | BEST | ||||||||||||||||||
AI & Privacy | 2021 | AI & Privacy: How To Find Balance | Punit Bhatia, Eline Chivot | Book | AI | We are going through a pandemic that is driving the world into a digital era. Automation and artificial intelligence (AI) are becoming standard practice for many organizations. At the same time, debates over the impact of AI on our daily lives have triggered an increased focus on the protection of individual privacy. The core objective of this book is to help you go beyond the debate and navigate the complexities of privacy and AI. This book is designed to assist you in learning ideas, principles, and frameworks about how to make decisions which balance privacy compliance and the use of AI systems. This book will answer the following questions: ✅ What are the common principles of privacy and AI? ✅ What frameworks are available for AI governance and development? ✅ How are challenging scenarios handled in a practical way? ✅ How are initiatives evaluated using an all-encompassing framework? ✅ What are the critical success factors for AI use? | https://www.amazon.com/AI-Privacy-How-Find-Balance-ebook/dp/B08XPSBM28/ref=sr_1_1 | Amazon | https://www.amazon.com/AI-Privacy-How-Find-Balance-ebook/dp/B08XPSBM28/ref=sr_1_1 | Privacy Stan | https://twitter.com/Privacy_Stan | Cover | BEST | ||||||||||||||||||||||||||||
AI Superpowers | 2018 | AI Superpowers: China, Silicon Valley, And The New World Order | Kai-Fu Lee | Book/Audio | Computers & Technology > Computer Science | AI | In AI Superpowers, Kai-fu Lee argues powerfully that because of these unprecedented developments in AI, dramatic changes will be happening much sooner than many of us expected. Indeed, as the US-Sino AI competition begins to heat up, Lee urges the US and China to both accept and to embrace the great responsibilities that come with significant technological power. Most experts already say that AI will have a devastating impact on blue-collar jobs. But Lee predicts that Chinese and American AI will have a strong impact on white-collar jobs as well. Is universal basic income the solution? In Lee’s opinion, probably not. But he provides a clear description of which jobs will be affected and how soon, which jobs can be enhanced with AI, and most importantly, how we can provide solutions to some of the most profound changes in human history that are coming soon. | https://www.amazon.com/AI-Superpowers-China-Silicon-Valley/dp/132854639X | Amazon | GR | https://www.goodreads.com/book/show/38242135-ai-superpowers | LINK1 | https://www.aisuperpowers.com/ | AUD | https://www.audible.com/pd/AI-Superpowers-Audiobook/1978632835 | https://www.amazon.com/AI-Superpowers-China-Silicon-Valley/dp/132854639X | Dominga Leone CIPP/E CIPM | https://www.linkedin.com/in/dlcipm/ | 4.5 | 1232 | https://www.amazon.com/Kai-Fu-Lee/e/B001K8QZ8C/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||
Aisles Have Eyes | 2018 | The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power | Joseph Turow | Book | Engineering & Transportation > Engineering | https://www.amazon.com/gp/product/0300212194 | Amazon | https://www.amazon.com/gp/product/0300212194 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4 | 31 | https://www.amazon.com/Joseph-Turow/e/B003VSKC1U/ref=dp_byline_cont_book_1 | BEST | |||||||||||||||||||||||||||
American Privacy | 2009 | American Privacy: The 400-Year History of Our Most Contested Right | Frederick S. Lane | Book | Textbooks > Humanities | As America reacts to Edward Snowden’s leaks about NSA surveillance, American Privacy offers a timely look at our national experience with the right to privacy. | https://www.amazon.com/American-Privacy-400-Year-History-Contested/dp/0807044415/ref=sr_1_1 | Amazon | https://www.amazon.com/American-Privacy-400-Year-History-Contested/dp/0807044415/ref=sr_1_1 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.6 | https://www.amazon.com/Frederick-S-Lane/e/B001H6IJSQ/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
An Artificial Revolution | 2020 | An Artificial Revolution: On Power, Politics and AI | Ivana Bartoletti | Book | Politics & Social Sciences > Politics & Government | AI | Privacy consultant and AI expert Ivana Bartoletti explores the urgent existential threat that artificial intelligence poses to international social justice When most people think about AI, they think about the future—from driverless cars and smart cities to HAL 9000 and the Terminator—and are unaware that AI is already creating a dystopian present. The third book in the Mood Indigo series argues that the rapid growth of the AI industry is threatening to undo decades of progress in human rights and global equality. AI has unparalleled transformative potential to reshape society, our economies and our working lives, but without legal scrutiny, international oversight and public debate, we are sleepwalking into a future written by algorithms which encode racist, sexist and classist biases into our daily lives. This book exposes the reality of the AI revolution, from the low-paid workers who toil to train algorithms to recognize cancerous polyps, to the rise of techno-racism and techno-chauvinism and the symbiotic relationship between AI and right wing populism. | https://www.amazon.com/Artificial-Revolution-Power-Politics-Indigo/dp/191164811X | Amazon | GR | https://www.goodreads.com/book/show/51561410-an-artificial-revolution | LINK1 | LINK2 | https://www.theindigopress.com/shop/an-artificial-revolution-on-power-politics-and-ai | https://books.google.com/books/about/An_Artificial_Revolution.html?id=vppezQEACAAJ | https://www.amazon.com/Artificial-Revolution-Power-Politics-Indigo/dp/191164811X | Dominga Leone CIPP/E CIPM | https://www.linkedin.com/in/dlcipm/ | 4.3 | 30 | https://www.amazon.com/Ivana-Bartoletti/e/B0892PC8CH/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||
An Introduction to Privacy for Technology Professionals | 2020 | An Introduction to Privacy for Technology Professionals | Travis Breaux | $75 | Book | Textbook | GR | https://www.goodreads.com/book/show/53969570-an-introduction-to-privacy-for-technology-professionals | LINK1 | LINK2 | https://iapp.org/store/books/a191P000003nSYrQAM/ | https://books.google.com/books/about/An_Introduction_to_Privacy_for_Technolog.html?id=aubIygEACAAJ | https://www.goodreads.com/book/show/53969570-an-introduction-to-privacy-for-technology-professionals | CIPP/T IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPT_Authoritative_Resource_List_4.1.0.pdf | 9781948771900 | Paperback, 420 pages | Published 2020 by International Association of Privacy Professionals | IAPP | 12-Jul-1905 | BEST | ||||||||||||||||||||
Antisocial Media | 2018 | Antisocial Media | Siva Vaidhyanathan | Book/Audio | Politics & Social Sciences > Social Sciences | Disinformation | https://www.amazon.com/Antisocial-Media-Disconnects-Undermines-Democracy/dp/0190841168 | Amazon | GR | https://www.goodreads.com/book/show/38524785-antisocial-media | AUD | https://www.audible.com/pd/Antisocial-Media-Audiobook/B07FK29GYJ?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/Antisocial-Media-Disconnects-Undermines-Democracy/dp/0190841168 | Privacy Stan | https://twitter.com/Privacy_Stan | Jack Garrett | 620 | 0190841168 (ISBN13: 9780190841164) | 3.97 · Rating details · 398 ratings · 74 reviews | Hardcover, 288 pages | Published June 21st 2018 by Oxford University Press (first published May 15th 2018) | Oxford University Press | 21-Jun-2018 | first published May 15th 2018 | 4.4 | 91 | https://www.amazon.com/Siva-Vaidhyanathan/e/B001HD3XQC/ref=dp_byline_cont_book_1 | Cover | English | 288 | BEST | ||||||||||
Architecture of Privacy | 2015 | The Architecture of Privacy | Courtney Bowman, Ari Gesher, John K Grant, Daniel Slate, & Elissa Lerner | Book | https://www.amazon.com/gp/product/1491904011 | Amazon | https://www.amazon.com/gp/product/1491904011 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Art of Invisibility | 2017 | The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data | Kevin Mitnick & Robert Vamosi | Book/Audio | Computers & Technology > Networking & Cloud Computing | x | Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility" -- online and real-world tactics to protect you and your family, using easy step-by-step instructions. / Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. / The world's most famous -- and formerly the US government's most wanted -- computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes; privacy is a power you deserve and need in the age of Big Brother and Big Data. | https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380504 | Amazon | GR | https://www.goodreads.com/book/show/30363785-the-art-of-invisibility | LINK1 | https://books.google.com/books/about/The_Art_of_Invisibility.html?id=nBBeDAAAQBAJ&source=kp_book_description | AUD | https://www.audible.com/pd/The-Art-of-Invisibility-Audiobook/B01N80UK3J?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=77PP376DVNG0FHJ2QH4C | https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380504 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Ray Porter | 557 | 4.6 | 1119 | Cover | BEST | |||||||||||||||||
Artificial Unintelligence | 2018 | Artificial Unintelligence: How Computers Misunderstand the World | Meredith Broussard | Book | Computers & Technology > Computer Science | https://www.amazon.com/gp/product/0262038005 | Amazon | https://www.amazon.com/gp/product/0262038005 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.4 | 74 | https://www.amazon.com/Meredith-Broussard/e/B004FVFDAC/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Asian Data Privacy Laws | 2014 | Asian Data Privacy Laws: Trade and Human Rights Perspectives | Graham Greenleaf | Book | Computers & Technology > History & Culture | https://www.amazon.com/Asian-Data-Privacy-Laws-Perspectives/dp/0199679665 | Amazon | https://www.amazon.com/Asian-Data-Privacy-Laws-Perspectives/dp/0199679665 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 199679665,978-0199679669 | 4.8 | https://www.amazon.com/Graham-Greenleaf/e/B07G46M1LW/ref=dp_byline_cont_book_1 | Cover | English | 624 | BEST | ||||||||||||||||||||||||
Assault on Privacy | 1972 | The Assault on Privacy | Arthur Miller | Book | Law > Constitutional Law | https://www.amazon.com/ASSAULT-PRIVACY-Computers-Banks-Dossiers/dp/B001OMSNV6 | Amazon | https://www.amazon.com/ASSAULT-PRIVACY-Computers-Banks-Dossiers/dp/B001OMSNV6 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Cover | BEST | |||||||||||||||||||||||||||||
At Home | 2010 | At Home: A Short History of Private Life | Bill Bryson | Book | Arts & Photography > Architecture | https://www.amazon.com/At-Home-Short-History-Private/dp/0767919394 | Amazon | https://www.amazon.com/At-Home-Short-History-Private/dp/0767919394 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.6 | 2391 | https://www.amazon.com/Bill-Bryson/e/B000APXTVM/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Attack Surface | 2020 | Attack Surface | Cory Doctorow | $22 | Book | Fiction: Mystery, Thriller & Suspense > Thrillers & Suspense | https://www.amazon.com/Attack-Surface-Cory-Doctorow/dp/1250757533 | Amazon | GR | https://www.goodreads.com/book/show/49247283-attack-surface | LINK1 | https://us.macmillan.com/books/9781250757531 | https://www.amazon.com/Attack-Surface-Cory-Doctorow/dp/1250757533 | Privacy Stan | https://twitter.com/Privacy_Stan | 1250757533,978-1250757531 | 4.5 | 233 | https://www.amazon.com/Cory-Doctorow/e/B001I9RSKC/ref=dp_byline_cont_book_1 | Cover | English | 384 | BEST | ||||||||||||||||||
Attention Merchants | 2016 | The Attention Merchants: The Epic Scramble to Get Inside Our Heads | Tiim Wu | Book | Business & Money > Biography & History | AI, Attention | Ours is often called an information economy, but at a moment when access to information is virtually unlimited, our attention has become the ultimate commodity. In nearly every moment of our waking lives, we face a barrage of efforts to harvest our attention. This condition is not simply the byproduct of recent technological innovations but the result of more than a century’s growth and expansion in the industries that feed on human attention. Wu’s narrative begins in the nineteenth century, when Benjamin Day discovered he could get rich selling newspapers for a penny. Since then, every new medium – from radio to television to Internet companies such as Google and Facebook – has attained commercial viability and immense riches by turning itself into an advertising platform. Since the early days, the basic business model of “attention merchants” has never changed: free diversion in exchange for a moment of your time, sold in turn to the highest-bidding advertiser. Full of lively, unexpected storytelling and piercing insight, The Attention Merchants lays bare the true nature of a ubiquitous reality we can no longer afford to accept at face value. | https://www.amazon.com/Attention-Merchants-Scramble-Inside-Heads/dp/0385352018 | Amazon | GR | https://www.goodreads.com/book/show/28503628-the-attention-merchants | LINK1 | https://books.google.com/books/about/The_Attention_Merchants.html?id=mNkxDwAAQBAJ | https://www.amazon.com/Attention-Merchants-Scramble-Inside-Heads/dp/0385352018 | Dominga Leone CIPP/E CIPM | https://www.linkedin.com/in/dlcipm/ | 4.3 | 292 | https://www.amazon.com/Tim-Wu/e/B003A51ISA/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||
Automating Inequality | 2018 | Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor | Virginia Eubanks | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/gp/product/1250074312 | Amazon | https://www.amazon.com/gp/product/1250074312 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.4 | 200 | https://www.amazon.com/Virginia-Eubanks/e/B004FR2VL0/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
BakerHostetler's Data Counsel Blog | 2020 | BakerHostetler's Data Counsel Blog | BakerHostetler | Web Resource | Blog | Commentary Addressing Risks and Opportunities Through the Lifecycle of Data, Technology, Advertising and Innovation | LINK1 | https://www.bakerdatacounsel.com/ | https://www.bakerdatacounsel.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Being Watched | 2017 | Being Watched: Legal Challenges to Government Surveillance | Jeffrey L. Vagle | Book | x | https://www.amazon.com/gp/product/1479809276 | Amazon | https://www.amazon.com/gp/product/1479809276 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||||
Ben Franklin’s Web Site | 2004 | Ben Franklin’s Web Site: Privacy and Curiosity from Plymouth Rock to the Internet | Robert Ellis Smith | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/Ben-Franklins-Web-Site-Curiosity/dp/0930072146 | Amazon | https://www.amazon.com/Ben-Franklins-Web-Site-Curiosity/dp/0930072146 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.7 | 11 | https://www.amazon.com/Robert-Ellis-Smith/e/B001K8Q0DC/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Between Truth and Power | 2019 | Between Truth and Power: The Legal Constructions of Informational Capitalism | Julie E. Cohen | Book | Politics & Social Sciences > Politics & Government | Our current legal system is to a great extent the product of an earlier period of social and economic transformation. From the late nineteenth century through the mid-twentieth century, as accountability for industrial-age harms became a pervasive source of conflict, the U.S. legal system underwent profound, tectonic shifts. Today, struggles over ownership of information-age resources and accountability for information-age harms are producing new systemic changes. / In Between Truth and Power, Julie E. Cohen explores the relationships between legal institutions and political and economic transformation. Systematically examining struggles over the conditions of information flow and the design of information architectures and business models, she argues that as law is enlisted to help produce the profound economic and sociotechnical shifts that have accompanied the emergence of the informational economy, it is too is transforming in fundamental ways. Drawing on elements from legal theory, science and technology studies, information studies, communication studies and organization studies to develop a complex theory of institutional change, Cohen develops an account of the gradual emergence of legal institutions adapted to the information age and of the power relationships that such institutions reflect and reproduce. / A tour de force of ambitious interdisciplinary scholarship, Between Truth and Power will transform our thinking about the possible futures of law and legal institutions in the networked information era. | https://www.amazon.com/gp/product/0190246693 | Amazon | https://www.amazon.com/gp/product/0190246693 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 0190246693, 978-0190246693 | Hardcover : 376 pages | Oxford University Press (October 1, 2019) | Oxford University Press | 1-Oct-2019 | 4 | https://www.amazon.com/Julie-E-Cohen/e/B0052XPXKM/ref=dp_byline_cont_book_1 | Cover | English | 376 | BEST | |||||||||||||||||||
Beyond Fear | 2006 | Beyond Fear: Thinking Sensibly About Security in an Uncertain World | Bruce Schneier | Book | Textbooks > Medicine & Health Sciences | https://www.amazon.com/Beyond-Fear-Thinking-Sensibly-Uncertain/dp/0387026207 | Amazon | https://www.amazon.com/Beyond-Fear-Thinking-Sensibly-Uncertain/dp/0387026207 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.2 | https://www.amazon.com/Bruce-Schneier/e/B000AP7EVS/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||||
Beyond Snowden | 2017 | Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA | Timothy H. Edgar | Book | Politics & Social Sciences > Politics & Government | x | https://www.amazon.com/Beyond-Snowden-Privacy-Surveillance-Struggle/dp/0815730632 | Amazon | GR | https://www.goodreads.com/book/show/32073023-beyond-snowden | LINK1 | https://www.brookings.edu/book/beyond-snowden/ | https://www.amazon.com/Beyond-Snowden-Privacy-Surveillance-Struggle/dp/0815730632 | Privacy Stan | https://twitter.com/Privacy_Stan | 4.6 | 8 | https://www.amazon.com/Timothy-H-Edgar/e/B0776RSV18/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||
Big Data - FTC Report | 2016 | Big Data: A Tool for Inclusion or Exclusion? | Federal Trade Commission | Research/Report | Big Data | The report, Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues, looks specifically at big data at the end of its lifecycle – how it is used after being collected and analyzed, and draws on information from the FTC’s 2014 workshop, “Big Data: A Tool for Inclusion or Exclusion?,” as well as the Commission’s seminar on Alternative Scoring Products. The Commission also considered extensive public comments and additional public research in compiling the report. // The report highlights a number of innovative uses of big data that are providing benefits to underserved populations, including increased educational attainment, access to credit through non-traditional methods, specialized health care for underserved communities, and better access to employment. // In addition, the report looks at possible risks that could result from biases or inaccuracies about certain groups, including more individuals mistakenly denied opportunities based on the actions of others, exposing sensitive information, creating or reinforcing existing disparities, assisting in the targeting of vulnerable consumers for fraud, creating higher prices for goods and services in lower-income communities and weakening the effectiveness of consumer choice. // The report outlines some of the various laws that apply to the use of big data, especially in regards to possible issues of discrimination or exclusion, including the Fair Credit Reporting Act, FTC Act and equal opportunity laws. It also provides a range of questions for businesses to consider when they examine whether their big data programs comply with these laws. // The report also proposes four key policy questions that are drawn from research into the ways big data can both present and prevent harms. The policy questions are designed to help companies determine how best to maximize the benefit of their use of big data while limiting possible harms, by examining both practical questions of accuracy and built-in bias as well as whether the company’s use of big data raises ethical or fairness concerns. | LINK1 | LINK2 | https://www.ftc.gov/system/files/documents/reports/big-data-tool-inclusion-or-exclusion-understanding-issues/160106big-data-rpt.pdf | https://drive.google.com/file/d/1D18JHDj9JHhHMhhKeAim-sdSty9KyHHY/view?usp=sharing | https://www.ftc.gov/system/files/documents/reports/big-data-tool-inclusion-or-exclusion-understanding-issues/160106big-data-rpt.pdf | Privacy Stan | https://twitter.com/Privacy_Stan | FTC | FTC | BEST | |||||||||||||||||||||||||
Big Data and the Future of Privacy | 2021 | EPIC Big Data and the Future of Privacy | Electronic Privacy Information Center | Web Resource | Big Data | LINK1 | https://epic.org/privacy/big-data/ | https://epic.org/privacy/big-data/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||||
Billy Budd | 1924 | Billy Budd, Sailor | Herman Melville | Book | Fiction: Literature & Fiction > United States | https://www.amazon.com/gp/product/0226321320 | Amazon | https://www.amazon.com/gp/product/0226321320 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 4.5 | 17 | https://www.amazon.com/Herman-Melville/e/B000AQ29JY/ref=dp_byline_cont_book_1 | BEST | |||||||||||||||||||||||||||
Bird & Bird: Guide to the General Data Protection Regulation | 2020 | Bird & Bird: Guide to the General Data Protection Regulation | Boardman, Ruth et al. | Research/Report | GDPR | The General Data Protection Regulation (GDPR) is the latest version of Europe’s cornerstone data protection law. It took effect in May 2018, a marathon six and a half years after the European Commission’s original first draft was published following an unprecedented period of debate, negotiation and lobbying. This guide summarises that Regulation - a law which has significantly overhauled Europe’s data protection rules at a time when information systems and digital business underpin human life. As with the legislation which the GDPR replaced, many jurisdictions outside the European Union (EU) have followed concepts which it introduced. So understanding the GDPR and how it is enforced is important for businesses around the world. | LINK1 | LINK2 | LINK3 | https://www.twobirds.com/~/media/pdfs/gdpr-pdfs/bird--bird--guide-to-the-general-data-protection-regulation.pdf?la=en | https://drive.google.com/file/d/1F7iKPCe7Sne7nY1jtC_s6ZkUVRTGzSbl/view?usp=sharing | https://www.twobirds.com/en/in-focus/general-data-protection-regulation/download-guide-by-chapter-topic | https://www.twobirds.com/~/media/pdfs/gdpr-pdfs/bird--bird--guide-to-the-general-data-protection-regulation.pdf?la=en | CIPP/E IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_E_Authoritative_Resource_List_4.1.0.pdf | Bird & Bird | Bird & Bird | BEST | |||||||||||||||||||||||
Black Box Society | 2015 | The Black Box Society: The Secret Algorithms that Control Money and Information | Frank Pasquale | Book | Computers & Technology > History & Culture | https://www.amazon.com/Black-Box-Society-Algorithms-Information/dp/0674970845 | Amazon | https://www.amazon.com/Black-Box-Society-Algorithms-Information/dp/0674970845 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.4 | 60 | https://www.amazon.com/Frank-Pasquale/e/B00QU8XCZ6/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Black Code | 2013 | Black Code: Surveillance, Privacy, and the Dark Side of the Internet | Ronald J. Deibert | Book | Computers & Technology > Networking & Cloud Computing | x | https://www.amazon.com/Black-Code-Surveillance-Privacy-Internet/dp/0771025351/ref=tmm_pap_swatch_0 | Amazon | https://www.amazon.com/Black-Code-Surveillance-Privacy-Internet/dp/0771025351/ref=tmm_pap_swatch_0 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 771025351,978-0771025358 | 4.3 | 45 | Cover | English | 336 | BEST | |||||||||||||||||||||||
Blackhat | 2015 | Blackhat | Michael Mann | Movie | Action, Crime, Thriller | This Michael Mann movie, starring hunky Thor star Chris Hemsworth, may deserve the award for most critiqued movie, both from the hacking and science communities. Rain Capital's Wang points out that the hacker Hemsworth plays says he would need more than a month to crack a 512-bit encryption key. If it was public key encryption he was talking about, a good hacker in 2015 could have cracked that in a few hours, she says. CSO contributor Maria Korolov also details what the movie got right and wrong from a hacking perspective. And in Forbes, scientist James Conca takes the movie to task for getting all of the details about nuclear power plants wrong. Still, Blackhat shines a window into our frenetic, modern world where technology has taken over our lives – and poses some important questions about how potentially vulnerable industrial plants are to cyberattacks. | https://www.amazon.com/Blackhat-Chris-Hemsworth/dp/B00VIF58EE | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt2717822/ | https://en.wikipedia.org/wiki/Blackhat_(film) | https://www.amazon.com/Blackhat-Blu-ray-Michael-Mann/dp/B00SG1353E | https://www.amazon.com/Blackhat-Chris-Hemsworth/dp/B00VIF58EE | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334199 | BEST | |||||||||||||||||||||||
Blockchain and the Law | 2018 | Blockchain and the Law: The Rule of Code | Primavera De Filippi and Aaron Wright | $14 | Book | Computers & Technology > Networking & Cloud Computing | https://www.amazon.com/gp/product/0674976428 | Amazon | https://www.amazon.com/gp/product/0674976428 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.4 | 43 | https://www.amazon.com/Primavera-De-Filippi/e/B07G63YKS6/ref=dp_byline_cont_book_1 | BEST | ||||||||||||||||||||||||||
Blockchain Chicken Farm | 2020 | Blockchain Chicken Farm: And Other Stories of Tech in China's Countryside | Xiaowei Wang | $15 | Book | Reference > Writing, Research & Publishing Guides | AI | In Blockchain Chicken Farm, the technologist and writer Xiaowei Wang explores the political and social entanglements of technology in rural China. Their discoveries force them to challenge the standard idea that rural culture and people are backward, conservative, and intolerant. Instead, they find that rural China has not only adapted to rapid globalization but has actually innovated the technology we all use today. From pork farmers using AI to produce the perfect pig, to disruptive luxury counterfeits and the political intersections of e-commerce villages, Wang unravels the ties between globalization, technology, agriculture, and commerce in unprecedented fashion. Accompanied by humorous “Sinofuturist” recipes that frame meals as they transform under new technology, Blockchain Chicken Farm is an original and probing look into innovation, connectivity, and collaboration in the digitized rural world. | https://www.amazon.com/Blockchain-Chicken-Farm-Countryside-Originals/dp/0374538662 | Amazon | LINK1 | LINK2 | https://us.macmillan.com/books/9780374538668 | https://www.youtube.com/watch?v=glbzinB1cTg | https://www.amazon.com/Blockchain-Chicken-Farm-Countryside-Originals/dp/0374538662 | Dominga Leone CIPP/E CIPM | https://www.linkedin.com/in/dlcipm/ | 4.3 | 77 | https://www.amazon.com/Xiaowei-Wang/e/B08DK1TCWX/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||
Book of Anonymity | 2021 | Book of Anonymity | Anon Collective | Book | Anonymity is highly contested, marking the limits of civil liberties and legality. Digital technologies of communication, identification, and surveillance put anonymity to the test. They challenge how anonymity can be achieved, and dismantled. Everyday digital practices and claims for transparency shape the ways in which anonymity is desired, done, and undone.The Book of Anonymity includes contributions by artists, anthropologists, sociologists, media scholars, and art historians. It features ethnographic research, conceptual work, and artistic practices conducted in France, Germany, India, Iran, Switzerland, the UK, and the US. From police to hacking cultures, from Bitcoin to sperm donation, from Yik-Yak to Amazon and IKEA, from DNA to Big Data — thirty essays address how the reconfiguration of anonymity transforms our concepts of privacy, property, self, kin, addiction, currency, and labor.The Book of Anonymity is written in the tradition of author-less texts. Editing and contributing anonymously constitute experiments in anonymity that speak to the aggressive valuation regimes shaping contemporary artistic and academic knowledge productions alike. This is not to discount the usefulness of attribution, but to trouble the ease with which labour is still dissected, measured and attached to the nexus of person, value and knowledge. To name, one contribution insists is to “define people, things, as individuals, to mark them, hold them, hierarchize them, to press them into service and turn them into value.” Another contribution advocates and questions if an ethics of anonymity can engender the kind of care that individualised practices arguably strive for yet undermine. Not all contributions speak to such concerns directly but all consider what is at stake in the im/possibilities of anonymous expression, at a time of thick digital traces. Editing and contributing anonymously thus is a practical commitment to one of the red threads that criss-cross the kaleidoscopic accounts presented in this book. | https://www.amazon.com/Book-Anonymity-Anon-Collective/dp/1953035302/ | Amazon | LINK1 | LINK2 | https://punctumbooks.com/titles/book-of-anonymity/ | https://library.oapen.org/handle/20.500.12657/47028 | https://www.amazon.com/Book-Anonymity-Anon-Collective/dp/1953035302/ | Privacy Stan | https://twitter.com/Privacy_Stan | Punctum Books (March 2, 2021) | https://images-na.ssl-images-amazon.com/images/I/51Hfkw9PbpL._SX346_BO1,204,203,200_.jpg | BEST | ||||||||||||||||||||||||
Born Digital | 2010 | Born Digital: Understanding the First Generation | John Palfrey | Book | Science & Math > Technology | https://www.amazon.com/Born-Digital-Understanding-Generation-Natives/dp/0465018564/ref=sr_1_1 | Amazon | https://www.amazon.com/Born-Digital-Understanding-Generation-Natives/dp/0465018564/ref=sr_1_1 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.6 | 64 | https://www.amazon.com/Urs-Gasser/e/B001JSE76A/ref=dp_byline_cont_book_2 | Cover | BEST | ||||||||||||||||||||||||||
Brave New World | 1932 | Brave New World | Aldous Huxley | Book | Fiction: Literature & Fiction > United States | https://www.amazon.com/gp/product/0060850523 | Amazon | https://www.amazon.com/gp/product/0060850523 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 4.5 | 12607 | https://www.amazon.com/Aldous-Huxley/e/B000APWRRY/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
BSI Home | 2020 | Topics: BSI Home for Industry Reports, Research, Blogs and News | BSI | Web Resource | LINK1 | https://www.bsigroup.com/en-US/topics/ | https://www.bsigroup.com/en-US/topics/ | CIPP/T IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPT_Authoritative_Resource_List_4.1.0.pdf | The British Standards Institution. 2020. | The British Standards Institution | 12-Jul-1905 | BEST | ||||||||||||||||||||||||||||
Building an Anonymization Pipeline | 2020 | Building an Anonymization Pipeline: Creating Safe Data | Luk Arbuckle, Khaled El Emam | Book | Business & Money > Business Culture | Anonymization | How can you use data in a way that protects individual privacy but still provides useful and meaningful analytics? With this practical book, data architects and engineers will learn how to establish and integrate secure, repeatable anonymization processes into their data flows and analytics in a sustainable manner. / Luk Arbuckle and Khaled El Emam from Privacy Analytics explore end-to-end solutions for anonymizing device and IoT data, based on collection models and use cases that address real business needs. These examples come from some of the most demanding data environments, such as healthcare, using approaches that have withstood the test of time. | https://www.amazon.com/Building-Anonymization-Pipeline-Creating-Safe/dp/1492053430 | Amazon | GR | https://www.goodreads.com/book/show/49358316-building-an-anonymization-pipeline | LINK1 | LINK2 | https://www.oreilly.com/library/view/building-an-anonymization/9781492053422/ | https://books.google.com/books/about/Building_an_Anonymization_Pipeline.html?id=jQRbzQEACAAJ | https://www.amazon.com/Building-Anonymization-Pipeline-Creating-Safe/dp/1492053430 | Privacy Stan | https://twitter.com/Privacy_Stan | 4.3 | https://www.amazon.com/Khaled-El-Emam/e/B001KIIC92/ref=dp_byline_cont_book_2 | Cover | BEST | |||||||||||||||||||
Bulk Collection | 2017 | Bulk Collection: Systematic Government Access to Private-Sector Data | Fred H. Cate & James X. Dempsey editors | Book | Law > Business | x | https://www.amazon.com/gp/product/0190685514 | Amazon | https://www.amazon.com/gp/product/0190685514 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 978-0190685515 | Cover | English | 504 | BEST | |||||||||||||||||||||||||
Byte Back | 2021 | Byte Back: Husch Blackwell’s Data Privacy and Cybersecurity Legal Resource | Husch Blackwell | Web Resource | Blog | x | Husch Blackwell’s Data Privacy, Security and Breach Response team helps clients navigate complex statutes and regulations surrounding privacy and information security. With deep subject matter expertise, our attorneys handle data security incidents; regulatory issues regarding federal and state privacy laws, such as HIPAA, FERPA, COPPA, GLBA and CCPA; international privacy law compliance, such as GDPR; and data security litigation matters. Learn more about the practice. | LINK1 | https://www.bytebacklaw.com/ | https://www.bytebacklaw.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||
California Consumer Privacy Act | 2019 | California Consumer Privacy Act | John Stephens | Web Resource | CCPA | LINK1 | https://www.americanbar.org/groups/business_law/publications/committee_newsletters/bcl/2019/201902/fa_9/ | https://www.americanbar.org/groups/business_law/publications/committee_newsletters/bcl/2019/201902/fa_9/ | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | BEST | ||||||||||||||||||||||||||||||
California Privacy Law | 2020 | California Privacy Law: Practical Guide and Commentary U.S. Federal and California Law (4th Ed) | Lothar Determann | Book | Textbook | CCPA | LINK1 | https://iapp.org/store/books/a191P000003swUkQAI/ | https://iapp.org/store/books/a191P000003swUkQAI/ | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | ISBN 978-1-948771-42-9 | softcover, 668 | Portsmouth: IAPP Publications, 2020 | Portsmouth: IAPP Publications | 12-Jul-1905 | BEST | ||||||||||||||||||||||||
Cambridge Handbook of Consumer Privacy | 2018 | The Cambridge Handbook of Consumer Privacy | Evan Selinger, Jules Polonetsky, and Omer Tene | $50 | Book | Textbook: Business & Money > Economics | x | Businesses are rushing to collect personal data to fuel surging demand. Data enthusiasts claim personal information that's obtained from the commercial internet, including mobile platforms, social networks, cloud computing, and connected devices, will unlock path-breaking innovation, including advanced data security. By contrast, regulators and activists contend that corporate data practices too often disempower consumers by creating privacy harms and related problems. As the Internet of Things matures and facial recognition, predictive analytics, big data, and wearable tracking grow in power, scale, and scope, a controversial ecosystem will exacerbate the acrimony over commercial data capture and analysis. The only productive way forward is to get a grip on the key problems right now and change the conversation. That's exactly what Jules Polonetsky, Omer Tene, and Evan Selinger do. They bring together diverse views from leading academics, business leaders, and policymakers to discuss the opportunities and challenges of the new data economy. | https://www.amazon.com/gp/product/1107181100 | Amazon | https://www.amazon.com/gp/product/1107181100 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | https://www.amazon.com/Jules-Polonetsky/e/B07BVM9SZT/ref=dp_byline_cont_book_2 | Cover | BEST | ||||||||||||||||||||||||
Camera Power | 2019 | Camera Power: Proof, Policing, Privacy, and Audiovisual Big Data | Mary D. Fan | Book | Politics & Social Sciences > Social Sciences | https://www.amazon.com/gp/product/1108407544 | Amazon | https://www.amazon.com/gp/product/1108407544 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | 2 | https://www.amazon.com/Mary-D-Fan/e/B07S94HRD5/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
CCPA Genius | 2020 | CCPA Genius | Westin Research | Web Resource | The Westin Research Center released this interactive tool, the "CCPA Genius," to help IAPP members navigate the California Consumer Privacy Act, providing ready access to critical CCPA resources. It maps CCPA legal requirements to the CCPA regulations, expert analysis, compliance guidance, the California Privacy Rights Act ballot initiative and more. Informative enforcement actions and court decisions will be added, as well. | LINK1 | https://iapp.org/resources/article/ccpa-genius-overview/ | https://iapp.org/resources/article/ccpa-genius-overview/ | Privacy Stan | https://twitter.com/Privacy_Stan | IAPP | IAPP | BEST | ||||||||||||||||||||||||||||
Chronicle of Data Protection | 2020 | Chronicle of Data Protection | Hogan Lovells | Web Resource | Blog | The blog of Hogan Lovells, privacy attorneys and data security lawyers, Chronicle of Data Protection includes posts about consumer and financial privacy, cybersecurity and data breaches, and other topics of relevance to data protection. With the latest information on security news and trends, Chronicle of Data Protection is a useful read for those who need the most up-to-date data protection regulations and news. | LINK1 | LINK2 | https://www.hldataprotection.com/ | https://twitter.com/hlprivacy | https://www.hldataprotection.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||
Citizenfour | 2014 | Citizenfour | Laura Poitras | Movie | Documentary, Biography, History | x | x | This documentary, by filmmaker Laura Poitras, chronicles in real time how "Citizenfour" (Edward Snowden) leaked classified intelligence documents to journalist Glenn Greenwald and his colleagues at The Guardian and The Washington Post in June 2013. Whether you consider Snowden a hero or a felon who should be extradited to the United States and tried for espionage, security pros will find this movie riveting. Viewers get to see Snowden, Greenwald, and filmmaker Poitras hatch the plan for how the stories based on the leaks would be published and managed in the media at large – right as it was happening. / Today Snowden remains in Russia, where he has been outspoken against both the Trump administration and the Putin government. His asylum runs until 2020, so it will be interesting to see what happens next. Cynics may claim that nothing has changed and privacy has only become worse in the past five or six years, but the stories that followed the release of the classified NSA materials did launch an important national debate on the role of government surveillance in the Internet era. More importantly, security pros can't overlook that one day their organizations could fall prey to an insider either looking to make a political point, as Snowden was, or worse - bent on malicious intent. | https://www.amazon.com/Citizenfour-Edward-Snowden/dp/B00VO8D13K | Amazon | LINK1 | LINK2 | LINK3 | https://en.wikipedia.org/wiki/Citizenfour | https://www.imdb.com/title/tt4044364/ | https://www.youtube.com/watch?v=6ADUs8iN7NE | https://www.amazon.com/Citizenfour-Edward-Snowden/dp/B00VO8D13K | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334200 | BEST | |||||||||||||||||||||
Class Actions in Privacy Law | 2020 | Class Actions in Privacy Law | Ignacio N. Cofone | Book | Class Action | Class actions in privacy law are rapidly growing as a legal vehicle for citizens around the world to hold corporations liable for privacy violations. Current and future developments in these class actions stand to shift the corporate liability landscape for companies that interact with people’s personal information. / Privacy class actions are at the intersection of civil litigation, privacy law, and data protection. Developments in privacy class actions raise complex issues of substantive law as well as challenges to the established procedures governing class action litigation. Their outcomes are integral to the evolution of privacy law and data protection law across jurisdictions. This book brings together established scholars in privacy law, data protection law, and collective litigation to offer a detailed perspective on the present and future of collective litigation for privacy claims. / Taking a comparative approach, this book incorporates considerations from consumer protection law, procedural law, cross-border litigation, tort law, and data protection law, which are key to understanding the development of privacy class actions. In doing so, it offers an analysis of the novel challenges they pose for courts, regulatory agencies, scholars, and litigators, together with their potential solutions. | https://www.amazon.com/Class-Actions-Privacy-Ignacio-Cofone/dp/0367508621 | Amazon | LINK1 | https://www.routledge.com/Class-Actions-in-Privacy-Law/Cofone/p/book/9780367508623 | https://www.amazon.com/Class-Actions-Privacy-Ignacio-Cofone/dp/0367508621 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||
Click Here to Kill Everybody | 2018 | Click Here to Kill Everybody: Security and Survival in a Hyper-connected World | Bruce Schneier | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/gp/product/0393608883 | Amazon | https://www.amazon.com/gp/product/0393608883 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.5 | 153 | https://www.amazon.com/Bruce-Schneier/e/B000AP7EVS/ref=dp_byline_cont_book_1 | BEST | |||||||||||||||||||||||||||
Complete Guide to GDPR Compliance | 2021 | Complete Guide to GDPR Compliance. Horizon 2020 Framework Programme for the European Union. | GDPR.EU | Web Resource | GDPR | LINK1 | https://gdpr.eu/ | https://gdpr.eu/ | CIPP/E IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_E_Authoritative_Resource_List_4.1.0.pdf | BEST | ||||||||||||||||||||||||||||||
Confidential Confidential | 2018 | Confidential Confidential: The Inside Story of Hollywood’s Notorious Scandal Magazine | Samantha Barbas | Book | Reference > Writing, Research & Publishing Guides | https://www.amazon.com/gp/product/0912777540 | Amazon | https://www.amazon.com/gp/product/0912777540 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.8 | 23 | https://www.amazon.com/Samantha-Barbas/e/B01GSCPUQM/ref=dp_byline_cont_book_1 | BEST | |||||||||||||||||||||||||||
Cost of Counterterrorism | 2008 | The Cost of Counterterrorism: Power, Politics, and Liberty | Laura Donohue | Book | Textbooks > Social Sciences | https://www.amazon.com/Cost-Counterterrorism-Power-Politics-Liberty/dp/0521844444 | Amazon | https://www.amazon.com/Cost-Counterterrorism-Power-Politics-Liberty/dp/0521844444 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 521844444,978-0521844444 | 5 | https://www.amazon.com/Laura-K-Donohue/e/B001HPJ7OW/ref=dp_byline_cont_book_1 | Cover | English | 514 | BEST | ||||||||||||||||||||||||
Costs of Privacy | 1992 | The Costs of Privacy: Surveillance and Reputation in America | Steven L. Nock | Book | Textbooks > Social Sciences | https://www.amazon.com/Costs-Privacy-Surveillance-Reputation-Institutions/dp/0202304558 | Amazon | https://www.amazon.com/Costs-Privacy-Surveillance-Reputation-Institutions/dp/0202304558 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 202304558,978-0202304557 | 4 | https://www.amazon.com/Steven-L-Nock/e/B001HD1DFU/ref=dp_byline_cont_book_1 | Cover | English | 149 | BEST | ||||||||||||||||||||||||
Creditworthy | 2017 | Creditworthy: A History of Consumer Surveillance and Financial Identity in America | Josh Lauer | Book | Business & Money > Biography & History | History | x | https://www.amazon.com/gp/product/023116808X | Amazon | https://www.amazon.com/gp/product/023116808X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 023116808X,978-0231168083 | 4.1 | 7 | Cover | English | 368 | BEST | ||||||||||||||||||||||
Crime Dot Com | 2020 | Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global | Geoff White | Book/Audio | From Anonymous to the Dark Web, a dizzying account of hacking—past, present, and future. “Brilliantly researched and written.”—Jon Snow, Channel 4 News “A comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades. . . . Lively, insightful, and, often, alarming.”—Ewen MacAskill, Guardian On May 4, 2000, an email that read “kindly check the attached LOVELETTER” was sent from a computer in the Philippines. Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States’ hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war. From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it. | https://www.amazon.com/Crime-Dot-Com-Viruses-Rigging/dp/1789142857 | Amazon | GR | https://www.goodreads.com/book/show/52612655-crime-dot-com | LINK1 | LINK2 | https://press.uchicago.edu/ucp/books/book/distributed/C/bo70560367.html | https://books.google.com/books/about/Crime_Dot_Com.html?id=0inxDwAAQBAJ | https://www.amazon.com/Crime-Dot-Com-Viruses-Rigging/dp/1789142857 | Privacy Stan | https://twitter.com/Privacy_Stan | 336 | 1789142857 (ISBN-13 : 978-1789142853) | Reaktion Books; New edition (September 12, 2020) | Reaktion Books | 12-Sep-2020 | https://www.amazon.com/Geoff-White/e/B088X1TTVC/ref=dp_byline_cont_pop_book_1 | Cover | BEST | |||||||||||||||||
Cuckoo's Egg | 1989 | The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | Cliff Stoll | Book | Politics & Social Sciences > Politics & Government | True Crime | https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787 | Amazon | https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787 | Privacy Stan | https://twitter.com/Privacy_Stan | 4.7 | 919 | Cover | BEST | ||||||||||||||||||||||||||
Cult of the Constitution | 2019 | Cult of the Constitution | Mary Anne Franks, Th | $19 | Book | In this controversial and provocative book, Mary Anne Franks examines the thin line between constitutional fidelity and constitutional fundamentalism. The Cult of the Constitution reveals how deep fundamentalist strains in both conservative and liberal American thought keep the Constitution in the service of white male supremacy. / Constitutional fundamentalists read the Constitution selectively and self-servingly. Fundamentalist interpretations of the Constitution elevate certain constitutional rights above all others, benefit the most powerful members of society, and undermine the integrity of the document as a whole. The conservative fetish for the Second Amendment (enforced by groups such as the NRA) provides an obvious example of constitutional fundamentalism; the liberal fetish for the First Amendment (enforced by groups such as the ACLU) is less obvious but no less influential. Economic and civil libertarianism have increasingly merged to produce a deregulatory, "free-market" approach to constitutional rights that achieves fullest expression in the idealization of the Internet. The worship of guns, speech, and the Internet in the name of the Constitution has blurred the boundaries between conduct and speech and between veneration and violence. / But the Constitution itself contains the antidote to fundamentalism. The Cult of the Constitution lays bare the dark, antidemocratic consequences of constitutional fundamentalism and urges readers to take the Constitution seriously, not selectively | https://www.amazon.com/gp/product/1503603229 | Amazon | https://www.amazon.com/gp/product/1503603229 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1503603229 ISBN-13 : 978-1503603226 | Hardcover : 272 pages | Stanford University Press; 1st edition (May 14, 2019) | Stanford University Press; 1st edition | 14-May-2019 | 1st edition | BEST | |||||||||||||||||||||||
Customer Data and Privacy | 2020 | Customer Data and Privacy: The Insights You Need from Harvard Business Review | Harvard Business Review | Book | x | Is it possible to take advantage of the benefits of data collection--and mitigate risks--for both companies and customers? / Most consumers are not very skilled at evaluating privacy risks; they're either unable to determine the cost of sharing personal data online or unaware of what they're sharing. (Doesn't everyone scroll down without reading to click "I accept"?) Without much intervention from most federal or state-level governments, companies are on their own to define what qualifies as reasonable use. In today's digital surveillance economy, there are no clear-cut best practices or guidelines. Gathering and using information can help customers--we see that in personalization and autofill of online forms. But companies must act in the best interest of their customers and treat the sensitive information users give them with the ethical care of doctors, lawyers, and financial advisers. The challenges of operating in a digital ecosystem aren't going away. Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly. | https://www.amazon.com/gp/product/1633699862 | Amazon | https://www.amazon.com/gp/product/1633699862 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Cyber Privacy | 2020 | Cyber Privacy: Who Has Your Data and Why You Should Care | April Falcon Doss | $19 | Book/Audio | Politics & Social Sciences > Politics & Government | x | You’re being tracked. Google, Facebook, and Amazon—not to mention the federal government—keep incredible amounts of information about your online and real-world behaviors. Understand why it’s a problem. We live in an era of unprecedented data aggregation, and the trade-offs between individual privacy, personal convenience, and national security and cybersecurity have never been more challenging to negotiate. Technology is evolving quickly, while laws and policies are changing slowly. April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, has seen this imbalance in action. She wants to see policy catch up, for the protection of individuals and our private data. That starts with spreading awareness. In Cyber Privacy, Doss explores the most common types of data being collected about individuals today and delve into how it is being used—sometimes against us—by the private sector, the government, and even our employers and schools. She reveals the trends in technology, data science, and law that directly impact our privacy, based on the digital footprints we leave in our daily lives. Most important, Doss also offers new approaches that can help law, policy, and ethics keep pace with technological change. | https://www.amazon.com/Cyber-Privacy-Your-Data-Should/dp/1948836920 | Amazon | GR | https://www.goodreads.com/book/show/54705892-cyber-privacy | AUD | https://www.audible.com/pd/Cyber-Privacy-Audiobook/1705283748?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/Cyber-Privacy-Your-Data-Should/dp/1948836920 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Chloe Cannon | 709 | 1948836920 (ISBN13: 9781948836920) | 4.19 · Rating details · 16 ratings · 7 reviews | Hardcover : 300 pages | BenBella Books | BenBella Books | 3-Nov-2020 | 4.8 | 13 | https://www.amazon.com/April-Falcon-Doss/e/B08MQ8BK5P/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||
Cyberbullying Law | 2020 | Cyberbullying Law | Thomas Jacobs | Book | Textbook: Law > Constitutional Law | https://www.amazon.com/Cyberbullying-Law-Thomas-Jacobs/dp/1641056878 | Amazon | GR | https://www.goodreads.com/book/show/54223332-cyberbullying-law | LINK1 | LINK2 | https://www.americanbar.org/products/inv/book/401936788/ | https://books.google.com/books/about/Cyberbullying_Law.html?id=eo9szQEACAAJ | https://www.amazon.com/Cyberbullying-Law-Thomas-Jacobs/dp/1641056878 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1641056878,978-1641056878 | Cover | English | 814 | BEST | ||||||||||||||||||||
Cybersecurity | 2015 | Cybersecurity: A Practical Guide to the Law of Cyber Risk | Edward McNicholas & Vivek K. Mohan (editors) | Book | Textbook | https://www.amazon.com/gp/product/1402424108 | Amazon | https://www.amazon.com/gp/product/1402424108 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||||
Cyberspies | 2016 | Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage | Gordon Corera | Book | History | x | https://www.amazon.com/gp/product/1681771543 | Amazon | https://www.amazon.com/gp/product/1681771543 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Cybertraps for the Young | 2011 | Cybertraps for the Young | Frederick Lane | Book | Science & Math > Technology | Benjamin Franklin Award Finalist for Parenting & Family Issues | https://www.amazon.com/Cybertraps-Young-Frederick-S-Lane/dp/0984053166 | Amazon | https://www.amazon.com/Cybertraps-Young-Frederick-S-Lane/dp/0984053166 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.9 | 10 | https://www.amazon.com/Frederick-S-Lane/e/B001H6IJSQ/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||
Dark Knight | 2008 | The Dark Knight | Christopher Nolan | Movie | Action, Suspense, Drama | x | You can sum up "The Dark Knight" as simply "the movie where Batman fights the Joker," but that would be a massive disservice to the best comic book movie of all-time. One recurring plotline in the film involves Bruce Wayne, played by Christian Bale, turning all the cellphones in Gotham City into sonar devices in order to track the Joker, played by Heath Ledger in his Oscar-winning tour de force performance. The ethics of this decision are brought up by Morgan Freeman's Lucius Fox and while Batman's decisions around the technology are "somewhat" virtuous, it's not hard to envision a world where a billionaire would not be so benevolent with a massive surveillance system. | https://www.amazon.com/Dark-Knight-Christian-Bale/dp/B001I189MQ | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0468569/ | https://en.wikipedia.org/wiki/The_Dark_Knight_(film) | https://www.amazon.com/Dark-Knight-Two-Disc-Special/dp/B001GZ6QDS | https://www.amazon.com/Dark-Knight-Christian-Bale/dp/B001I189MQ | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | ||||||||||||||||||||||
Dark Mirror | 2020 | Dark Mirror: Edward Snowden and the American Surveillance State | Barton Gellman | Book | x | x | Edward Snowden touched off a global debate in 2013 when he gave Barton Gellman, Laura Poitras and Glenn Greenwald each a vast and explosive archive of highly classified files revealing the extent of the American government’s access to our every communication. They shared the Pulitzer Prize that year for public service. For Gellman, who never stopped reporting, that was only the beginning. He jumped off from what Snowden gave him to track the reach and methodology of the U.S. surveillance state and bring it to light with astonishing new clarity. Along the way, he interrogated Snowden’s own history and found important ways in which myth and reality do not line up. Gellman treats Snowden with respect, but this is no hagiographic account, and Dark Mirror sets the record straight in ways that are both fascinating and important. / Dark Mirror is the story that Gellman could not tell before, a gripping inside narrative of investigative reporting as it happened and a deep dive into the machinery of the surveillance state. Gellman recounts the puzzles, dilemmas and tumultuous events behind the scenes of his work – in top secret intelligence facilities, in Moscow hotel rooms, in huddles with Post lawyers and editors, in Silicon Valley executive suites, and in encrypted messages from anonymous accounts. Within the book is a compelling portrait of national security journalism under pressure from legal threats, government investigations, and foreign intelligence agencies intent on stealing Gellman’s files. Throughout Dark Mirror, Gellman wages an escalating battle against unknown adversaries who force him to mimic their tradecraft in self-defense. / With the vivid and insightful style that is the author’s trademark, Dark Mirror is a true-life spy tale about the surveillance-industrial revolution and its discontents. Along the way, with the benefit of fresh reporting, it tells the full story of a government leak unrivaled in drama since All the President’s Men. | https://www.amazon.com/gp/product/1594206015 | Amazon | GR | https://www.goodreads.com/book/show/27774751-dark-mirror | LINK1 | LINK2 | https://www.youtube.com/watch?v=sEUntVHX0KA | https://onlinelibrary.wiley.com/doi/abs/10.1111/gove.12537 | https://www.amazon.com/gp/product/1594206015 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1594206015 | Hardcover : 448 pages | Penguin Press (May 19, 2020) | Penguin Press | 19-May-2020 | BEST | |||||||||||||||||
Dark Net | 2015 | The Dark Net: Inside the Digital Underworld Hardcover | Jamie Bartlett | Book | Business & Money > Processes & Infrastructure | An Independent and New Statesman Book of the Year | https://www.amazon.com/exec/obidos/ASIN/%201612194893 | Amazon | https://www.amazon.com/exec/obidos/ASIN/%201612194893 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.2 | 425 | https://www.amazon.com/Jamie-Bartlett/e/B004RGNSU2/ref=dp_byline_cont_book_1 | BEST | ||||||||||||||||||||||||||
Dark Patterns and the Legal Requirements of Consent Banners | 2021 | Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective | Gray, Santos, Bielova, Clifford | Research/Report | Dark Patterns | User engagement with data privacy and security through consent banners has become a ubiquitous part of interacting with internet services. While previous work has addressed consent banners from either interaction design, legal, and ethics-focused perspectives, little research addresses the connections among multiple disciplinary approaches, including tensions and opportunities that transcend disciplinary boundaries. In this paper, we draw together perspectives and commentary from HCI, design, privacy and data protection, and legal research communities, using the language and strategies of “dark patterns” to perform an interaction criticism reading of three different types of consent banners. Our analysis builds upon designer, interface, user, and social context lenses to raise tensions and synergies that arise together in complex, contingent, and conflicting ways in the act of designing consent banners. We conclude with opportunities for transdisciplinary dialogue across legal, ethical, computer science, and interactive systems scholarship to translate matters of ethical concern into public policy | LINK1 | LINK2 | LINK3 | https://arxiv.org/abs/2009.10194 | https://drive.google.com/file/d/1FwUqGZHhN-KQ19z6J-K5po2EsBqGbRhP/view?usp=sharing | https://arxiv.org/pdf/2009.10194.pdf | https://arxiv.org/abs/2009.10194 | Luis Alberto Montezuma | https://www.linkedin.com/in/luisalbertomontezuma/ | BEST | |||||||||||||||||||||||||
Data & Analytics 4.0 | 2019 | Data & Analytics 4.0: The Future of Work, Privacy and Trust in the Age of Artificial Intelligence | Journel Joseph | Book | Business & Money > Skills | Better Together: Humans + Machines Contrary to the past when numerous companies failed due to the delay in adopting technology, the future's disruption might come from undervaluing humans, overusing robots and failing to build a symbiotic workforce (humans + machines) for the future. In this book, Journel Joseph addresses the complexities surrounding artificial intelligence (AI) and the future of work--information warfare, social media and data misuse, digital trust and privacy by reflecting on "How to future-proof your career with the rise of AI. How are companies going to face the future in this tumultuous and uncertain time? | https://www.amazon.com/Data-Analytics-4-0-Artificial-Intelligence/dp/0578437163 | Amazon | https://www.amazon.com/Data-Analytics-4-0-Artificial-Intelligence/dp/0578437163 | Privacy Stan | https://twitter.com/Privacy_Stan | 4.6 | https://www.amazon.com/Journel-Joseph/e/B07NBP11F6/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Data and Goliath | 2015 | Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World | Bruce Schneier | Book | Politics & Social Sciences > Politics & Government | x | x | Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. / The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. / Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again. | https://www.amazon.com/gp/product/0393244814 | Amazon | GR | https://www.goodreads.com/book/show/25622873-data-and-goliath | https://www.amazon.com/gp/product/0393244814 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 039335217X (ISBN13: 9780393352177) | 4.01 · Rating details · 3,285 ratings · 362 reviews | Paperback, 448 pages | Published February 8th 2016 by W. W. Norton Company | W. W. Norton Company | 8-Feb-2016 | 4.5 | 319 | https://www.amazon.com/Bruce-Schneier/e/B000AP7EVS/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||
Data Brokers - FTC Report | 2014 | Data Brokers: A Call for Transparency and Accountability | Federal Trade Commission | $18 | Politics & Social Sciences > Politics & Government | Data Brokers | In this report from May 2014, the Federal Trade Commission discusses the results of an in-depth study of nine data brokers including the characteristics of the industry, benefits and risks and consumer choice, and offers legislative and best practices recommendations based on its findings. | https://www.amazon.com/Data-Brokers-Call-Transparency-Accountability/dp/1508815127 | Amazon | LINK1 | LINK2 | LINK3 | https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf | https://drive.google.com/file/d/1UBjJX6tZr-SPDrnC-2anvzPEpQllhna_/view?usp=sharing | https://iapp.org/resources/article/data-brokers-a-call-for-transparency-and-accountability/ | https://www.amazon.com/Data-Brokers-Call-Transparency-Accountability/dp/1508815127 | Privacy Stan | https://twitter.com/Privacy_Stan | FTC | FTC | Cover | BEST | |||||||||||||||||||
Data for the People | 2017 | Data for the People: How to Make Our Post-Privacy Economy Work for You | Andreas Weigend | Book/Audio | Business & Money > Processes & Infrastructure | A long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer. In Data for the People, Andreas Weigend draws on his years as a consultant for commerce, education, healthcare, travel and finance companies to outline how Big Data can work better for all of us. As of today, how much we benefit from Big Data depends on how closely the interests of big companies align with our own. Too often, outdated standards of control and privacy force us into unfair contracts with data companies, but it doesn't have to be this way. Weigend makes a powerful argument that we need to take control of how our data is used to actually make it work for us. Only then can we the people get back more from Big Data than we give it. Big Data is here to stay. Now is the time to find out how we can be empowered by it. | https://www.amazon.com/Data-People-Make-Post-Privacy-Economy/dp/0465044697 | Amazon | GR | https://www.goodreads.com/book/show/29502402-data-for-the-people | AUD | https://www.audible.com/pd/Data-for-the-People-Audiobook/B01MY2EDWZ?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/Data-People-Make-Post-Privacy-Economy/dp/0465044697 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Barry Abrams | 627 | 4.5 | https://www.amazon.com/Andreas-Weigend/e/B06VVFTPKJ/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||
Data Privacy Law | 2019 | Data Privacy Law: A Practical Guide to GDPR | G.E. Kennedy | $48 | Book | Textbook | A detailed look at the General Data Protection Regulation (GDPR). Understand how to comply. Learn Quick Tips providing answers to your data privacy questions. Learn how to engage a data privacy officer, conduct direct marketing campaigns, create compliance documentation, choose a legal basis for collecting personal information, respond to data subject requests. Avoid costly fines and penalties by ensuring your company's activities comply. Learn about Data Privacy Impact Assessments, data mapping and data subject requests. Answers questions about obtaining consent, processing and retaining personal information. Do your company's direct marketing campaigns conflict with the GDPR? Learn how to create a data privacy compliance program. Included is a survey of all EU member states data privacy laws. | https://www.amazon.com/Data-Privacy-Law-Practical-Guide/dp/0999512722/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=&sr= | Amazon | LINK1 | https://books.google.com/books/about/Data_Privacy_Law.html?id=ErOixQEACAAJ | https://www.amazon.com/Data-Privacy-Law-Practical-Guide/dp/0999512722/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=&sr= | CIPP/M IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPM_Authoritative_Resource_List_4.1.0.pdf | Bowker. 23 May 2019. | Bowker | 1-May-2019 | BEST | |||||||||||||||||||||||
Data Privacy Law | 2014 | Data Privacy Law: An International Perspective | Lee A. Bygrave | Book | Law > Intellectual Property | https://www.amazon.com/Data-Privacy-Law-International-Perspective/dp/0199675554 | Amazon | LINK1 | https://books.google.com/books/about/Data_Privacy_Law.html?id=kUW0mAEACAAJ | https://www.amazon.com/Data-Privacy-Law-International-Perspective/dp/0199675554 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 199675554,978-0199675555 | 5 | Cover | English | 272 | BEST | |||||||||||||||||||||||
Data Profiling and Insurance Law | 2020 | Data Profiling and Insurance Law | Brendan McGurk | Book | Law > Insurance | Big Data | The winner of the 2020 British Insurance Law Association Book Prize, this timely, expertly written book looks at the legal impact that the use of 'Big Data' will have on the provision - and substantive law - of insurance. Insurance companies are set to become some of the biggest consumers of big data which will enable them to profile prospective individual insureds at an increasingly granular level. / More particularly, the book explores how: (i) insurers gain access to information relevant to assessing risk and/or the pricing of premiums; (ii) the impact which that increased information will have on substantive insurance law (and in particular duties of good faith disclosure and fair presentation of risk); and (iii) the impact that insurers' new knowledge may have on individual and group access to insurance. / This raises several consequential legal questions: (i) To what extent is the use of big data analytics to profile risk compatible (at least in the EU) with the General Data Protection Regulation? (ii) Does insurers' ability to parse vast quantities of individual data about insureds invert the information asymmetry that has historically existed between insured and insurer such as to breathe life into insurers' duty of good faith disclosure? And (iii) by what means might legal challenges be brought against insurers both in relation to the use of big data and the consequences it may have on access to cover? | https://www.amazon.com/Data-Profiling-Insurance-Brendan-McGurk/dp/1509920617 | Amazon | LINK1 | https://www.bookdepository.com/Data-Profiling-Insurance-Law-Brendan-McGurk/9781509945412 | https://www.amazon.com/Data-Profiling-Insurance-Brendan-McGurk/dp/1509920617 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||
Data Protection Law | 2002 | Data Protection Law: Approaching Its Rationale, Logic and Limits | Lee A. Bygrave | Book | https://www.amazon.com/Protection-Approaching-Rationale-Limits-Information/dp/9041198709 | Amazon | LINK1 | LINK2 | https://lrus.wolterskluwer.com/store/product/data-protection-law-approaching-its-rationale-logic-and-limits/ | https://books.google.com/books/about/Data_Protection_Law.html?id=goVjwgEACAAJ | https://www.amazon.com/Protection-Approaching-Rationale-Limits-Information/dp/9041198709 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Data Protection Law - CRS Report | 2019 | Data Protection Law: An Overview | Stephen Mulligan, Wilson Freeman, Chris Linebaugh | Research/Report | Recent high-profile data breaches and other concerns about how third parties protect the privacy of individuals in the digital age have raised national concerns over legal protections of Americans' electronic data. Intentional intrusions into government and private computer networks and inadequate corporate privacy and cybersecurity practices have exposed the personal information of millions of Americans to unwanted recipients. At the same time, internet connectivity has increased and varied in form in recent years. Americans now transmit their personal data on the internet at an exponentially higher rate than in the past, and their data are collected, cultivated, and maintained by a growing number of both 'consumer facing' and 'behind the scenes' actors such as data brokers. As a consequence, the privacy, cybersecurity and protection of personal data have emerged as a major issue for congressional consideration | LINK1 | LINK2 | LINK3 | https://crsreports.congress.gov/product/pdf/R/R45631 | https://drive.google.com/file/d/1BuzmiE1LxC63KeS20n-xdEqxlh3T6jPb/view?usp=sharing | https://www.hsdl.org/?abstract&did=823585 | https://crsreports.congress.gov/product/pdf/R/R45631 | Privacy Stan | https://twitter.com/Privacy_Stan | Library of Congress. Congressional Research Service, R45631 | Library of Congress. Congressional Research Service | R45631 | BEST | |||||||||||||||||||||||
Data Protection Laws of The World | 2021 | Data Protection Laws of The World | DLA Piper | Web Resource | Laws | International Law | LINK1 | https://www.dlapiperdataprotection.com/ | https://www.dlapiperdataprotection.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Data Protection: Rules for the Protection of Personal Data Inside and Outside the EU | 2021 | Data Protection: Rules for the Protection of Personal Data Inside and Outside the EU | European Commission | Web Resource | LINK1 | https://ec.europa.eu/info/law/law-topic/data-protection_en | https://ec.europa.eu/info/law/law-topic/data-protection_en | CIPP/E IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_E_Authoritative_Resource_List_4.1.0.pdf | BEST | |||||||||||||||||||||||||||||||
Data Selves | 2019 | Data Selves: More-than-Human Perspectives | Deborah Lupton | Book | https://www.amazon.com/gp/product/1509536426 | Amazon | https://www.amazon.com/gp/product/1509536426 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Database Nation | 2001 | Database Nation : The Death of Privacy in the 21st Century | Simson Garfinkel | Book | Textbooks > Social Sciences | https://www.amazon.com/Database-Nation-Death-Privacy-Century/dp/0596001053 | Amazon | https://www.amazon.com/Database-Nation-Death-Privacy-Century/dp/0596001053 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.6 | Cover | BEST | ||||||||||||||||||||||||||||
Death of Expertise | 2017 | The Death of Expertise: The Campaign Against Established Knowledge and Why It Matters | Tom Nichols | Book/Audio | Politics & Social Sciences > Philosophy | Disinformation | The rise of the internet and other technology has made information more easily-accessible than ever before. While this has had the positive effect of equalizing access to knowledge, it also has lowered the bar on what depth of knowledge is required to consider oneself an "expert." A cult of anti-expertise sentiment has coincided with anti-intellectualism, resulting in massively viral yet poorly informed debates ranging from the anti-vaccination movement to attacks on GMOs. This surge in intellectual egalitarianism has altered the landscape of debates-all voices are equal, and "fact" is a subjective term. Browsing WebMD puts one on equal footing with doctors, and Wikipedia allows all to be foreign policy experts, scientists, and more. / As Tom Nichols shows in The Death of Expertise, there are a number of reasons why this has occurred-ranging from easy access to Internet search engines to a customer satisfaction model within higher education. The product of these interrelated trends, Nichols argues, is a pervasive distrust of expertise among the public coinciding with an unfounded belief among non-experts that their opinions should have equal standing with those of the experts. The experts are not always right, of course, and Nichols discusses expert failure. The crucial point is that bad decisions by experts can and have been effectively challenged by other well-informed experts. The issue now is that the democratization of information dissemination has created an army of ill-informed citizens who denounce expertise. / When challenged, non-experts resort to the false argument that the experts are often wrong. Though it may be true, but the solution is not to jettison expertise as an ideal; it is to improve our expertise. Nichols is certainly not opposed to information democratization, but rather the enlightenment people believe they achieve after superficial internet research. He shows in vivid detail the ways in which this impulse is coursing through our culture and body politic, but the larger goal is to explain the benefits that expertise and rigorous learning regimes bestow upon all societies | https://www.amazon.com/Death-Expertise-Campaign-Established-Knowledge/dp/0190469412 | Amazon | GR | https://www.goodreads.com/book/show/26720949-the-death-of-expertise?from_search=true&from_srp=true&qid=p4THNIeG93&rank=1 | AUD | https://www.audible.com/pd/The-Death-of-Expertise-Audiobook/B0719BZRQJ?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/Death-Expertise-Campaign-Established-Knowledge/dp/0190469412 | Privacy Stan | https://twitter.com/Privacy_Stan | Sean Pratt | 520 | 0190469412 (ISBN13: 9780190469412) | 3.83 · Rating details · 5,348 ratings · 840 reviews | Hardcover, 272 pages | Published March 1st 2017 by Oxford University Press, USA (first published January 1st 2017) | Oxford University Press | 1-Mar-2017 | (first published January 1st 2017 | 4.5 | 1161 | https://www.amazon.com/Thomas-M-Nichols/e/B001HCWR8I/ref=dp_byline_cont_book_1 | BEST | ||||||||||||
Delete | 2009 | Delete: The Virtue of Forgetting in the Digital Age | Viktor Mayer-Schonberger | Book | Computers & Technology > History & Culture | https://www.amazon.com/Delete-Virtue-Forgetting-Digital-Age/dp/0691150362 | Amazon | https://www.amazon.com/Delete-Virtue-Forgetting-Digital-Age/dp/0691150362 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.3 | 26 | https://www.amazon.com/Viktor-Mayer-Sch%C3%B6nberger/e/B002O3TXHW/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Democracy disrupted? | 2018 | Democracy disrupted? Personal information and political influence | Information Commissioner’s Office | Research/Report | Politics | This report intends to ‘draw back the curtain’ on how personal information is used in modern political campaigns. It summarises the policy findings from our data analytics investigation, making recommendations in respectof the transparent and lawful use of data analytics in political campaigns in the future. // One of the most concerning findings from the investigation was a significant shortfall in transparency and provision of fair processing information. // Our investigation found a number of areas where we believe action is required to improve each of the political parties’ compliance with data protection law. Some of the issues raised included a lack of fair processing: ** in relation to use of personal data from the Electoral Register; ** when micro-targeting on social media; and ** when using software to screen people’s names for likely ethnicity and age | LINK1 | LINK2 | LINK3 | https://ico.org.uk/media/action-wevetaken/2259369/democracy-disrupted-110718.pdf | https://drive.google.com/file/d/17_hG_cvkNNxtGFJ95TX07llzS-kW1Qvq/view?usp=sharing | https://ico.org.uk/action-weve-taken/investigation-into-data-analytics-for-political-purposes/ | https://ico.org.uk/media/action-wevetaken/2259369/democracy-disrupted-110718.pdf | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||
Dentons' Privacy and Cybersecurity Law Blog | 2020 | Dentons' Privacy and Cybersecurity Law Blog | Dentons | Web Resource | Blog | Produced by Dentons Global Privacy and Security group, Privacy and Data Security Law provides information on creating, collecting, using, destructing, and securing data for compliance, to minimize litigation risk, and to maintain usability. The blog posts provide very detailed information and advice for data protection and other related topics. | LINK1 | http://www.privacyandcybersecuritylaw.com/ | http://www.privacyandcybersecuritylaw.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Determann's Field Guide to Data Privacy Law | 2020 | Determann's Field Guide to Data Privacy Law: International Corporate Compliance (4th Ed) | Lothar Determann | $70 | Book | Textbook: Computers & Technology > History & Culture | Companies, lawyers, privacy officers, compliance managers, as well as human resources, marketing and IT professionals are increasingly facing privacy issues. While information on privacy topics is freely available, it can be diffcult to grasp a problem quickly, without getting lost in details and advocacy. This is where Determann's Field Guide to Data Privacy Law comes into its own - identifying key issues and providing concise practical guidance for an increasingly complex field shaped by rapid change in international laws, technology and society. / This fourth revised edition reflects significant changes to data privacy law since 2017 such as the entering into force of the EU General Data Protection Regulation, as well as the challenges companies face with respect to data monetization, cloud adoption and the Internet of Things. With data privacy law enforcement at an all time high, readers will benefit from this introduction to key data privacy concepts and the useful practical guidance on starting, maintaining and auditing compliance programs. Step-by-step direction on drafting privacy documentation is provided, with 'how-to' suggestions for tackling other tasks and projects. Finally, the book offers an A-Z list of hot topics, organized by commonly used words and terms. This should be on the desk and in the briefcase of every compliance officer and corporate counsel. | https://www.amazon.com/Determanns-Field-Guide-Data-Privacy/dp/1789906180 | Amazon | LINK1 | https://www.e-elgar.com/shop/usd/determann-s-field-guide-to-data-privacy-law-9781789906202.html | https://www.amazon.com/Determanns-Field-Guide-Data-Privacy/dp/1789906180 | Multi: CIPP/E IAPP Auth Resources , CIPP/US IAPP Auth Resources, CIPP/M IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_E_Authoritative_Resource_List_4.1.0.pdf | 1789906180, 978-178990618 | Cheltenham. Edward Elgar, | Cheltenham | Edward Elgar | 4.5 | https://www.amazon.com/Lothar-Determann/e/B001K20I90/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||
Digital Hit Man | 2012 | The Digital Hit Man: His Weapons for Combating the Digital World | Frank Ahearn | Book | Computers & Technology > History & Culture | The Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites that violate your on-line privacy, be it scandalous information, negative information or the long-lost skeleton that digitally stepped out of the closet, now making your life miserable. | https://www.amazon.com/Digital-Hit-Man-Weapons-Combating/dp/0615595839/ | Amazon | GR | https://www.goodreads.com/book/show/13741838-the-digital-hit-man | https://www.amazon.com/Digital-Hit-Man-Weapons-Combating/dp/0615595839/ | Make Use Of | https://www.makeuseof.com/tag/books-online-privacy-security-need-read/ | 3.6 | 26 | https://www.amazon.com/Frank-M-Ahearn/e/B003YFQLK6/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||
Digital Identity | 2011 | Digital Identity | Clare Sullivan | $36 | Book | Law | https://www.amazon.com/Digital-Identity-Emergent-Legal-Concept/dp/0980723019 | Amazon | LINK1 | LINK2 | https://www.adelaide.edu.au/press/titles/digital-identity | https://drive.google.com/file/d/1F3S98lADR9CCufjBd8vWJsx5CIn_mkgE/view?usp=sharing | https://www.amazon.com/Digital-Identity-Emergent-Legal-Concept/dp/0980723019 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4 | Cover | BEST | |||||||||||||||||||||||
Digital Person | 2004 | The Digital Person: Technology And Privacy In The Information Age | Daniel J. Solove | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/Digital-Person-Technology-Privacy-Information/dp/0814740375 | Amazon | https://www.amazon.com/Digital-Person-Technology-Privacy-Information/dp/0814740375 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.8 | https://www.amazon.com/Daniel-J-Solove/e/B001IGLWC0/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||||
Digital Services Act EAVA | 2020 | Digital Services Act - European added value assessment | European Parliamentary Research Service | Research/Report | DSA | LINK1 | https://drive.google.com/file/d/1CvtK2xBuFps9ynMIhTVmOd7nX5h0j5ZG/view?usp=sharing | https://drive.google.com/file/d/1CvtK2xBuFps9ynMIhTVmOd7nX5h0j5ZG/view?usp=sharing | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||||
Domestic Surveillance Project | 2021 | EPIC Domestic Surveillance Project | Electronic Privacy Information Center | Web Resource | x | LINK1 | https://epic.org/privacy/surveillance/ | https://epic.org/privacy/surveillance/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||||
Dragnet Nation | 2014 | Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance | Julia Angwin | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/Dragnet-Nation-Security-Relentless-Surveillance/dp/B01LTHXKEU | Amazon | GR | https://www.goodreads.com/book/show/18465585-dragnet-nation | LINK1 | https://us.macmillan.com/books/9781250060860 | https://www.amazon.com/Dragnet-Nation-Security-Relentless-Surveillance/dp/B01LTHXKEU | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.1 | 107 | https://www.amazon.com/Julia-Angwin/e/B001JS1GVE/ref=dp_byline_cont_book_1 | BEST | |||||||||||||||||||||||
DSA (Proposed) | 2020 | Proposal for a Regulation of the European Parliament and of the Council on a Single Market For Digital Services (Digital Services Act) and amending Directive 2000/31/EC | European Commission | Proposal | DSA | LINK1 | LINK2 | https://ec.europa.eu/digital-single-market/en/news/proposal-regulation-european-parliament-and-council-single-market-digital-services-digital | https://drive.google.com/file/d/1DGGQ5Nl1d9KIvzWcYHg82YA3PKR5fEU-/view?usp=sharing | https://ec.europa.eu/digital-single-market/en/news/proposal-regulation-european-parliament-and-council-single-market-digital-services-digital | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||
DWT Privacy & Security Law Blog | 2020 | DWT Privacy & Security Law Blog | Davis Wright Tremaine LLP | Web Resource | Blog | In today’s world, where companies are collecting, using, and sharing personal information on an unprecedented scale, honoring consumers’ choices about how data is used and disclosed and securing personal data from unauthorized disclosure is critical. We have been pioneers in the dynamic area of privacy and security law, serving highly regulated industries, such as communications, healthcare and financial services, for decades. As privacy and information security requirements have evolved to extend beyond these historically regulated industries to apply to virtually every business organization, we have expanded our counseling to advise companies in other industry sectors, such as technology, media, entertainment, retail, advertising, and more. / Our core Privacy and Security team counsels clients regarding internal employee information, consumer-facing requirements associated with marketing and payments, protecting companies from cyber-attacks, cross-border data transfers, vendor management, due diligence in the context of mergers and acquisitions, and more. | LINK1 | https://www.dwt.com/blogs/privacy--security-law-blog | https://www.dwt.com/blogs/privacy--security-law-blog | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | |||||||||||||||||||||||||||||
Economics of Privacy | 2016 | The Economics of Privacy | Alessandro Acquisti, Curtis Taylor, Liad Wagman | Research/Report | Economics | This article summarizes and draws connections among diverse streams of theoretical and empirical research on the economics of privacy. We focus on the economic value and consequences of protecting and disclosing personal information, and on consumers’ understanding and decisions regarding the trade-offs associated with the privacy and the sharing of personal data. We highlight how the economic analysis of privacy evolved over time, as advancements in information technology raised increasingly nuanced and complex issues. We find and highlight three themes that connect diverse insights from the literature. First, characterizing a single unifying economic theory of privacy is hard, because privacy issues of economic relevance arise in widely diverse contexts. Second, there are theoretical and empirical situations where the protection of privacy can both enhance and detract from individual and societal welfare. Third, in digital economies, consumers’ ability to make informed decisions about their privacy is severely hindered because consumers are often in a position of imperfect or asymmetric information regarding when their data is collected, for what purposes, and with what consequences. We conclude the article by highlighting some of the ongoing issues in the privacy debate of interest to economists. (JEL D82, D83, G20, I10, L13, M31, M37) | LINK1 | LINK2 | LINK3 | https://www.aeaweb.org/articles?id=10.1257/jel.54.2.442 | https://drive.google.com/file/d/1CjJo1wLqpn6B9gXJLVBTnO3qeqCzPhKh/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2580411 | https://www.aeaweb.org/articles?id=10.1257/jel.54.2.442 | Privacy Stan | https://twitter.com/Privacy_Stan | Journal of Economic Literature | Journal of Economic Literature | Acquisti, Alessandro, Curtis Taylor, and Liad Wagman. 2016. "The Economics of Privacy." Journal of Economic Literature, 54 (2): 442-92. DOI: 10.1257/jel.54.2.442 | BEST | ||||||||||||||||||||||
Efficiency Paradox | 2018 | Efficiency Paradox: What Big Data Can’t Do | Edward Tenner | $10 | Book | Business & Money > Management & Leadership | A bold challenge to our obsession with efficiency--and a new understanding of how to benefit from the powerful potential of serendipity. / Algorithms, multitasking, sharing economy, life hacks: our culture can't get enough of efficiency. One of the great promises of the Internet and big data revolutions is the idea that we can improve the processes and routines of our work and personal lives to get more done in less time than ever before. There is no doubt that we're performing at higher scales and going faster than ever, but what if we're headed in the wrong direction? / The Efficiency Paradox questions our ingrained assumptions about efficiency, persuasively showing how relying on the algorithms of platforms can in fact lead to wasted efforts, missed opportunities, and above all an inability to break out of established patterns. Edward Tenner offers a smarter way to think about efficiency, showing how we can combine artificial intelligence and our own intuition, leaving ourselves and our institutions open to learning from the random and unexpected. | https://www.amazon.com/Efficiency-Paradox-What-Data-Cant/dp/1400041392 | Amazon | GR | https://www.goodreads.com/en/book/show/35881008 | https://www.amazon.com/Efficiency-Paradox-What-Data-Cant/dp/1400041392 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1400041392 (ISBN13: 9781400041398) | 3.31 · Rating details · 211 ratings · 36 reviews | Hardcover, 320 pages | Published April 17th 2018 by Knopf Publishing Group (first published 2018) | Knopf Publishing Group | 17-Apr-2018 | first published 2018 | 4.1 | 21 | https://www.amazon.com/Edward-Tenner/e/B000AP7YSG/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||
Enemy of the State | 1998 | Enemy of the State | Tony Scott (Director) | Movie | Fiction | x | x | This action-packed Will Smith and Gene Hackman-starrer is a classic example of movies tackling cybersecurity and data breach in relation to the government. Although accidentally running across a videotape that serves as crucial evidence to an assassination case and being chased down by abusive National Security Agents isn’t something that can happen to anyone, it portrays a concern many of us have—our digital footprint under intense government surveillance. | https://www.amazon.com/Enemy-State-Will-Smith/dp/B006CEJ5X6 | Amazon | LINK1 | https://play.google.com/store/movies/details?id=waEa5bD76Po | https://www.amazon.com/Enemy-State-Will-Smith/dp/B006CEJ5X6 | Nolisoli | https://nolisoli.ph/81744/7-films-on-data-privacy-ymagcamit-20200610/ | 0 | BEST | ||||||||||||||||||||||||
EPIC AI Policy Sourcebook | 2020 | EPIC AI Policy Sourcebook | Marc Rotenberg | Book | Engineering & Transportation | The EPIC AI Policy Sourcebook is the first compendium of AI policy, providing essential information to policy makers, researchers, journalists, and the public. The EPIC AI Policy Sourcebook includes global AI frameworks such as the OECD AI Principles and the Universal Guidelines for AI, materials from the European Union and the Council of Europe, corporate and civil society AI frameworks, as well as recommendations from professional societies, including the ACM and the IEEE. The 2020 edition was also updated to include the Beijing Guidelines, the Defense Innovation Board Principles, AI policy surveys, and national AI strategies. The EPIC AI Policy Sourcebook also includes an extensive resources section on AI, including reports, articles, and books from around the world. | https://www.amazon.com/AI-Policy-Sourcebook-2020-ebook/dp/B0821Q86GV | Amazon | GR | https://www.goodreads.com/book/show/52065877-the-ai-policy-sourcebook-2019 | LINK1 | https://epic.org/bookstore/ai2020/ | https://www.amazon.com/AI-Policy-Sourcebook-2020-ebook/dp/B0821Q86GV | Privacy Stan | https://twitter.com/Privacy_Stan | 2 | https://www.amazon.com/Marc-Rotenberg/e/B07RM63YY1/ref=dp_byline_cont_ebooks_1 | BEST | |||||||||||||||||||||||
EPIC Privacy News Feed | 2021 | EPIC Privacy News Feed | Electronic Privacy Information Center | Web Resource | News | LINK1 | https://www.epic.org/news/ | https://www.epic.org/news/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||||
Escaping the Rabbit Hole | 2018 | Escaping the Rabbit Hole | Mick West | Book/Audio | Politics & Social Sciences | Disinformation | The Earth is flat, the World Trade Center collapse was a controlled demolition, planes are spraying poison to control the weather, and actors faked the Sandy Hook massacre…. / All these claims are bunk: falsehoods, mistakes, and in some cases, outright lies. But many people passionately believe one or more of these conspiracy theories. They consume countless books and videos, join like-minded online communities, try to convert those around them, and even, on occasion, alienate their own friends and family. Why is this, and how can you help people, especially those closest to you, break free from the downward spiral of conspiracy thinking? / In Escaping the Rabbit Hole, author Mick West shares over a decade’s worth of knowledge and experience investigating and debunking false conspiracy theories through his forum, MetaBunk.org, and sets forth a practical guide to helping friends and loved ones recognize these theories for what they really are. / Perhaps counter-intuitively, the most successful approaches to helping individuals escape a rabbit hole aren’t comprised of simply explaining why they are wrong; rather, West’s tried-and-tested approach emphasizes clear communication based on mutual respect, honesty, openness, and patience. / West puts his debunking techniques and best practices to the test with four of the most popular false conspiracy theories today (Chemtrails, 9/11 Controlled Demolition, False Flags, and Flat Earth) — providing road maps to help you to understand your friend and help them escape the rabbit hole. These are accompanied by real-life case studies of individuals who, with help, were able to break free from conspiracism. | https://www.amazon.com/Escaping-Rabbit-Hole-Conspiracy-Theories-ebook/dp/B077YS5G2N | Amazon | GR | https://www.goodreads.com/book/show/37510834-escaping-the-rabbit-hole?from_search=true&from_srp=true&qid=CwVh0x4NR8&rank=1 | AUD | https://www.audible.com/pd/Escaping-the-Rabbit-Hole-Audiobook/1982540966?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/Escaping-Rabbit-Hole-Conspiracy-Theories-ebook/dp/B077YS5G2N | Privacy Stan | https://twitter.com/Privacy_Stan | Ralph Lister | 677 | 1510735801 (ISBN13: 9781510735804) | 3.83 · Rating details · 252 ratings · 45 reviews | Hardcover, 304 pages | Published September 18th 2018 by Skyhorse (first published 2018) | Skyhorse | 18-Sep-2018 | first published 2018 | 0 | 116 | https://www.amazon.com/Mick-West/e/B0781K1G29/ref=dp_byline_cont_ebooks_1 | BEST | ||||||||||||
Eternal Criminal Record | 2015 | The Eternal Criminal Record | James B. Jacobs | $44 | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/gp/product/0674368266 | Amazon | https://www.amazon.com/gp/product/0674368266 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | 4 | Cover | BEST | ||||||||||||||||||||||||||
EU Data Protection and the GDPR | 2020 | EU Data Protection and the GDPR | Daniel Solove, Paul Schwartz | $103 | Book | Developed from the casebook Information Privacy Law, this short paperback contains key cases and materials focusing on privacy issues related to the GDPR and data protection in the European Union. Topics covered include the GDPR, Schrems cases, the right to be forgotten, and international data transfers. | https://www.amazon.com/gp/product/1543832636 | Amazon | https://www.amazon.com/gp/product/1543832636 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1543832636, 978-1543832631 | 200 | Wolters Kluwer (November 23, 2020) | Wolters Kluwer | 23-Nov-2020 | BEST | ||||||||||||||||||||||||
European Data Protection | 2019 | European Data Protection, Second Edition | Ustaran, Eduardo et al. | $75 | Book | Textbook | LINK1 | https://iapp.org/store/books/a191P000003Rf4QQAS/ | https://iapp.org/store/books/a191P000003Rf4QQAS/ | CIPP/E IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_E_Authoritative_Resource_List_4.1.0.pdf | IAPP Publications | IAPP | BEST | |||||||||||||||||||||||||||
European Data Protection Supervisor | 2021 | European Data Protection Supervisor | EDPS | Web Resource | LINK1 | https://edps.europa.eu/edps-homepage_en?lang=en | https://edps.europa.eu/edps-homepage_en?lang=en | CIPP/E IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_E_Authoritative_Resource_List_4.1.0.pdf | BEST | |||||||||||||||||||||||||||||||
Everybody Lies | 2017 | Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are | Seth Stephens-Davidowitz | Book | Business & Money > Management & Leadership | Blending the informed analysis of The Signal and the Noise with the instructive iconoclasm of Think Like a Freak, a fascinating, illuminating, and witty look at what the vast amounts of information now instantly available to us reveals about ourselves and our world—provided we ask the right questions. / By the end of an average day in the early twenty-first century, human beings searching the internet will amass eight trillion gigabytes of data. This staggering amount of information—unprecedented in history—can tell us a great deal about who we are—the fears, desires, and behaviors that drive us, and the conscious and unconscious decisions we make. From the profound to the mundane, we can gain astonishing knowledge about the human psyche that less than twenty years ago, seemed unfathomable. / Everybody Lies offers fascinating, surprising, and sometimes laugh-out-loud insights into everything from economics to ethics to sports to race to sex, gender and more, all drawn from the world of big data. What percentage of white voters didn’t vote for Barack Obama because he’s black? Does where you go to school effect how successful you are in life? Do parents secretly favor boy children over girls? Do violent films affect the crime rate? Can you beat the stock market? How regularly do we lie about our sex lives and who’s more self-conscious about sex, men or women? | https://www.amazon.com/Everybody-Lies-Internet-About-Really/dp/0062390856 | Amazon | https://www.amazon.com/Everybody-Lies-Internet-About-Really/dp/0062390856 | Privacy Stan | https://twitter.com/Privacy_Stan | 4.4 | 1514 | https://www.amazon.com/Seth-Stephens-Davidowitz/e/B072549W28/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||
Everyday Surveillance | 2013 | Everyday Surveillance: Vigilance and Visibility in Postmodern Life | William G. Staples | Book | Politics & Social Sciences > Politics & Government | x | https://www.amazon.com/EVERYDAY-SURVEILLANCE-VIGILANCE-Visibility-Postmodern/dp/0742500780 | Amazon | https://www.amazon.com/EVERYDAY-SURVEILLANCE-VIGILANCE-Visibility-Postmodern/dp/0742500780 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.6 | https://www.amazon.com/William-G-Staples/e/B000APOYRA/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Evolution of European Data Law | 2020 | The Evolution of European Data Law | Thomas Streinz | Draft | GDPR | Draft from forthcoming in Paul Craig and Gráinne de Búrca (eds), The Evolution of EU Law (Oxford University Press, 3rd edn 2021) chapter 29. Please cite to the published version. | LINK1 | LINK2 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3762971 | https://drive.google.com/file/d/1Ctj9Oa6SOoxs0mCG9sd6Kmv1fQys3JaN/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3762971 | Privacy Stan | https://twitter.com/Privacy_Stan | Steinz, Thomas, The Evolution of European Data Law (January 9, 2021). Paul Craig and Gráinne de Búrca (eds), The Evolution of EU Law (OUP, 3rd edn 2021), Available at SSRN: https://ssrn.com/abstract=3762971 | SSRN | 9-Jan-2021 | 3rd edition | BEST | |||||||||||||||||||||||
Evolution of Privacy Tech | 2020 | The Evolution of Privacy Tech | Michael Tefula | Web Resource | Blog Post | LINK1 | LINK2 | https://michaeltefula.medium.com/the-evolution-of-privacy-tech-611dc3f1a79f | https://miro.medium.com/max/3000/1*NUdqdoUyjgy2s7RPt_YNrA.png | https://michaeltefula.medium.com/the-evolution-of-privacy-tech-611dc3f1a79f | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||
Ex Machina | 2014 | Ex Machina | Alex Garland | Movie | Science Fiction, Drama, Suspense | x | Caleb Smith is a programmer who works for Blue Book, a fictionalized search engine giant. He wins an office contest to go to the home of the CEO of Blue Book to conduct a Turing test on a humanoid robot. Smith soon learns the robot is powered by an artificial intelligence that learned everything about humanity through inquiries that ran through the search engine. The less you know about the rest of the plot, the better. If you are looking for a slow-burning, twisty, mature sci-fi film that also takes a darker look at big data and AI, look no further. | https://www.amazon.com/Ex-Machina-Alicia-Vikander/dp/B00VWPQNJ4 | Amazon | LINK1 | LINK2 | LINK3 | https://en.wikipedia.org/wiki/Ex_Machina_(film) | https://www.imdb.com/title/tt0470752/ | https://www.amazon.com/Machina-DVD-Digital-Oscar-Isaac/dp/B00XI059W8 | https://www.amazon.com/Ex-Machina-Alicia-Vikander/dp/B00VWPQNJ4 | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | 0 | BEST | |||||||||||||||||||||
Exploding Data | 2018 | Exploding Data: Reclaiming Our Cybersecurity in the Digital Age | Michael Chertoff | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/Exploding-Data-Reclaiming-Security-Digital/dp/0802127932 | Amazon | https://www.amazon.com/Exploding-Data-Reclaiming-Security-Digital/dp/0802127932 | NYPL | https://www.nypl.org/blog/2019/10/23/privacy-essential-reading-list | 4.5 | 19 | https://www.amazon.com/Michael-Chertoff/e/B0028ONGRU/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Exposed | 2015 | Exposed: Desire and Disobedience in the Digital Age | Bernard E. Harcourt | Book | Engineering & Transportation > Engineering | https://www.amazon.com/gp/product/0674504577 | Amazon | https://www.amazon.com/gp/product/0674504577 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.1 | 5 | https://www.amazon.com/Bernard-E-Harcourt/e/B001IXU7YW/ref=dp_byline_cont_book_1 | BEST | |||||||||||||||||||||||||||
EyeMonger | 2020 | The EyeMonger | Daniel Solove | $26 | Book | Fiction: Children's Growing Up & Facts of Life | Chidren's | In a faraway land, a stranger arrives with promises of greater security in exchange for sacrificing privacy. His name is The Eyemonger, and he has 103 eyes. With the help of flying eye creatures, he spies on everybody. But his plan soon starts to go wrong . . . The Eyemonger is an illustrated children’s book by the internationally renowned privacy expert, Daniel J. Solove. The book discusses the importance of privacy in a way that children can understand. It is one of the few (if only) books for children on the topic of privacy. | https://www.amazon.com/gp/product/0578802686 | Amazon | GR | https://www.goodreads.com/book/show/56123312-the-eyemonger | LINK1 | https://teachprivacy.com/ | https://www.amazon.com/gp/product/0578802686 | Privacy Stan | https://twitter.com/Privacy_Stan | 0578802686 (ISBN13: 9780578802688) | Hardcover, 48 pages | Published November 21st 2020 by Griffin Press | Griffin Press | 21-Nov-2020 | 4.8 | 8 | https://www.amazon.com/Daniel-J-Solove/e/B001IGLWC0/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||
Eyes and Spies | 2017 | Eyes and Spies: How You're Tracked and Why You Should Know | Tanya Lloyd Kyi | Book | Fiction: Teen & Young Adult | https://www.amazon.com/Eyes-Spies-Tracked-Should-Exploration/dp/1554519101 | Amazon | https://www.amazon.com/Eyes-Spies-Tracked-Should-Exploration/dp/1554519101 | NYPL | https://www.nypl.org/blog/2019/10/23/privacy-essential-reading-list | 4.4 | 4 | https://www.amazon.com/Tanya-Lloyd-Kyi/e/B001JS02GY/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Facebook Effect | 2010 | The Facebook Effect: The Inside Story of the Company That Is Connecting the World | David Kirkpatrick | Book | Business & Money > Biography & History | https://www.amazon.com/Facebook-Effect-Inside-Company-Connecting/dp/1439102120 | Amazon | https://www.amazon.com/Facebook-Effect-Inside-Company-Connecting/dp/1439102120 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.3 | 275 | https://www.amazon.com/David-Kirkpatrick/e/B003316YCG/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Failure of Fair Information Practice Principles | 2006 | The Failure of Fair Information Practice Principles | Fred Cate | Research/Report | FIPPs | Modern data protection law is built on "fair information practice principles." .... FIPPS have increasingly been reduced to narrow, legalistic principles (e.g., notice, choice, access, security, and enforcement). These principles reflect a procedural approach to maximizing individual control over data rather than individual or societal welfare....As theoretically appealing as this approach may be, it has proven unsuccessful in practice. Businesses and other data users are burdened with legal obligations while individuals endure an onslaught of notices and opportunities for often limited choice. ...Moreover, choice is often an annoyance or even a disservice to individuals. In addition, many services cannot be offered subject to individual choice...In short, the control-based system of data protection, with its reliance on narrow, procedural FIPPS, is not working. The available evidence suggests that privacy is not better protected. ...This paper reflects a modest first step at articulating an approach to privacy laws that does not reject notice and choice, but does not seek to rely on it for all purposes. Drawing on other forms of consumer protection, in which standards of protection are not negotiable between providers and consumers, I propose that national governments stop subjecting vast flows of personal data to restraints based on individual preferences or otherwise imposing the considerable transaction costs of the current approach. Instead, the paper proposes that lawmakers reclaim the original broader concept of FIPPS by adhering to Consumer Privacy Protection Principles (CPPPS) that include substantive restrictions on data processing designed to prevent specific harms. The CPPPS framework is only a first step. It is neither complete nor perfect, but it is an effort to return to a more meaningful dialogue about the legal regulation of privacy and the value of information flows in the face of explosive growth in technological capabilities in an increasingly interconnected, global society. | LINK1 | LINK2 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972 | https://drive.google.com/file/d/1DSEf1P9Y0ldHsLNNH-RjWz5Y7GQXnLWL/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972 | Privacy Stan | https://twitter.com/Privacy_Stan | Consumer Protection in the Age of the Information Economy, 2006 | Consumer Protection in the Age of the Information Economy | 28-Jun-1905 | BEST | ||||||||||||||||||||||||
Family Secrets | 2017 | Family Secrets: Shame and Privacy in Modern Britain | Deborah Cohen | Book | Textbooks > Humanities | https://www.amazon.com/gp/product/0190673494 | Amazon | https://www.amazon.com/gp/product/0190673494 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.1 | https://www.amazon.com/Deborah-Cohen/e/B008HDHCF8/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||||
Fatal System Error | 2010 | Fatal System Error | Joseph Menn | Book | Computers & Technology > Networking & Cloud Computing | https://www.amazon.com/Fatal-System-Error-Bringing-Internet/dp/1586489070/ | Amazon | https://www.amazon.com/Fatal-System-Error-Bringing-Internet/dp/1586489070/ | Make Use Of | https://www.makeuseof.com/tag/books-online-privacy-security-need-read/ | 4.1 | 89 | https://www.amazon.com/Joseph-Menn/e/B001HD1MF6/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Federal Trade Commission Privacy Law and Policy | 2016 | Federal Trade Commission Privacy Law and Policy | Chris Jay Hoofnagle | Book | Law > Business | https://www.amazon.com/gp/product/1107565634 | Amazon | https://www.amazon.com/gp/product/1107565634 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | https://www.amazon.com/Chris-Jay-Hoofnagle/e/B015LYG1UM/ref=dp_byline_cont_book_1 | BEST | ||||||||||||||||||||||||||||
Fiduciary Boilerplate | 2020 | Fiduciary Boilerplate: Locating Fiduciary Relationships in Information Age Consumer Transactions | Lauren Henry Scholz | Law Journal | Data Fiduciaries | The result of applying general contract principles to consumer boilerplate has been a mass transfer of unrestricted rights to use and sell personal information from consumers to companies. This has enriched companies and enhanced their ability to manipulate consumers. It has also contributed to the modern data insecurity crisis. Consumer transactions should create fiduciary relationships between firm and consumer as a matter of law. Recognizing this fiduciary relationship at law honors the existence of consumer agreements while also putting adaptable, context-sensitive limits on opportunistic behavior by firms. In a world of ubiquitous, interconnected, and mutable contracts, consumers must trust the companies with which they transact not to expose them to economic exploitation and undue security risks: the very essence of a fiduciary relationship. Firms owe fiduciary duties of loyalty and care to their customers that cannot be displaced by assent to boilerplate. History, doctrine, and pragmatism all support this position. | LINK1 | LINK2 | LINK3 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3620164 | https://search.proquest.com/openview/d759eedfa61ae3bb2b3276a988cf55d4/1?pq-origsite=gscholar&cbl=31763 | https://drive.google.com/file/d/1G2_FDVpsCGCiaDamX9YOpZD-dA7d76MM/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3620164 | FPF Privacy Papers Award | https://www.linkedin.com/pulse/11th-annual-privacy-papers-policymakers-award-jules-polonetsky/ | Journal of Corporation Law, Vol. 46, 2020 | Journal of Corporation Law | 12-Jul-1905 | Vol. 46 | BEST | |||||||||||||||||||||
Fiduciary Model of Privacy | 2020 | The Fiduciary Model of Privacy | Jack Balkin | Law Journal | Data Fiduciaries | In the digital age people are increasingly dependent on and vulnerable to digital businesses that collect data from them and use data about them. These companies use data to predict and control what end users do, and to sell advertisers access to those end users. Digital companies invite people to trust them with their data. When people accept that offer of trust, they become vulnerable: to how the companies use their data, to companies’ data security (or lack thereof), and to companies’ choice to share or sell the data to others. Because of the vulnerability and dependence created by information capitalism, I have argued that the law should treat digital companies that collect and use end user data according to fiduciary principles. The law should regard them as information fiduciaries. | LINK1 | LINK2 | https://harvardlawreview.org/2020/10/the-fiduciary-model-of-privacy/ | https://drive.google.com/file/d/1CtFG44J94qjAW6VucANW_nuqSJjVksCd/view?usp=sharing | https://harvardlawreview.org/2020/10/the-fiduciary-model-of-privacy/ | Privacy Stan | https://twitter.com/Privacy_Stan | Harvard Law | Harvard Law | BEST | |||||||||||||||||||||||||
Fieldfisher: Privacy, Security and Information Law | 2020 | Fieldfisher: Privacy, Security and Information Law Blog | fieldfisher | Web Resource | Blog | Fieldfisher is a European law firm with market leading practices in many of the world's most dynamic sectors. | LINK1 | https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog | https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog | CIPP/E IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_E_Authoritative_Resource_List_4.1.0.pdf | BEST | |||||||||||||||||||||||||||||
Filter Bubble | 2011 | The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think | Eli Pariser | Book | https://www.amazon.com/Filter-Bubble-Personalized-Changing-Think/dp/0143121235 | Amazon | GR | https://www.goodreads.com/book/show/10596103-the-filter-bubble | LINK1 | LINK2 | https://en.wikipedia.org/wiki/Filter_bubble | https://books.google.com/books/about/The_Filter_Bubble.html?id=Qn2ZnjzCE3gC | https://www.amazon.com/Filter-Bubble-Personalized-Changing-Think/dp/0143121235 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
First Amendment Bubble | 2015 | The First Amendment Bubble: How Privacy and Paparazzi Threaten a Free Press | Amy Gajda | Book | https://www.amazon.com/First-Amendment-Bubble-Paparazzi-Threaten/dp/0674368320 | Amazon | https://www.amazon.com/First-Amendment-Bubble-Paparazzi-Threaten/dp/0674368320 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Fourth Amendment | 2008 | The Fourth Amendment: Origins and Original Meaning 602-1791 | William Cuddihy | Book | https://www.amazon.com/Fourth-Amendment-Origins-Original-Meaning/dp/0195367197 | Amazon | https://www.amazon.com/Fourth-Amendment-Origins-Original-Meaning/dp/0195367197 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Fourth Amendment in an Age of Surveillance | 2017 | The Fourth Amendment in an Age of Surveillance | David Gray | Book | Law > Criminal Law | x | https://www.amazon.com/gp/product/1107589789 | Amazon | https://www.amazon.com/gp/product/1107589789 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.5 | 6 | https://www.amazon.com/David-Gray/e/B071NV5JY2/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||
FTC Enforcement Actions | 2014 | What FTC Enforcement Actions Teach Us About the Features of Reasonable Privacy and Data Security Practices | Patricia Bailin | Law Journal | FTC Enforcement | In at least 47 cases since 2002, the FTC has cited companies for failing either to design or to implement an appropriately comprehensive privacy or data security program. Almost all of these cases have been settled.... by pointing out what companies did not have in their [privacy & security] programs, the FTC provides a peek at what, in its opinion, these companies should have done. The guidelines below are drawn from the 47 cases, loosely organized into seven categories that are not mutually exclusive: Privacy, Security, Software/Product Review, Service Providers, Risk Assessment, Unauthorized Access/Disclosure and Employee Training. | LINK1 | LINK2 | https://iapp.org/resources/article/study-what-ftc-enforcement-actions-teach-us-about-the-features-of-reasonable-privacy-and-data-security-practices-2/ | https://drive.google.com/file/d/1dYmnM0X9O5VeZ-7weU18fpcc1hy6ni0M/view?usp=sharing | https://iapp.org/resources/article/study-what-ftc-enforcement-actions-teach-us-about-the-features-of-reasonable-privacy-and-data-security-practices-2/ | Privacy Stan | https://twitter.com/Privacy_Stan | Westin | Westin | BEST | |||||||||||||||||||||||||
Future of Foreign Intelligence | 2016 | The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age | Laura K. Donohue | Book | Politics & Social Sciences > Politics & Government | x | https://www.amazon.com/gp/product/0190235381 | Amazon | https://www.amazon.com/gp/product/0190235381 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.5 | Cover | BEST | |||||||||||||||||||||||||||
Future of Reputation | 2007 | The Future of Reputation: Gossip, Rumor, and Privacy on the Internet | Daniel J. Solove | Book | https://www.amazon.com/Future-Reputation-Gossip-Privacy-Internet/dp/0300144229 | Amazon | https://www.amazon.com/Future-Reputation-Gossip-Privacy-Internet/dp/0300144229 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Gattaca | 1997 | Gattaca | Andrew Niccol | Movie | Science Fiction, Suspense, Drama | In Gattaca, the protagonist (Ethan Hawke) is a natural-born person in a world where most people are genetically-engineered. He wants to be an astronaut, but genetic markers for a potential heart condition preclude him from pursuing this dream. So he takes on the identity of another person with “superior” DNA. The movie demonstrates the importance of genetic privacy. People would be profoundly unfree if their future possibilities were severely restricted based on their genetics. | https://www.amazon.com/Gattaca-Ethan-Hawke/dp/B000I8G5B2 | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0119177/?ref_=fn_al_tt_1 | https://en.wikipedia.org/wiki/Gattaca | https://www.amazon.com/gp/product/1424821029 | https://www.amazon.com/Gattaca-Ethan-Hawke/dp/B000I8G5B2 | Solove Films | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | SONY | SONY | BEST | |||||||||||||||||||||
GDPR Genius | 2020 | GDPR Genius | IAPP | Web Resource | This interactive tool provides IAPP members ready access to critical EU General Data Protection Regulation resources — enforcement precedent, interpretive guidance, expert analysis and more — all in one location. Users can click on any GDPR article to access the following content relevant to that particular GDPR provision | LINK1 | https://iapp.org/resources/article/gdpr-genius/ | https://iapp.org/resources/article/gdpr-genius/ | Privacy Stan | https://twitter.com/Privacy_Stan | IAPP | IAPP | BEST | ||||||||||||||||||||||||||||
Genetic Privacy | 2002 | Genetic Privacy: A Challenge to Medico-Legal Norms | Graeme Laurie | Book | https://www.amazon.com/Genetic-Privacy-Challenge-Medico-Legal-Norms/dp/0521047129 | Amazon | LINK1 | https://www.journals.uchicago.edu/doi/10.1086/379993 | https://www.amazon.com/Genetic-Privacy-Challenge-Medico-Legal-Norms/dp/0521047129 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Genetic Secrets | 1997 | Genetic Secrets: Protecting Privacy and Confidentiality in the Genetic Era | Mark A. Rothstein (editor) | Book | https://www.amazon.com/Genetic-Secrets-Protecting-Privacy-Confidentiality/dp/0300080638 | Amazon | https://www.amazon.com/Genetic-Secrets-Protecting-Privacy-Confidentiality/dp/0300080638 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Ghost Fleet | 2015 | Ghost Fleet | Peter Singer, August Cole | Book | Fiction: Mystery, Thriller & Suspense > Thrillers & Suspense | https://www.amazon.com/gp/product/0544142845 | Amazon | https://www.amazon.com/gp/product/0544142845 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 4.1 | 1871 | https://www.amazon.com/August-Cole/e/B00MR5I5YY/ref=dp_byline_cont_book_2 | BEST | |||||||||||||||||||||||||||
Ghost in the wires | 2011 | Ghost in the Wires: My Adventures as the World's Most Wanted Hacker | Kevin Mitnick | Book | https://www.amazon.com/Ghost-Wires-Adventures-Worlds-Wanted/dp/0316037729 | Amazon | https://www.amazon.com/Ghost-Wires-Adventures-Worlds-Wanted/dp/0316037729 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Girl with the Dragon Tattoo | 2011 | Girl with the Dragon Tattoo | David Fincher | Movie | Crime, Drama, Mystery | Based on the first of Stieg Larsson's Millennium trilogy of crime novels, this movie has everything: sex, violence, interesting hacks, betrayal, and even a great car/motorcycle chase. While it's essentially a crime drama, the hacker and antisocial personality Lisbeth Salander, played by Rooney Mara, offers up some interesting questions about the ethics of hacking. Is hacking OK if we're looking to solve a murder? Do large, greedy corporations deserve what they get if they're hacked? From a hacking perspective, one of the funnier and more ironic moments in the movie is when Mara's character is confronted by journalist Mikael Blomkvist, played by Daniel Craig, who says, "You can't access those files – they're encrypted." Lisbeth smugly responds, "Please." | https://www.amazon.com/Girl-Dragon-Tattoo-Daniel-Craig/dp/B007FH9GA6 | Amazon | LINK1 | LINK2 | https://en.wikipedia.org/wiki/The_Girl_with_the_Dragon_Tattoo_(2011_film) | https://www.imdb.com/title/tt1568346/ | https://www.amazon.com/Girl-Dragon-Tattoo-Daniel-Craig/dp/B007FH9GA6 | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334201 | BEST | |||||||||||||||||||||||||
Global Privacy & Security Compliance Law Blog | 2021 | Global Privacy & Security Compliance Law Blog | Latham & Watkins LLP | Web Resource | Blog | Commentary on Global Privacy and Security Issues of Today | LINK1 | https://www.globalprivacyblog.com/ | https://www.globalprivacyblog.com/ | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | |||||||||||||||||||||||||||||
Global Privacy & Security Law | 2009 | Global Privacy & Security Law | Francoise Gilbert | $1,721 | Book | Textbook | x | LINK1 | https://lrus.wolterskluwer.com/store/product/global-privacy-and-security-law/ | https://lrus.wolterskluwer.com/store/product/global-privacy-and-security-law/ | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
Glossary of Privacy Terms | 2020 | IAPP Glossary of Privacy Terms | IAPP | Web Resource | LINK1 | https://iapp.org/resources/glossary/ | https://iapp.org/resources/glossary/ | Privacy Stan | https://twitter.com/Privacy_Stan | IAPP | IAPP | BEST | |||||||||||||||||||||||||||||
Good Night, And Good Luck | 2005 | Good Night, And Good Luck | George Clooney | Movie | Biography, Drama, History | Broadcast journalist Edward R. Murrow looks to bring down Senator Joseph McCarthy. | https://www.amazon.com/Good-Night-Luck-David-Strathairn/dp/B002M82CMW | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0433383/ | https://www.amazon.com/Good-Night-Luck-Widescreen/dp/B000E1NXJ0 | https://en.wikipedia.org/wiki/Good_Night,_and_Good_Luck | https://www.amazon.com/Good-Night-Luck-David-Strathairn/dp/B002M82CMW | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||
Googlization of Everything | 2011 | The Googlization of Everything: (And Why We Should Worry) | Siva Vaidhyanathan | Book | Business & Money > Biography & History | https://www.amazon.com/Googlization-Everything-Why-Should-Worry/dp/0520258827 | Amazon | https://www.amazon.com/Googlization-Everything-Why-Should-Worry/dp/0520258827 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4 | 43 | https://www.amazon.com/Siva-Vaidhyanathan/e/B001HD3XQC/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Gossip | 2011 | Gossip: The Untrivial Pursuit | Joseph Epstein | Book | Health, Fitness & Dieting > Psychology & Counseling | https://www.amazon.com/Gossip-Joseph-Epstein/dp/054784459X | Amazon | https://www.amazon.com/Gossip-Joseph-Epstein/dp/054784459X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.9 | 38 | https://www.amazon.com/Joseph-Epstein/e/B000APTOSE/ref=dp_byline_cont_book_1 | 256 | BEST | ||||||||||||||||||||||||||
Governance of Privacy | 2006 | The Governance of Privacy: Policy Instruments in Global Perspective | Colin Bennett & Charles Raab | Book | Textbooks > Social Sciences | https://www.amazon.com/Governance-Privacy-Colin-J-Bennett/dp/1138709980 | Amazon | LINK1 | https://mitpress.mit.edu/books/governance-privacy | https://www.amazon.com/Governance-Privacy-Colin-J-Bennett/dp/1138709980 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | https://www.amazon.com/Colin-J-Bennett/e/B001JSEDDM/ref=dp_byline_cont_book_1 | Cover | 272 | BEST | ||||||||||||||||||||||||
Great Hack | 2019 | The Great Hack | Karim Amer, Jehane Noujaim (Director) | Movie | Documentary | Social Media | In 2018, social media was shaken after a data breach scandal involving Facebook and Cambridge Analytica, who gathered personal data from millions of the social networking site’s users to use for political advertising. Aside from sparking the online movement #DeleteFacebook, this incident was also tackled by the documentary produced and directed by Academy Award-nominated personalities Jehane Noujaim and Karim Amer. “The Great Hack” exposed the data mining work of the United Kingdom-based firm Cambridge Analytica not just in the United States, but also in its homeland and other countries. | LINK1 | LINK2 | LINK3 | https://www.netflix.com/title/80117542 | https://en.wikipedia.org/wiki/The_Great_Hack | https://www.imdb.com/title/tt4736550/ | https://www.netflix.com/title/80117542 | Nolisoli | https://nolisoli.ph/81744/7-films-on-data-privacy-ymagcamit-20200610/ | BEST | ||||||||||||||||||||||||
Guarding Life’s Dark Secrets | 2007 | Guarding Life’s Dark Secrets | Lawrence M. Friedman | Book | https://www.amazon.com/Guarding-Lifes-Dark-Secrets-Reputation/dp/0804757399 | Amazon | LINK1 | https://www.sup.org/books/title/?id=11886 | https://www.amazon.com/Guarding-Lifes-Dark-Secrets-Reputation/dp/0804757399 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Habeas Data | 2018 | Habeas Data: Privacy vs. the Rise of Surveillance Tech | Cyrus Farivar | Book/Audio | x | A book about what the Cambridge Analytica scandal shows: That surveillance and data privacy is every citizens’ concern. An important look at how 50 years of American privacy law is inadequate for the today's surveillance technology, from acclaimed Ars Technica senior business editor Cyrus Farivar. In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy. | https://www.amazon.com/gp/product/1612196462 | Amazon | GR | https://www.goodreads.com/book/show/36675994-habeas-data | LINK1 | https://www.cato.org/multimedia/cato-daily-podcast/habeas-data-privacy-vs-rise-surveillance-tech | AUD | https://www.audible.com/pd/Habeas-Data-Audiobook/B07CTQS7GW?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/gp/product/1612196462 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Steven Jay Cohen | 699 | BEST | |||||||||||||||||||||
Hacking Democracy | 2006 | Hacking Democracy | Russell Michaels, Simon Ardizzone (Directors) | Movie | Documentary | x | This Emmy-nominated documentary took about three years to film, featuring eye-opening coverage of citizen-led investigations on electronic election anomalies in the United States. Exposing the electronic voting system’s vulnerability, a nonprofit election watchdog group tests the ways of tampering and altering results on electronic voting machines—making you question how technology can affect our democracy. | https://www.amazon.com/Hacking-Democracy-Bev-Harris/dp/B01LX1WH9E | Amazon | LINK1 | https://youtu.be/vx1vxPFXIiw | https://www.amazon.com/Hacking-Democracy-Bev-Harris/dp/B01LX1WH9E | Nolisoli | https://nolisoli.ph/81744/7-films-on-data-privacy-ymagcamit-20200610/ | BEST | ||||||||||||||||||||||||||
Harboring Data | 2009 | Harboring Data: Information Security, Law, and the Corporation | Andrea Matwyshyn (editor) | Book | x | https://www.amazon.com/Harboring-Data-Information-Security-Corporation/dp/080476008X | Amazon | LINK1 | https://www.sup.org/books/title/?id=16759 | https://www.amazon.com/Harboring-Data-Information-Security-Corporation/dp/080476008X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
Hate Crimes in Cyberspace | 2014 | Hate Crimes in Cyberspace | Danielle Citron | Book | Computers & Technology > History & Culture | https://www.amazon.com/Crimes-Cyberspace-Danielle-Keats-Citron/dp/0674659902 | Amazon | LINK1 | https://www.hup.harvard.edu/catalog.php?isbn=9780674659902 | https://www.amazon.com/Crimes-Cyberspace-Danielle-Keats-Citron/dp/0674659902 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.8 | 37 | https://www.amazon.com/Danielle-Keats-Citron/e/B00O0H1IMI/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||
Health Data Privacy under the GDPR | 2020 | Health Data Privacy under the GDPR: Big Data Challenges and Regulatory Responses (Routledge Research in the Law of Emerging Technologies) | Maria Tzanou (Editor) | Book | GDPR | The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. / This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children’s health and academic research? | https://www.amazon.com/dp/0367077140?tag=uuid10-20 | Amazon | LINK1 | https://books.google.com/books/about/Health_Data_Privacy_under_the_GDPR.html?id=Yfr_DwAAQBAJ | https://www.amazon.com/dp/0367077140?tag=uuid10-20 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||
Hello World | 2018 | Hello World: Being Human in the Age of Algorithms | Hannah Fry | Book/Audio | AI | When it comes to artificial intelligence, we either hear of a paradise on earth or of our imminent extinction. It’s time we stand face-to-digital-face with the true powers and limitations of the algorithms that already automate important decisions in healthcare, transportation, crime, and commerce. Hello World is indispensable preparation for the moral quandaries of a world run by code, and with the unfailingly entertaining Hannah Fry as our guide, we’ll be discussing these issues long after the last page is turned. | https://www.amazon.com/Hello-World-Being-Human-Algorithms/dp/039363499X | Amazon | GR | https://www.goodreads.com/book/show/43726517-hello-world | LINK1 | https://books.google.com/books/about/Hello_World.html?id=nBsvswEACAAJ | AUD | https://www.audible.com/pd/Hello-World-Audiobook/B07JMDXZMT | https://www.amazon.com/Hello-World-Being-Human-Algorithms/dp/039363499X | Dominga Leone CIPP/E CIPM | https://www.linkedin.com/in/dlcipm/ | BEST | |||||||||||||||||||||||
HIPAA Privacy & Security Resources | 2020 | HIPAA Privacy & Security Resources | AMA | Web Resource | HIPPA | x | LINK1 | https://www.ama-assn.org/practice-management/hipaa/hipaa-privacy-security-resources | https://www.ama-assn.org/practice-management/hipaa/hipaa-privacy-security-resources | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | BEST | |||||||||||||||||||||||||||||
History of Private Life | 1997 | History of Private Life: Vols. 1-5 | Philippe Aries, editor | Book | https://www.amazon.com/History-Private-Life-set/dp/B00BA20KOI | Amazon | GR | https://www.goodreads.com/book/show/276214.A_History_of_Private_Life | https://www.amazon.com/History-Private-Life-set/dp/B00BA20KOI | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Homeland | 2014 | Homeland | Cory Doctorow | Book | Fiction | https://www.amazon.com/Homeland-Cory-Doctorow/dp/0765333708 | Amazon | GR | https://www.goodreads.com/book/show/12917338-homeland | LINK1 | LINK2 | https://us.macmillan.com/books/9780765333704 | https://en.wikipedia.org/wiki/Homeland_(Doctorow_novel) | https://www.amazon.com/Homeland-Cory-Doctorow/dp/0765333708 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||
Hype Machine | 2020 | The Hype Machine: How Social Media Disrupts Our Elections, Our Economy, and Our Health--and How We Must Adapt | Sinan Aral | Book/Audio | AI, Social Media | A landmark insider’s tour of how social media affects our decision-making and shapes our world in ways both useful and dangerous, with critical insights into the social media trends of the 2020 election and beyond | https://www.amazon.com/Hype-Machine-Disrupts-Elections-Health/dp/0525574514 | Amazon | GR | https://www.goodreads.com/book/show/50608104-the-hype-machine | LINK1 | https://www.sinanaral.io/books | AUD | https://www.audible.com/pd/The-Hype-Machine-Audiobook/0008277095 | https://www.amazon.com/Hype-Machine-Disrupts-Elections-Health/dp/0525574514 | Dominga Leone CIPP/E CIPM | https://www.linkedin.com/in/dlcipm/ | BEST | |||||||||||||||||||||||
I Hope I Don’t Intrude | 2015 | I Hope I Don’t Intrude: Privacy and its Dilemmas in Nineteenth-Century Britain | David Vincent | Book | History | https://www.amazon.com/Hope-Dont-Intrude-Dilemmas-Nineteenth-Century/dp/0198725035 | Amazon | https://www.amazon.com/Hope-Dont-Intrude-Dilemmas-Nineteenth-Century/dp/0198725035 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||||
IAPP Daily Dashboard | 2021 | IAPP Daily Dashboard | IAPP | Web Resource | News | Your daily source for the most important privacy and data protection news from around the world. | LINK1 | https://iapp.org/news/daily-dashboard/ | https://iapp.org/news/daily-dashboard/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
IAPP Privacy Job Board | 2020 | IAPP Privacy Job Board | IAPP | Web Resource | Jobs | LINK1 | https://iapp.org/connect/career-central/#!#career | https://iapp.org/connect/career-central/#!#career | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||||
IAPP Privacy List | 2020 | IAPP Privacy List (email listserv) | IAPP | Web Resource | Connect | The IAPP Privacy List is an email list that connects you to thousands of members with the click of a button. Send your questions or comments via your personal email or your Topicbox portal and receive feedback straight to your inbox. - Ranking system based on subjective judgement of: data privacy focus, value, longevity - Comments and reviews. Selecting Top Three Podcasts each week | LINK1 | https://iapp.topicbox.com/ | https://iapp.topicbox.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | IAPP | IAPP | BEST | |||||||||||||||||||||||||||
IAPP Privacy Tech | 2021 | IAPP Privacy Tech | IAPP | Web Resource | News | Original reporting and thought pieces on the technology of privacy and data protection. | LINK1 | https://iapp.org/news/privacy-tech/ | https://iapp.org/news/privacy-tech/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
IBM Cost of a Data Breach | 2020 | IBM Cost of a Data Breach Report [Yearly] | IBM | Research/Report | Data Breach | x | explores financial impacts and security measures that can help your organization mitigate costs | LINK1 | LINK2 | LINK3 | https://www.ibm.com/security/data-breach | https://drive.google.com/file/d/1DoereIfNtBooy-aQy_o2mo9xOqA_RJxm/view?usp=sharing | https://drive.google.com/file/d/1EZibZdCxFtotHBlunkumrc-yFC8NB1Oj/view?usp=sharing | https://www.ibm.com/security/data-breach | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||
IBM X-Force Threat Index | 2020 | IBM X-Force Threat Intelligence Index [Yearly] | IBM | Research/Report | Data Breach | x | Actionable threat intelligence can help your organization allocate resources, understand relevant threats, and bolster your security strategy. The annual IBM X-Force® Threat Intelligence Index sheds light on the biggest cyber risks that organizations face today, with data collected over the past year. Gain fresh insights on the trends shaping the threat landscape | LINK1 | LINK2 | LINK3 | https://www.ibm.com/security/data-breach/threat-intelligence | https://drive.google.com/file/d/1DpCy3lmpgB2SxGN65QOh5idXR9n2jpW4/view?usp=sharing | https://drive.google.com/file/d/1EAalDCpMrZuBPP8wCnjB-dc0ZyJ3F565/view?usp=sharing | https://www.ibm.com/security/data-breach/threat-intelligence | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||
ICO Blog | 2020 | Blog of the UK's Information Commisioner (DPA) | ICO | Web Resource | Blog | The Information Commissioner's Office (ICO) upholds information rights that are in the public interest and promotes openness by public bodies but strives for individuals" data privacy. The ICO Blog focuses on those information rights issues, and especially data protection. | LINK1 | LINK2 | https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/ | https://twitter.com/iconews | https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||
Identity Reboot | 2020 | Identity Reboot: Reimagining Data Privacy for the 21st Century | Arwen Smit | Book | Digital Identity | Human behaviour is being devalued to an optimisation problem, and we are providing the data that is optimised for. Controversies such as the Cambridge Analytica scandal and the explosion of dis-information surrounding the US 2016 presidential election and Brexit put data privacy in the global spotlight. Illuminating the true stakes behind the news stories, Smit urgently calls for a reimagination of data privacy for the 21st century. Seamlessly taking the reader on a journey spanning philosophy to politics, East to West, and blockchain to artificial intelligence, the author contributes new creative thinking, answering the many questions raised with equal realism and hope. For politicians, technologists and all who think we could do better, the tools to reboot identity can be found in this bold, wide-ranging book. | https://www.amazon.com/Identity-Reboot-Reimagining-Privacy-Century-ebook/dp/B084H7VQ49 | Amazon | LINK1 | https://www.arwensmit.com/ | https://www.amazon.com/Identity-Reboot-Reimagining-Privacy-Century-ebook/dp/B084H7VQ49 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||
Identity Trade | 2019 | Identity Trade: Selling Privacy and Reputation Online | Nora A. Draper, Th | Book | https://www.amazon.com/gp/product/1479895652 | Amazon | https://www.amazon.com/gp/product/1479895652 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
If Then | 2020 | If Then: How the Simulmatics Corporation Invented the Future | Jill Lepore | Book/Audio | A revelatory account of the Cold War origins of the data-mad, algorithmic twenty-first century, from the author of the acclaimed international bestseller These Truths. / The Simulmatics Corporation, launched during the Cold War, mined data, targeted voters, manipulated consumers, destabilized politics, and disordered knowledge―decades before Facebook, Google, and Cambridge Analytica. Jill Lepore, best-selling author of These Truths, came across the company’s papers in MIT’s archives and set out to tell this forgotten history, the long-lost backstory to the methods, and the arrogance, of Silicon Valley. / Founded in 1959 by some of the nation’s leading social scientists―“the best and the brightest, fatally brilliant, Icaruses with wings of feathers and wax, flying to the sun”―Simulmatics proposed to predict and manipulate the future by way of the computer simulation of human behavior. In summers, with their wives and children in tow, the company’s scientists met on the beach in Long Island under a geodesic, honeycombed dome, where they built a “People Machine” that aimed to model everything from buying a dishwasher to counterinsurgency to casting a vote. Deploying their “People Machine” from New York, Washington, Cambridge, and even Saigon, Simulmatics’ clients included the John F. Kennedy presidential campaign, the New York Times, the Department of Defense, and dozens of major manufacturers: Simulmatics had a hand in everything from political races to the Vietnam War to the Johnson administration’s ill-fated attempt to predict race riots. The company’s collapse was almost as rapid as its ascent, a collapse that involved failed marriages, a suspicious death, and bankruptcy. Exposed for false claims, and even accused of war crimes, it closed its doors in 1970 and all but vanished. Until Lepore came across the records of its remains. / The scientists of Simulmatics believed they had invented “the A-bomb of the social sciences.” They did not predict that it would take decades to detonate, like a long-buried grenade. But, in the early years of the twenty-first century, that bomb did detonate, creating a world in which corporations collect data and model behavior and target messages about the most ordinary of decisions, leaving people all over the world, long before the global pandemic, crushed by feelings of helplessness. This history has a past; If Then is its cautionary tale. | https://www.amazon.com/gp/product/1631496107 | Amazon | AUD | https://www.audible.com/pd/If-Then-Audiobook/1705005470?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/gp/product/1631496107 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Jill Lepore | 639 | 1631496107, 978-1631496103 | Hardcover : 432 pages | Liveright; Illustrated edition (September 15, 2020) | Liveright | 15-Sep-2020 | Illustrated edition | BEST | ||||||||||||||||||||
Imitation Game | 2014 | The Imitation Game | Morten Tyldum | Movie | Biography, Drama, Thriller | While this movie was criticized in some circles for underplaying cryptographer Alan Turing's homosexuality, the 2014 movie gets it right on Turing's work with British intelligence to crack the Enigma codes sent out daily by the Germans during World War II. The core of the movie revolves around the primitive tools (by today's standards) Turing and his team used to build Christopher, the machine that cracked the Nazi codes. The movie also covers Turing's troubled personal life and suicide in 1954 after being hounded by British authorities for several years. Turing's contributions to cryptography and the war effort are undeniable and should be a part of any security pro's general knowledge. | https://www.amazon.com/Imitation-Game-Benedict-Cumberbatch/dp/B00R7FRTWI | Amazon | LINK1 | LINK2 | https://www.imdb.com/title/tt2084970/ | https://en.wikipedia.org/wiki/The_Imitation_Game | https://www.amazon.com/Imitation-Game-Benedict-Cumberbatch/dp/B00R7FRTWI | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334202 | BEST | |||||||||||||||||||||||||
Impacts of AdTech on Privacy Rights and the Rule of Law | 2021 | The Impacts of AdTech on Privacy Rights and the Rule of Law | Róisín Áine Costello | Research/Report | AdTech | This article argues that the AdTech market has undermined the fundamental right to privacy in the European Union and that current legislative and fundamental rights protections in the EU have been unsuccessful in restraining these privacy harms. The article further argues that these privacy consequences have imported additional reductions in individual autonomy and have the capacity to harm the Rule of Law | LINK1 | LINK2 | https://techreg.org/index.php/techreg/article/view/37/11 | https://drive.google.com/file/d/1E8Ni_EeHUkAWDUaZdf-R6pfNCTffgILL/view?usp=sharing | https://techreg.org/index.php/techreg/article/view/37/11 | Privacy Stan | https://twitter.com/Privacy_Stan | Technology and Regulation | Technology and Regulation | BEST | |||||||||||||||||||||||||
In Pursuit of Privacy | 1997 | In Pursuit of Privacy: Law, Ethics, and the Rise of Technology | Judith Wagner DeCew | Book | https://www.amazon.com/Pursuit-Privacy-Ethics-Rise-Technology/dp/0801484111 | Amazon | LINK1 | https://www.cornellpress.cornell.edu/book/9780801484117/in-pursuit-of-privacy/#bookTabs=1 | https://www.amazon.com/Pursuit-Privacy-Ethics-Rise-Technology/dp/0801484111 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Inception | 2010 | Inception | Christopher Nolan | Movie | Action, Adventure, Sci-Fi | This 2010 film stars Leonardo DiCaprio as Dom Cobb, a thief who steals information by hacking into a person's subconscious. While not strictly a computer hacker movie, Inception offers some interesting insights into our experiences with the real world and dream world, how the two mesh, and the role of technology as we head into a world dominated by artificial intelligence, machine learning, and virtual reality. | https://www.amazon.com/Inception-Leonardo-DiCaprio/dp/B0047WJ11G | Amazon | LINK1 | LINK2 | https://www.imdb.com/title/tt1375666/ | https://en.wikipedia.org/wiki/Inception | https://www.amazon.com/Inception-Leonardo-DiCaprio/dp/B0047WJ11G | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334203 | BEST | |||||||||||||||||||||||||
Information Fiduciaries and the First Amendment | 2016 | Information Fiduciaries and the First Amendment | Jack Balkin | Law Journal | Data Fiduciaries | Collection, analysis, and use of personal data increasingly affect everything we do in the information age, from our personal privacy to our opportunities for jobs, housing, travel, and health care. As algorithms for making decisions based on this data become more powerful, so too will the people and organizations who collect and use the data. Reformers will press for government regulation in the name of protecting personal privacy and preventing abuse and discrimination. In response, businesses that collect, analyze, use, distribute, and sell personal data will likely raise First Amendment defenses. It will only be natural for them to try to prevent what they regard as meddlesome and invasive government regulation by invoking the First Amendment - one of the most central of our constitutional liberties | LINK1 | LINK2 | https://digitalcommons.law.yale.edu/fss_papers/5154/?utm_source=digitalcommons.law.yale.edu%2Ffss_papers%2F5154&utm_medium=PDF&utm_campaign=PDFCoverPages | https://drive.google.com/file/d/1DGgvGiambUsw9byyYMBQdcabRbAzMTn_/view?usp=sharing | https://digitalcommons.law.yale.edu/fss_papers/5154/?utm_source=digitalcommons.law.yale.edu%2Ffss_papers%2F5154&utm_medium=PDF&utm_campaign=PDFCoverPages | Privacy Stan | https://twitter.com/Privacy_Stan | UC Davis Law | UC Davis Law | BEST | |||||||||||||||||||||||||
Information Privacy Engineering and Privacy by Design | 2019 | Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices | William Stallings | $63 | Book | Textbook | https://www.amazon.com/Information-Privacy-Engineering-Design-Understanding-ebook/dp/B082FMW1XX/ref=sr_1_1 | Amazon | https://www.amazon.com/Information-Privacy-Engineering-Design-Understanding-ebook/dp/B082FMW1XX/ref=sr_1_1 | CIPP/T IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPT_Authoritative_Resource_List_4.1.0.pdf | 135302153 | 528 | BEST | |||||||||||||||||||||||||||
Information Security and Privacy | 2019 | Information Security and Privacy: A Guide to Federal and State Law and Compliance (2020-2021 ed) | Andrew B Serwin | $586 | Book | Textbook | x | https://www.amazon.com/Information-Security-Privacy-Federal-Compliance/dp/0314801111 | Amazon | LINK1 | LINK2 | https://store.legal.thomsonreuters.com/law-products/Practice-Materials/Information-Security-and-Privacy-A-Guide-to-Federal-and-State-Law-and-Compliance-2020-2021-ed/p/106666472 | https://www.linkedin.com/in/andrews2/ | https://www.amazon.com/Information-Security-Privacy-Federal-Compliance/dp/0314801111 | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | BEST | ||||||||||||||||||||||||
Information Wars | 2019 | Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do about It | Richard Stengel | Book/Audio | Disinformation | Disinformation is as old as humanity. When Satan told Eve nothing would happen if she bit the apple, that was disinformation. But the rise of social media has made disinformation even more pervasive and pernicious in our current era. In a disturbing turn of events, governments are increasingly using disinformation to create their own false narratives, and democracies are proving not to be very good at fighting it. / During the final three years of the Obama administration, Richard Stengel, the former editor of Time and an Under Secretary of State, was on the front lines of this new global information war. At the time, he was the single person in government tasked with unpacking, disproving, and combating both ISIS's messaging and Russian disinformation. Then, in 2016, as the presidential election unfolded, Stengel watched as Donald Trump used disinformation himself, weaponizing the grievances of Americans who felt left out by modernism. In fact, Stengel quickly came to see how all three players had used the same playbook: ISIS sought to make Islam great again; Putin tried to make Russia great again; and we all know about Trump. / In a narrative that is by turns dramatic and eye-opening, Information Wars walks readers through of this often frustrating battle. Stengel moves through Russia and Ukraine, Saudi Arabia and Iraq, and introduces characters from Putin to Hillary Clinton, John Kerry and Mohamed bin Salman to show how disinformation is impacting our global society. He illustrates how ISIS terrorized the world using social media, and how the Russians launched a tsunami of disinformation around the annexation of Crimea - a scheme that became the model for their interference with the 2016 presidential election. An urgent book for our times, Information Wars stresses that we must find a way to combat this ever growing threat to democracy. | https://www.amazon.com/Information-Wars-Global-Against-Disinformation-ebook/dp/B07R6TSX9Z | Amazon | GR | https://www.goodreads.com/book/show/45359012-information-wars?from_search=true&from_srp=true&qid=u88mBxH1L6&rank=1 | AUD | https://www.audible.com/pd/Information-Wars-Audiobook/1684576601?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/Information-Wars-Global-Against-Disinformation-ebook/dp/B07R6TSX9Z | Privacy Stan | https://twitter.com/Privacy_Stan | Christopher Grove | 677 | 0802147984 (ISBN13: 9780802147981) | 3.82 · Rating details · 282 ratings · 65 reviews | Hardcover, 368 pages | Published October 8th 2019 by Atlantic Monthly Press | Atlantic Monthly Press | 8-Oct-2019 | BEST | |||||||||||||||||
Insecurity | 2017 | InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe | Jane Frankland | Book | x | https://www.amazon.com/gp/product/178133269X | Amazon | https://www.amazon.com/gp/product/178133269X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||||
Intellectual Privacy | 2015 | Intellectual Privacy, Rethinking Civil Liberties in the Digital Age | Neil Richards | Book | Law > Intellectual Property | https://www.amazon.com/gp/product/0199946140 | Amazon | https://www.amazon.com/gp/product/0199946140 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.3 | BEST | |||||||||||||||||||||||||||||
Intelligent Marketer | 2019 | The Intelligent Marketer’s Guide to Data Privacy: The Impact of Big Data on Customer Trust | Robert W. Palmatier, Kelly D. Martin | Book | x | Firms are collecting and analyzing customer data at an ever increasing rate in response to evidence that data analytics (precision targeting, improved selling) generates a positive return. Yet efforts often ignore customers’ privacy concerns and feelings of vulnerability with long-term effects on customers’ trust, relationships, and ultimately financial performance. Big data, privacy, and cybersecurity often is relegated to IT and legal teams with minimal regard for customer relationships / This book fills the void by taking a customer-centric approach to privacy. / It offers both defensive and offensive marketing-based privacy strategies that strongly position firms in today’s data-intensive landscape. The book also helps managers anticipate future consumer and legislative trends. Drawing from the authors’ own work and extant research, this book offers a compelling guide for building and implementing big data- and privacy-informed business strategies / Specifically, the book: ** Describes the consumer psychology of privacy ** Deconstructs relevant legal and regulatory issues ** Offers defensive privacy strategies ** Describes offensive privacy strategies ** Provides an executive summary with the Six Tenets for Effective Privacy Marketing | https://www.amazon.com/Intelligent-Marketers-Guide-Data-Privacy/dp/3030037231 | Amazon | https://www.amazon.com/Intelligent-Marketers-Guide-Data-Privacy/dp/3030037231 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Internet in Everything | 2020 | The Internet in Everything: Freedom and Security in a World with No Off Switch | Laura DeNardis | Book | x | A compelling argument that the Internet of things threatens human rights and security and that suggests policy prescriptions to protect our future / The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of Things—connecting everything from cars to cardiac monitors to home appliances—there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. / The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in a loss of communication but also potentially a loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach across borders to disrupt real-world systems. Laura DeNardis argues that this diffusion of the Internet into the physical world radically escalates governance concerns around privacy, discrimination, human safety, democracy, and national security, and she offers new cyber-policy solutions. In her discussion, she makes visible the sinews of power already embedded in our technology and explores how hidden technical governance arrangements will become the constitution of our future | https://www.amazon.com/Internet-Everything-Freedom-Security-Switch/dp/0300233078 | Amazon | https://www.amazon.com/Internet-Everything-Freedom-Security-Switch/dp/0300233078 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Intimate Lies and the Law | 2019 | Intimate Lies and the Law | Jill Elaine Hasday | Book | Law > Family Law | https://www.amazon.com/gp/product/0190905948 | Amazon | https://www.amazon.com/gp/product/0190905948 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | 2 | https://www.amazon.com/Jill-Elaine-Hasday/e/B084NZCLNT/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Intruders | 2004 | The Intruders: Unreasonable Searches and Seizures from King John to John Ashcroft | Samuel Dash | Book | https://www.amazon.com/Intruders-Unreasonable-Searches-Seizures-Ashcroft/dp/0813534097 | Amazon | https://www.amazon.com/Intruders-Unreasonable-Searches-Seizures-Ashcroft/dp/0813534097 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Invisible Women | 2019 | Invisible Women: Data Bias in a World Designed for Men | Caroline Criado Perez | Book/Audio | Data is fundamental to the modern world. From economic development, to healthcare, to education and public policy, we rely on numbers to allocate resources and make crucial decisions. But because so much data fails to take into account gender, because it treats men as the default and women as atypical, bias and discrimination are baked into our systems. And women pay tremendous costs for this bias, in time, money, and often with their lives. / Celebrated feminist advocate Caroline Criado Perez investigates the shocking root cause of gender inequality and research in Invisible Women, diving into women’s lives at home, the workplace, the public square, the doctor’s office, and more. Built on hundreds of studies in the US, the UK, and around the world, and written with energy, wit, and sparkling intelligence, this is a groundbreaking, unforgettable exposé that will change the way you look at the world. | https://www.amazon.com/Invisible-Women-Data-World-Designed/dp/1419729071 | Amazon | GR | https://www.goodreads.com/book/show/41104077-invisible-women | AUD | https://books.apple.com/us/audiobook/invisible-women-data-bias-in-a-world-designed-for-men/id1466157322 | https://www.amazon.com/Invisible-Women-Data-World-Designed/dp/1419729071 | Dominga Leone CIPP/E CIPM | https://www.linkedin.com/in/dlcipm/ | BEST | ||||||||||||||||||||||||||
IoT Architect's Guide to Attainable Security and Privacy | 2019 | The IoT Architect's Guide to Attainable Security and Privacy | David M. Wheeler et al. | $47 | Book | Computers & Technology > Networking & Cloud Computing | x | This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. We wrote this book not only to be a valuable security and IoT architectural resource for you but also to be an enjoyable read. With that in mind, we've added personal experiences, scenarios, and examples designed to draw you in and keep you engaged. | https://www.amazon.com/Architects-Guide-Attainable-Security-Privacy/dp/081536816X/ref=sr_1_1 | Amazon | https://www.amazon.com/Architects-Guide-Attainable-Security-Privacy/dp/081536816X/ref=sr_1_1 | CIPP/T IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPT_Authoritative_Resource_List_4.1.0.pdf | Auerbach Publications | Auerbach Publications | 11-Jul-1905 | 5 | https://www.amazon.com/David-M-Wheeler/e/B07YBP664M/ref=dp_byline_cont_book_2 | Cover | BEST | |||||||||||||||||||||
Islands in the Net | 1988 | Islands in the Net | Bruce Sterling | Book | Fiction | CyberPunk | https://www.amazon.com/gp/product/B00PDDKVXK | Amazon | https://www.amazon.com/gp/product/B00PDDKVXK | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | BEST | |||||||||||||||||||||||||||||
Islands of Privacy | 2010 | Islands of Privacy | Christena Nippert-Eng | Book | https://www.amazon.com/Islands-Privacy-Christena-Nippert-Eng/dp/0226586537 | Amazon | LINK1 | https://books.google.com/books/about/Islands_of_Privacy.html?id=3LHqwhiNkpMC | https://www.amazon.com/Islands-Privacy-Christena-Nippert-Eng/dp/0226586537 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
IT Governance UK | 2020 | IT Governance UK Blog | IT Governance | Web Resource | Blog | IT Governance is a leading global provider of IT governance, risk management and compliance solutions, with a special focus on cyber resilience, data protection, PCI DSS, ISO 27001 and cyber security. | LINK1 | https://www.itgovernance.co.uk/blog/category/data-protection | https://www.itgovernance.co.uk/blog/category/data-protection | Feedspot | https://blog.feedspot.com/gdpr_blogs/ | BEST | |||||||||||||||||||||||||||||
It’s Complicated | 2014 | It’s Complicated: The Social Lives of Networked Teens | Danah Boyd | Book | https://www.amazon.com/Its-Complicated-Social-Lives-Networked/dp/0300166311 | Amazon | GR | https://www.goodreads.com/book/show/18342787-it-s-complicated | LINK1 | LINK2 | https://www.danah.org/books/ItsComplicated.pdf | https://drive.google.com/file/d/1F3WHsvws-_K5LcaqGu9co5bUMfeavDN9/view?usp=sharing | https://www.amazon.com/Its-Complicated-Social-Lives-Networked/dp/0300166311 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
Johnny Mneumonic | 1995 | Johnny Mneumonic | Robert Longo | Movie | Action, Drama, Sci-Fi | Consider this our tribute to the great cyberpunk literary hero William Gibson, who also wrote the screenplay for Johnny Mnemonic. The movie draws its inspiration from Gibson's eponymous short story. A young Keanu Reeves plays Johnny, a mercenary data courier in the year 2021. Johnny is carrying the cure for nerve attenuation syndrome (NAS), an ailment infecting half the planet caused by an over dependence on technology – and everyone wants to kill him. The movie takes the viewer into Gibson's world of Loteks, the edge of the Sprawl, and the dystopian future we all seem to be headed toward. Gibson gets a lot of it right, but, of course, today Johnny would be carrying terabytes or petabytes in his head. In the 1995 movie, Johnny's overloaded by carrying 320 gigabytes. | https://www.amazon.com/Johnny-Mnemonic-Keanu-Reeves/dp/B000I8ES4S | Amazon | LINK1 | LINK2 | https://en.wikipedia.org/wiki/Johnny_Mnemonic_(film) | https://www.imdb.com/title/tt0113481/ | https://www.amazon.com/Johnny-Mnemonic-Keanu-Reeves/dp/B000I8ES4S | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334204 | BEST | |||||||||||||||||||||||||
Justia Privacy Law Blawgs | 2020 | Justia Privacy Law Blawgs | Justia | Web Resource | Blog | Collection of the most popular Privacy Law blogs. | LINK1 | https://blawgsearch.justia.com/blogs/categories/privacy-law | https://blawgsearch.justia.com/blogs/categories/privacy-law | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | |||||||||||||||||||||||||||||
Killswitch | 2014 | Killswitch | Ali Akbarzadeh (Director) | Movie | Documentary | x | x | “The Internet is under attack. Free speech, innovation and democracy are all up for grabs.” That is the tagline of this documentary film. Drawing a call-to-action for viewers to fight for their internet freedom, the film follows the story of young hacktivists Aaron Swartz and Edward Snowden. / Swartz is Reddit’s co-founder who was also indicted with criminal charges for breaking into digital library JSTOR’s subscription database with the aim of making academic journals free for all. Meanwhile, former Central Intelligence Agency (CIA) employee Edward Snowden is a name controversial for leaking highly classified information from the National Security Agency (NSA) in 2013. | https://www.amazon.com/gp/video/detail/B07CXML8KN/ref=atv_dp_b00_det_c_UTPsmN_1_4 | Amazon | LINK1 | LINK2 | https://www.imdb.com/title/tt4067162/ | https://en.wikipedia.org/wiki/Killswitch_(film) | https://www.amazon.com/gp/video/detail/B07CXML8KN/ref=atv_dp_b00_det_c_UTPsmN_1_4 | Nolisoli | https://nolisoli.ph/81744/7-films-on-data-privacy-ymagcamit-20200610/ | BEST | |||||||||||||||||||||||
Kim Cameron's Identity Blog | 2021 | Kim Cameron's Identity Blog | Kim Cameron | Web Resource | Blog | A blog based on the goal to build a multi-centered system of digital identity that is at the user’s control. | LINK1 | https://www.identityblog.com/ | https://www.identityblog.com/ | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | |||||||||||||||||||||||||||||
Kingdom of Lies | 2019 | Kingdom of Lies: Unnerving Adventures in the World of Cybercrime | Kate Fazzini | Book | https://www.amazon.com/gp/product/B07J4ZSS93 | Amazon | https://www.amazon.com/gp/product/B07J4ZSS93 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Kingpin | 2012 | Kingpin | Kevin Poulson | Book | https://www.amazon.com/Kingpin-Hacker-Billion-Dollar-Cybercrime-Underground/dp/0307588696/ | Amazon | https://www.amazon.com/Kingpin-Hacker-Billion-Dollar-Cybercrime-Underground/dp/0307588696/ | Make Use Of | https://www.makeuseof.com/tag/books-online-privacy-security-need-read/ | BEST | |||||||||||||||||||||||||||||||
Known Citizen | 2018 | The Known Citizen: A History of Privacy in Modern America | Sarah E. Igo | Book | Politics & Social Sciences > Politics & Government | History | Sarah Igo explain how the explosion of new technologies in the late nineteenth and early twentieth centuries—and continuing to the present—has driven the continuing evolution of what is considered “private” life | https://www.amazon.com/gp/product/0674737504 | Amazon | LINK1 | https://www.hup.harvard.edu/catalog.php?isbn=9780674737501 | https://www.amazon.com/gp/product/0674737504 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.4 | 22 | BEST | ||||||||||||||||||||||||
Law of Artificial Intelligence and Smart Machines | 2018 | Law of Artificial Intelligence and Smart Machines: Understanding A.I. and the Legal Impact | Theodore Franklin Claypoole | Book | https://www.amazon.com/gp/product/1641054131 | Amazon | https://www.amazon.com/gp/product/1641054131 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Lawnmower Man | 1992 | The Lawnmower Man | Brett Leonard | Movie | Horror, Sci-Fi | This movie serves as a warning of what could happen when ambitious scientists and the military industrial complex run amok. Some of the movie's portrayals of the military industrial complex are laughable; in fact, for most of the movie, it feels like a 1950s sci-fi thriller. The plot revolves around Dr. Lawrence Angelo, played by a young Pierce Brosnan, who befriends Jobe Smith, a local handyman with cognitive disabilities played by a young Jeff Fahey who fixes machines and cuts lawns. Through the use of the virtual reality technology he worked on for the military at nearby Virtual Space Industries, Dr. Angelo transforms Jobe into a highly intelligent superman who surpasses Dr. Angelo's brainpower and winds up able to levitate physical objects and set lawnmowers to cut autonomously. Things go horribly wrong, though, and Jobe becomes a monster, insisting his destiny is to become a new form of energy. He slides into the virtual world and, at the end, takes over a mainframe and enters the international telephone network. The movie ends with every telephone across the world ringing simultaneously. | https://www.amazon.com/Lawnmower-Man-Directors-Cut/dp/B071GZYRDW | Amazon | LINK1 | LINK2 | https://www.imdb.com/title/tt0104692/ | https://en.wikipedia.org/wiki/The_Lawnmower_Man_(film) | https://www.amazon.com/Lawnmower-Man-Directors-Cut/dp/B071GZYRDW | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334205 | BEST | |||||||||||||||||||||||||
Laws of Image | 2015 | Laws of Image: Privacy and Publicity in America | Samantha Barbas | Book | Textbooks > Humanities | https://www.amazon.com/gp/product/0804791449 | Amazon | https://www.amazon.com/gp/product/0804791449 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 2 | https://www.amazon.com/Samantha-Barbas/e/B01GSCPUQM/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||||
Legislating Privacy | 1995 | Legislating Privacy: Technology, Social Values, and Public Policy | Priscilla M. Regan | Book | While technological threats to personal privacy have proliferated rapidly, legislation designed to protect privacy has been slow and incremental. In this study of legislative attempts to reconcile privacy and technology, Priscilla Regan examines congressional policy making in three key areas: computerized databases, wiretapping, and polygraph testing. In each case, she argues, legislation has represented an unbalanced compromise benefiting those with a vested interest in new technology over those advocating privacy protection. Legislating Privacy explores the dynamics of congressional policy formulation and traces the limited response of legislators to the concept of privacy as a fundamental individual right. According to Regan, we will need an expanded understanding of the social value of privacy if we are to achieve greater protection from emerging technologies such as Caller ID and genetic testing. Specifically, she argues that a recognition of the social importance of privacy will shift both the terms of the policy debate and the patterns of interest-group action in future congressional activity on privacy issues. | https://www.amazon.com/Legislating-Privacy-Technology-Social-Values/dp/0807857491 | Amazon | LINK1 | https://books.google.com/books/about/Legislating_Privacy.html?id=zFDBqMbAOIgC | https://www.amazon.com/Legislating-Privacy-Technology-Social-Values/dp/0807857491 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
Lessons from the Identity Trail | 2009 | Lessons from the Identity Trail | Ian Kerr, Carole Lucock, and Valerie Steeves (editors) | Book | https://www.amazon.com/Lessons-Identity-Trail-Anonymity-Networked/dp/0195372476 | Amazon | LINK1 | https://books.google.com/books/about/Lessons_from_the_Identity_Trail.html?id=JtB0DwAAQBAJ | https://www.amazon.com/Lessons-Identity-Trail-Anonymity-Networked/dp/0195372476 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Liars and Outliers | 2012 | Liars and Outliers: Enabling the Trust that Society Needs to Thrive | Bruce Schneier | Book | https://www.amazon.com/Liars-Outliers-Enabling-Society-Thrive/dp/1118143302 | Amazon | GR | https://www.goodreads.com/book/show/12046245-liars-and-outliers | https://www.amazon.com/Liars-Outliers-Enabling-Society-Thrive/dp/1118143302 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Life After Privacy | 2020 | Life After Privacy | Firmin Debrabander | $22 | Book | Law > Philosophy | Privacy is gravely endangered in the digital age, and we, the digital citizens, are its principal threat, willingly surrendering it to avail ourselves of new technology, and granting the government and corporations immense power over us. In this highly original work, Firmin DeBrabander begins with this premise and asks how we can ensure and protect our freedom in the absence of privacy. Can―and should―we rally anew to support this institution? Is privacy so important to political liberty after all? DeBrabander makes the case that privacy is a poor foundation for democracy, that it is a relatively new value that has been rarely enjoyed throughout history―but constantly persecuted―and politically and philosophically suspect. The vitality of the public realm, he argues, is far more significant to the health of our democracy, but is equally endangered―and often overlooked―in the digital age. | https://www.amazon.com/gp/product/1108811914 | Amazon | https://www.amazon.com/gp/product/1108811914 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1108811914, 978-1108811910 | Paperback : 184 pages | Cambridge University Press (August 9, 2020) | Cambridge University Press | 9-Aug-2020 | 4.8 | 6 | https://www.amazon.com/Firmin-DeBrabander/e/B001JS9WSI/ref=dp_byline_cont_book_1 | Cover | English | 184 | BEST | |||||||||||||||||
Limits of Privacy | 1999 | The Limits of Privacy | Amitai Etzioni | Book | https://www.amazon.com/Limits-Privacy-Amitai-Etzioni/dp/046504090X | Amazon | https://www.amazon.com/Limits-Privacy-Amitai-Etzioni/dp/046504090X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Linklaters Data Protected | 2021 | Linklaters Data Protected: International Privacy Law | Linklaters | Web Resource | Laws | International Law | LINK1 | https://www.linklaters.com/en-us/insights/data-protected/data-protected---argentina | https://www.linklaters.com/en-us/insights/data-protected/data-protected---argentina | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Liquid Surveillance | 2012 | Liquid Surveillance: A Conversation | Zygmunt Bauman and David Lyon | Book | x | https://www.amazon.com/Liquid-Surveillance-Conversations-Zygmunt-Bauman/dp/0745662838 | Amazon | LINK1 | LINK2 | LINK3 | https://upenn.instructure.com/courses/1243137/files/47829090/download?verifier=EAfXQ0BcJ3WyajVLFTXMgQ73YMtQV2mKcpBO9BwY&wrap=1 | https://drive.google.com/file/d/1F4r1xDQ0msJzSktfl5D_W-3htPUqpmLp/view?usp=sharing | https://www.wiley.com/en-us/Liquid+Surveillance%3A+A+Conversation-p-9780745662824 | https://www.amazon.com/Liquid-Surveillance-Conversations-Zygmunt-Bauman/dp/0745662838 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||
Listening In | 2017 | Listening In: Cybersecurity in an Insecure Age | Susan Landau | Book | Politics & Social Sciences > Politics & Government | x | https://www.amazon.com/gp/product/0300227442 | Amazon | https://www.amazon.com/gp/product/0300227442 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.4 | 19 | https://www.amazon.com/Susan-Landau/e/B004FR4NJI/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||
Little Brother | 2008 | Little Brother | Cory Doctorow | Book | Fiction | https://www.amazon.com/Little-Brother-Cory-Doctorow/dp/0765323117 | Amazon | GR | https://www.goodreads.com/book/show/954674.Little_Brother | https://www.amazon.com/Little-Brother-Cory-Doctorow/dp/0765323117 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||
Lives of Others | 2006 | The Lives of Others | Florian Henckel von Donnersmarck | Movie | Fiction | x | The Lives of Others is a German film that won the Academy Award for best foreign language film in 2006. It is a remarkable film, and my favorite film of the ones listed here. The film depicts a Stasi surveillance officer (played by Ulrich Mühe) who is assigned to monitor a famous playwright in East Germany in the year 1984. The playwright’s home is bugged, and the Stasi officer listens in on the playwright and his girlfriend’s intimate conversations. But as he listens, he starts to question his role in the Stasi and starts to feel for the people he is monitoring. The movie is riveting and moving, and it is truly a masterpiece. | https://www.amazon.com/Lives-Others-Martina-Gedeck/dp/B000V4NX04 | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0405094/?ref_=nv_sr_1 | https://en.wikipedia.org/wiki/The_Lives_of_Others | https://www.amazon.com/gp/product/B000P46QTA | https://www.amazon.com/Lives-Others-Martina-Gedeck/dp/B000V4NX04 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | BEST | ||||||||||||||||||||||
lol . . . OMG! | 2011 | lol...OMG!: What Every Student Needs to Know About Online Reputation Management, Digital Citizenship and Cyberbullying | Matt Ivester | Book | https://www.amazon.com/lol-OMG-Reputation-Citizenship-Cyberbullying/dp/1466242078 | Amazon | https://www.amazon.com/lol-OMG-Reputation-Citizenship-Cyberbullying/dp/1466242078 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Lost Honor of Katharina Blum | 1975 | The Lost Honor of Katharina Blum : Or How Violence Develops and Where It Can Lead | Leila Vennewitz | Book | Fiction: Literature & Fiction > World Literature | https://www.amazon.com/gp/product/0140187286 | Amazon | https://www.amazon.com/gp/product/0140187286 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 4 | https://www.amazon.com/Heinrich-B%C3%B6ll/e/B000AQ4HQM/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||||
Managing Privacy | 1994 | Managing Privacy: Information Technology and Corporate America | H. Jeff Smith | Book | https://www.amazon.com/Managing-Privacy-Information-Technology-Corporate/dp/0807844543 | Amazon | LINK1 | https://books.google.com/books/about/Managing_Privacy.html?id=BwQBT2Mr1YoC | https://www.amazon.com/Managing-Privacy-Information-Technology-Corporate/dp/0807844543 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Manipulated | 2020 | Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth | Theresa Payton | Book/Audio | Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late. | https://www.amazon.com/Manipulated-Inside-Cyberwar-Elections-Distort/dp/1538133504/ref=tmm_hrd_swatch_0 | Amazon | GR | https://www.goodreads.com/book/show/51315974-manipulated | LINK1 | LINK2 | https://rowman.com/ISBN/9781538133514/Manipulated-Inside-the-Cyberwar-to-Hijack-Elections-and-Distort-the-Truth | https://books.google.com/books/about/Manipulated.html?id=2D7QDwAAQBAJ | https://www.amazon.com/Manipulated-Inside-Cyberwar-Elections-Distort/dp/1538133504/ref=tmm_hrd_swatch_0 | Privacy Stan | https://twitter.com/Privacy_Stan | 208 | 1538133504 (ISBN-13 : 978-1538133507) | Rowman & Littlefield Publishers (April 22, 2020) | Rowman & Littlefield Publishers | 22-Apr-2020 | https://www.amazon.com/Theresa-Payton/e/B007ECYE4K/ref=dp_byline_cont_pop_book_1 | Cover | BEST | |||||||||||||||||
Messing with the Enemy | 2019 | Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News | Clint Watts | Book/Audio | Disinformation | x | Clint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences. / Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts. / Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world | https://www.amazon.com/Messing-Enemy-Surviving-Terrorists-Russians/dp/0062795996 | Amazon | GR | https://www.goodreads.com/book/show/35068856-messing-with-the-enemy?from_search=true&from_srp=true&qid=buEQVgsLUl&rank=2 | AUD | https://www.audible.com/pd/Messing-with-the-Enemy-Audiobook/B07CHRT8W4?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/Messing-Enemy-Surviving-Terrorists-Russians/dp/0062795996 | Privacy Stan | https://twitter.com/Privacy_Stan | Joe Knezevich | 574 | 0062796011 (ISBN13: 9780062796011) | 4.02 · Rating details · 598 ratings · 119 reviews | ebook, 320 pages | Published May 29th 2018 by Harper | Harper | 29-May-2018 | BEST | ||||||||||||||||
Michael Geist's Blog | 2021 | Michael Geist's Blog | Michael Geist | Web Resource | Blog | A blog with numerous articles and government reports on the Internet and law. Geist is a former member of Canada's National Task Force on Spam. | LINK1 | https://www.michaelgeist.ca/ | https://www.michaelgeist.ca/ | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | |||||||||||||||||||||||||||||
Microtargeting As Information Warfare | 2021 | Microtargeting As Information Warfare | Jessica Dawson | Research/Report | AdTech, Disinformation | x | Foreign influence operations are an acknowledged threat to national security. Less understood is the data that enables that influence. This paper argues that governments must recognize microtargeting – data informed individualized targeted advertising – and the current advertising economy as enabling and profiting from foreign and domestic information warfare being waged on its citizens. The Department of Defense must place greater emphasis on defending servicemembers’ digital privacy as a national security risk. Without the ability to defend this vulnerable attack space, our adversaries will continue to target this for exploitatio | LINK1 | LINK2 | LINK3 | https://osf.io/preprints/socarxiv/5wzuq/ | https://drive.google.com/file/d/1F8hl9l0fSVC66iPqc4hgTuUXLpJT36XR/view?usp=sharing | https://thecyberwire.com/podcasts/caveat/67/transcript | https://osf.io/preprints/socarxiv/5wzuq/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||
Mindf*ck | 2019 | Mindf*ck: Cambridge Analytica and the Plot to Break America | Christopher Wylie | Book/Audio | For the first time, the Cambridge Analytica whistleblower tells the inside story of the data mining and psychological manipulation behind the election of Donald Trump and the Brexit referendum, connecting Facebook, WikiLeaks, Russian intelligence, and international hackers. “Mindf*ck demonstrates how digital influence operations, when they converged with the nasty business of politics, managed to hollow out democracies.”—The Washington Post Mindf*ck goes deep inside Cambridge Analytica’s “American operations,” which were driven by Steve Bannon’s vision to remake America and fueled by mysterious billionaire Robert Mercer’s money, as it weaponized and wielded the massive store of data it had harvested on individuals—in excess of 87 million—to disunite the United States and set Americans against each other. Bannon had long sensed that deep within America’s soul lurked an explosive tension. Cambridge Analytica had the data to prove it, and in 2016 Bannon had a presidential campaign to use as his proving ground. Christopher Wylie might have seemed an unlikely figure to be at the center of such an operation. Canadian and liberal in his politics, he was only twenty-four when he got a job with a London firm that worked with the U.K. Ministry of Defense and was charged putatively with helping to build a team of data scientists to create new tools to identify and combat radical extremism online. In short order, those same military tools were turned to political purposes, and Cambridge Analytica was born. Wylie’s decision to become a whistleblower prompted the largest data-crime investigation in history. His story is both exposé and dire warning about a sudden problem born of very new and powerful capabilities. It has not only laid bare the profound vulnerabilities—and profound carelessness—in the enormous companies that drive the attention economy, it has also exposed the profound vulnerabilities of democracy itself. What happened in 2016 was just a trial run. Ruthless actors are coming for your data, and they want to control what you think. | https://smile.amazon.com/dp/1984854631/ref=cm_sw_r_em_apa_fabc_7T1SXXY4JZX1EY80870Q | Amazon | GR | https://www.goodreads.com/book/show/52269471-mindf-ck | AUD | https://www.audible.com/pd/Mindf-ck-Audiobook/0593209613 | https://smile.amazon.com/dp/1984854631/ref=cm_sw_r_em_apa_fabc_7T1SXXY4JZX1EY80870Q | Privacy Stan | https://twitter.com/Privacy_Stan | 288 | 1984854631 (ISBN-13 : 978-1984854636) | Random House (October 8, 2019) | Random House | 8-Oct-2019 | https://smile.amazon.com/Christopher-Wylie/e/B07ZPTSNXT/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||
Minority Report | 2002 | Minority Report | Steven Spielberg | Movie | Action, Adventure, Drama, Science Fiction, Suspense | x | Based on a story by Philip K. Dick, Minority Report, directed by Stephen Spielberg and starring Tom Cruise, chronicles the life of an officer in year 2054 who works in a special law enforcement unit that uses psychics — called “precogs” — to predict future crimes. People are arrested before the crime occurs. The movie is clever and fast-paced, but my favorite parts of the movie involve some of the less central parts or smaller diversions. The movie depicts a future surveillance society that is not cold and drab like Orwell’s world of Big Brother. This world is filled with flashing screens and and endless barrage of stimulation. The surveillance isn’t just by the government but also by businesses. Iris scanners are everywhere, and when the protagonist walks by a TV monitor, he is addressed by his name and a targeted ad is delivered to him. The movie depicts the dangers of biometric identification. If our biometric data fell into the wrong hands, would we need to resort to rather extreme means of replacing our biometric identifiers? | https://www.amazon.com/Minority-Report-Tom-Cruise/dp/B00A2FSSHK | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0181689/?ref_=nv_sr_2 | https://en.wikipedia.org/wiki/Minority_Report_(film) | https://www.amazon.com/gp/product/B0035WTJFW | https://www.amazon.com/Minority-Report-Tom-Cruise/dp/B00A2FSSHK | Solove Films | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | BEST | ||||||||||||||||||||||
MoFo Privacy Library | 2021 | MoFo Privacy Library: International Privacy Law | Morrison Foster | Web Resource | Laws | International Law | LINK1 | https://www.mofo.com/privacy-library/ | https://www.mofo.com/privacy-library/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
More Essential than Ever | 2012 | More Essential than Ever: The Fourth Amendment in the Twenty First Century | Stephen J. Schulhofer | Book | https://www.amazon.com/More-Essential-than-Ever-Inalienable/dp/0195392124 | Amazon | https://www.amazon.com/More-Essential-than-Ever-Inalienable/dp/0195392124 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Morrison Forrester 2020 Privacy Litigation Review | 2020 | Morrison Forrester 2020 Privacy Litigation Review | Morrison Forrester | Web Resource | Research/Report | LINK1 | https://www.mofo.com/special-content/cybersecurity-resources/privacy-litigation-2020-year-in-review.html | https://www.mofo.com/special-content/cybersecurity-resources/privacy-litigation-2020-year-in-review.html | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | ||||||||||||||||||||||||||||||
Morrison Forrester Privacy Library | 2020 | Morrison Forrester Privacy Library | Morrison Forrester | Web Resource | Legislation Library | LINK1 | https://www.mofo.com/privacy-library/ | https://www.mofo.com/privacy-library/ | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | ||||||||||||||||||||||||||||||
Mr Robot | 2015 | Mr Robot | Sam Esmail | TV Series | Crime, Drama, Thriller | Elliot, a brilliant but highly unstable young cyber-security engineer and vigilante hacker, becomes a key figure in a complex game of global dominance when he and his shadowy allies try to take down the corrupt corporation he works for. | https://www.amazon.com/Mr-Robot-Season-1/dp/B00YBX664Q | Amazon | LINK1 | LINK2 | https://en.wikipedia.org/wiki/Mr._Robot | https://www.imdb.com/title/tt4158110/ | https://www.amazon.com/Mr-Robot-Season-1/dp/B00YBX664Q | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||
Myth of the Privacy Paradox | 2020 | The Myth of the Privacy Paradox | Daniel J. Solove | Law Journal | Privacy Paradox | The behavior in the privacy paradox studies doesn’t lead to a conclusion for less regulation. On the other hand, minimizing behavioral distortion will not cure people’s failure to protect their own privacy....Professor Solove argues that giving individuals more tasks for managing their privacy will not provide effective privacy protection. Instead, regulation should employ a different strategy – focus on regulating the architecture that structures the way information is used, maintained, and transferred. | LINK1 | LINK2 | LINK3 | https://teachprivacy.com/the-myth-of-the-privacy-paradox-final-published-version/ | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3536265 | https://drive.google.com/file/d/1fehGNGWxbDaVIwE5_rYbT5WktVY6P0Z4/view?usp=sharing | https://teachprivacy.com/the-myth-of-the-privacy-paradox-final-published-version/ | Privacy Stan | https://twitter.com/Privacy_Stan | GW Law | GW Law | BEST | |||||||||||||||||||||||
Naked Crowd | 2004 | The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age | Jeffrey Rosen | Book | x | https://www.amazon.com/Naked-Crowd-Reclaiming-Security-Freedom/dp/0375759859 | Amazon | https://www.amazon.com/Naked-Crowd-Reclaiming-Security-Freedom/dp/0375759859 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||||
Naked Employee | 2003 | The Naked Employee: How Technology Is Compromising Workplace Privacy | Frederick Lane | Book | https://www.amazon.com/Naked-Employee-Technology-Compromising-Workplace/dp/B00AK3GD4O | Amazon | https://www.amazon.com/Naked-Employee-Technology-Compromising-Workplace/dp/B00AK3GD4O | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
National Conference of State Legislatures | 2021 | National Conference of State Legislatures | NCSL | Web Resource | Research/Report | State Law | LINK1 | https://www.ncsl.org/aboutus.aspx | https://www.ncsl.org/aboutus.aspx | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Neuromancer | 1984 | Neuromancer | William Gibson | Book | Fiction | CyberPunk | https://www.amazon.com/Neuromancer-William-Gibson/dp/0441012035 | Amazon | https://www.amazon.com/Neuromancer-William-Gibson/dp/0441012035 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | BEST | |||||||||||||||||||||||||||||
New Directions in Surveillance and Privacy | 2013 | New Directions in Surveillance and Privacy | Benjamin J. Goold and Daniel Neyland | Book | Textbooks > Social Sciences | x | The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. / In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. / Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." / The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit--at the expense of democracy, freedom, and our human future. / With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future--if we let it. | https://www.amazon.com/Directions-Surveillance-Privacy-Benjamin-Goold/dp/1843923637 | Amazon | GR | https://www.goodreads.com/book/show/26195941-the-age-of-surveillance-capitalism?from_search=true&from_srp=true&qid=XLHb4Kc6uT&rank=2 | https://www.amazon.com/Directions-Surveillance-Privacy-Benjamin-Goold/dp/1843923637 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1610395697 (ISBN13: 9781610395694) | 4.08 · Rating details · 4,962 ratings · 857 reviews | Hardcover, 691 pages | Published January 15th 2019 by PublicAffairs (first published May 22nd 2018) | PublicAffairs | 15-Jan-2019 | first published May 22nd 2018 | Cover | English | 240 | BEST | ||||||||||||||||
New Laws of Robotics | 2020 | New Laws of Robotics | Frank Pasquale | Book | Business & Money > Industries | AI is poised to disrupt our work and our lives. We can harness these technologies rather than fall captive to them--but only through wise regulation. / Too many CEOs tell a simple story about the future of work: if a machine can do what you do, your job will be automated. They envision everyone from doctors to soldiers rendered superfluous by ever-more-powerful AI. They offer stark alternatives: make robots or be replaced by them. / Another story is possible. In virtually every walk of life, robotic systems can make labor more valuable, not less. Frank Pasquale tells the story of nurses, teachers, designers, and others who partner with technologists, rather than meekly serving as data sources for their computerized replacements. This cooperation reveals the kind of technological advance that could bring us all better health care, education, and more, while maintaining meaningful work. These partnerships also show how law and regulation can promote prosperity for all, rather than a zero-sum race of humans against machines. / How far should AI be entrusted to assume tasks once performed by humans? What is gained and lost when it does? What is the optimal mix of robotic and human interaction? New Laws of Robotics makes the case that policymakers must not allow corporations or engineers to answer these questions alone. The kind of automation we get--and who it benefits--will depend on myriad small decisions about how to develop AI. Pasquale proposes ways to democratize that decision making, rather than centralize it in unaccountable firms. Sober yet optimistic, New Laws of Robotics offers an inspiring vision of technological progress, in which human capacities and expertise are the irreplaceable center of an inclusive economy. | https://www.amazon.com/gp/product/0674975227 | Amazon | GR | https://www.goodreads.com/book/show/51343034-new-laws-of-robotics | https://www.amazon.com/gp/product/0674975227 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 0674975227 (ISBN13: 9780674975224) | 3.50 · Rating details · 4 ratings · 2 reviews | Hardcover, 352 pages | Published October 27th 2020 by Belknap Press | Belknap Press | 27-Oct-2020 | 4.1 | 6 | https://www.amazon.com/Frank-Pasquale/e/B00QU8XCZ6/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||
NISTIR 8062: Introduction to Privacy Engineering and Risk Management in Federal Systems | 2017 | NISTIR 8062: An Introduction to Privacy Engineering and Risk Management in Federal Systems | Sean Brooks, Michael Garcia, Naomi Lefkovitz, Suzanne Lightman, Ellen Nadeau | Computers & Technology > Security & Encryption | NIST | x | This document provides an introduction to the concepts of privacy engineering and risk management for federal systems. These concepts establish the basis for a common vocabulary to facilitate better understanding and communication of privacy risk within federal systems, and the effective implementation of privacy principles. This publication introduces two key components to support the application of privacy engineering and risk management: privacy engineering objectives and a privacy risk model. | https://www.amazon.com/Introduction-Privacy-Engineering-Management-Federal/dp/1547145374 | Amazon | LINK1 | LINK2 | LINK3 | https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf | https://drive.google.com/file/d/1RhensHP-EdzKRGMgt-J9jSiNedbp3yrT/view?usp=sharing | https://ethics.berkeley.edu/privacy/resources/privacy-engineering-and-risk-management-nist-8062 | https://www.amazon.com/Introduction-Privacy-Engineering-Management-Federal/dp/1547145374 | Privacy Stan | https://twitter.com/Privacy_Stan | National Institute of Standards | National Institute of Standards | BEST | ||||||||||||||||||||
No Place to Hide | 2014 | No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State | Glenn Greenwald | Book | x | https://www.amazon.com/No-Place-Hide-Snowden-Surveillance/dp/1250062586 | Amazon | GR | https://www.goodreads.com/book/show/18213403-no-place-to-hide | https://www.amazon.com/No-Place-Hide-Snowden-Surveillance/dp/1250062586 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
No Place to Hide | 2005 | No Place to Hide | Robert O’Harrow | Book | https://www.amazon.com/Place-Hide-Robert-OHarrow-Jr/dp/0743287053 | Amazon | https://www.amazon.com/Place-Hide-Robert-OHarrow-Jr/dp/0743287053 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Nobody’s Victim | 2019 | Nobody’s Victim: Fighting Psychos, Stalkers, Pervs and Trolls | Carrie Goldberg | $19 | Book | History > Americas | Nobody's Victim is an unflinching look at a hidden world most people don’t know exists—one of stalking, blackmail, and sexual violence, online and off—and the incredible story of how one lawyer, determined to fight back, turned her own hell into a revolution. / “We are all a moment away from having our life overtaken by somebody hell-bent on our destruction.” That grim reality—gleaned from personal experience and twenty years of trauma work—is a fundamental principle of Carrie Goldberg’s cutting-edge victims’ rights law firm. / Riveting and an essential timely conversation-starter, Nobody's Victim invites readers to join Carrie on the front lines of the war against sexual violence and privacy violations as she fights for revenge porn and sextortion laws, uncovers major Title IX violations, and sues the hell out of tech companies, schools, and powerful sexual predators. Her battleground is the courtroom; her crusade is to transform clients from victims into warriors. / In gripping detail, Carrie shares the diabolical ways her clients are attacked and how she, through her unique combination of advocacy, badass relentlessness, risk-taking, and client-empowerment, pursues justice for them all. There are stories about a woman whose ex-boyfriend made fake bomb threats in her name and caused a national panic; a fifteen-year-old girl who was sexually assaulted on school grounds and then suspended when she reported the attack; and a man whose ex-boyfriend used a dating app to send more than 1,200 men to ex's home and work for sex. With breathtaking honesty, Carrie also shares her own shattering story about why she began her work and the uphill battle of building a business. / While her clients are a diverse group—from every gender, sexual orientation, age, class, race, religion, occupation, and background—the offenders are not. They are highly predictable. In this book, Carrie offers a taxonomy of the four types of offenders she encounters most often at her firm: assholes, psychos, pervs, and trolls. “If we recognize the patterns of these perpetrators,” she explains, “we know how to fight back.” / Deeply personal yet achingly universal, Nobody's Victim is a bold and much-needed analysis of victim protection in the era of the Internet. This book is an urgent warning of a coming crisis, a predictor of imminent danger, and a weapon to take back control and protect ourselves—both online and off. | https://www.amazon.com/gp/product/052553377X | Amazon | https://www.amazon.com/gp/product/052553377X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 052553377X ISBN-13 : 978-0525533771 | Hardcover : 304 pages | Plume (August 13, 2019) | Plume | 13-Aug-2019 | 4.5 | 116 | https://www.amazon.com/Carrie-Goldberg/e/B07TZN4MDF/ref=dp_byline_cont_book_1 | BEST | ||||||||||||||||||||
None of Your Damn Business | 2019 | None of Your Damn Business: Privacy in the United States from the Gilded Age to the Digital Age | Lawrence Cappello | Book | Textbooks > Humanities | https://www.amazon.com/gp/product/022655774X | Amazon | https://www.amazon.com/gp/product/022655774X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.9 | Cover | BEST | ||||||||||||||||||||||||||||
Not a Suicide Pact | 2006 | Not a Suicide Pact: The Constitution in a Time of National Emergency (Inalienable Rights) | Richard Posner | Book | https://www.amazon.com/Not-Suicide-Pact-Constitution-Inalienable/dp/0195304276 | Amazon | https://www.amazon.com/Not-Suicide-Pact-Constitution-Inalienable/dp/0195304276 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Nothing to Hide | 2011 | Nothing to Hide: The False Tradeoff Between Privacy and Security | Daniel J. Solove | Book | x | x | “If you’ve got nothing to hide,” many people say, “you shouldn’t worry about government surveillance.” Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. / In addition to attacking the “Nothing-to Hide Argument,” Solove exposes the fallacies of pro-security arguments that have often been used to justify government surveillance and data mining. These arguments – such as the “Luddite Argument,”the “War-Powers Argument,” the “All-or-Nothing Argument,” the “Suspicionless-Searches Argument,” the “Deference Argument,” and the “Pendulum Argument” – have skewed law and policy to favor security at the expense of privacy. / The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. But protecting privacy isn’t fatal to security measures; it merely involves adequate oversight and regulation. / The primary focus of the book is on common pro-security arguments, but Solove also discusses concrete issues of law and technology, such as the Fourth Amendment Third Party Doctrine, the First Amendment, electronic surveillance statutes, the USA-Patriot Act, the NSA surveillance program, and government data mining. | https://www.amazon.com/Nothing-Hide-Tradeoff-between-Security/dp/0300172338 | Amazon | GR | https://www.goodreads.com/book/show/11424904-nothing-to-hide | LINK1 | LINK2 | LINK3 | https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2092&context=faculty_publications | https://www.danielsolove.com/nothing-to-hide/ | https://drive.google.com/file/d/1FF1zGSKoRtFArmP5no-LT3GqFFkdOiLD/view?usp=sharing | https://www.amazon.com/Nothing-Hide-Tradeoff-between-Security/dp/0300172338 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||
NRF Data Protection Report | 2021 | NRF Data Protection Report | Norton Rose Fulbright LLP | Web Resource | Blog | Data protection legal insight at the speed of technology | LINK1 | https://www.dataprotectionreport.com/ | https://www.dataprotectionreport.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Obfuscation | 2015 | Obfuscation: A User's Guide to Privacy and Protest | Finn Brunton | Book | https://www.amazon.com/Obfuscation-Users-Guide-Privacy-Protest/dp/0262529866 | Amazon | https://www.amazon.com/Obfuscation-Users-Guide-Privacy-Protest/dp/0262529866 | NYPL | https://www.nypl.org/blog/2019/10/23/privacy-essential-reading-list | BEST | |||||||||||||||||||||||||||||||
Obscurity and Privacy | 2014 | Obscurity and Privacy | Woodrow Hartzog, Evan Selinger | Research/Report | Anonyminity | ‘Obscurity’ is a distinctive concept in the privacy literature that has recently been gaining attention due to increasing frustration with the theoretical and practical limits of traditional privacy theory. Obscurity identifies some of the fundamental ways information can be obtained or kept out of reach, correctly interpreted or misunderstood. Appeals to obscurity can generate explanatory power, clarifying how advances in the sciences of data collection and analysis, innovation in domains related to information and communication technology, and changes to social norms can alter the privacy landscape and give rise to three core problems: 1) new breaches of etiquette, 2) new privacy interests, and 3) new privacy harms. | LINK1 | LINK2 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2439866&s=03 | https://www.researchgate.net/publication/310311649_Obscurity_and_Privacy | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2439866&s=03 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||
Of Privacy and Power | 2019 | Of Privacy and Power: The Transatlantic Struggle over Freedom and Security | Henry Farrell, Abraham L. Newman | Book/Audio | x | How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future / We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. / This means that states’ jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? / Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship / The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitionsâ€"one favoring security, the other libertyâ€"whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden’s revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate. The first serious study of how the politics of surveillance has been transformed, Of Privacy and Power offers a fresh view of the role of information and power in a world of economic interdependence | https://www.amazon.com/Privacy-Power-Transatlantic-Struggle-Security/dp/0691183643 | Amazon | AUD | https://www.audible.com/pd/Of-Privacy-and-Power-Audiobook/1515919188?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/Privacy-Power-Transatlantic-Struggle-Security/dp/0691183643 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Christopher Grove | 532 | BEST | |||||||||||||||||||||||||
Offensive Internet | 2012 | The Offensive Internet: Speech, Privacy, and Reputation | Saul Levmore & Martha C. Nussbaum, editors | Book | https://www.amazon.com/Offensive-Internet-Speech-Privacy-Reputation/dp/0674064313 | Amazon | GR | https://www.goodreads.com/book/show/9199883-the-offensive-internet | https://www.amazon.com/Offensive-Internet-Speech-Privacy-Reputation/dp/0674064313 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Official Secrets | 2019 | Official Secrets | Gavin Hood | Movie | Biography, Crime, Drama | The true story of a British whistleblower who leaked information to the press about an illegal NSA spy operation designed to push the UN Security Council into sanctioning the 2003 invasion of Iraq. | https://www.amazon.com/Official-Secrets-Keira-Knightly/dp/B07XB6L17M | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt5431890/ | https://www.amazon.com/Official-Secrets-Keira-Knightley/dp/B07X3817JC | https://en.wikipedia.org/wiki/Official_Secrets_(film) | https://www.amazon.com/Official-Secrets-Keira-Knightly/dp/B07XB6L17M | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||
On Rumors | 2009 | On Rumors | Cass Sunstein | Book/Audio | https://www.amazon.com/Rumors-Falsehoods-Spread-Believe-Them/dp/0809094738 | Amazon | GR | https://www.goodreads.com/book/show/6571384-on-rumors | LINK1 | https://press.princeton.edu/books/paperback/9780691162508/on-rumors | AUD | https://www.audible.com/pd/On-Rumours-Audiobook/1528882032 | https://www.amazon.com/Rumors-Falsehoods-Spread-Believe-Them/dp/0809094738 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
On The End of Privacy | 2019 | On the End of Privacy: Dissolving Boundaries in a Screen-Centric World | Richard E. Miller | Book | Reference > Words, Language & Grammar | https://www.amazon.com/gp/product/0822965682 | Amazon | https://www.amazon.com/gp/product/0822965682 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.8 | 7 | Cover | BEST | |||||||||||||||||||||||||||
Online Guide to Practical Privacy Tools | 2021 | EPIC Online Guide to Practical Privacy Tools | Electronic Privacy Information Center | Web Resource | Tools | LINK1 | https://www.epic.org/privacy/tools.html | https://www.epic.org/privacy/tools.html | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||||
Outrageous Invasions | 2010 | Outrageous Invasions: Celebrites’ Private Lives, Media, and the Law | Robin D. Barnes | Book | https://www.amazon.com/Outrageous-Invasions-Celebrities-Private-Lives-ebook/dp/B00A8SKW1G | Amazon | https://www.amazon.com/Outrageous-Invasions-Celebrities-Private-Lives-ebook/dp/B00A8SKW1G | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Overseers of the Poor | 2001 | Overseers of the Poor : Surveillance, Resistance, and the Limits of Privacy | John Gilliom | Book | x | https://www.amazon.com/Overseers-Poor-Surveillance-Resistance-Privacy/dp/0226293610 | Amazon | GR | https://www.goodreads.com/book/show/1003025.Overseers_of_the_Poor | LINK1 | https://books.google.com/books?id=Nu13p50WgogC&printsec=copyright#v=onepage&q&f=false | https://www.amazon.com/Overseers-Poor-Surveillance-Resistance-Privacy/dp/0226293610 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||
Peep Diaries | 2009 | The Peep Diaries: How We’re Learning to Love Watching Ourselves and Our Neighbors | Hal Niedzviecki | Book | https://www.amazon.com/Peep-Diaries-Learning-Ourselves-Neighbors/dp/0872864995 | Amazon | GR | https://www.goodreads.com/en/book/show/5217060 | https://www.amazon.com/Peep-Diaries-Learning-Ourselves-Neighbors/dp/0872864995 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Permanent Record | 2019 | Permanent Record | Edward Snowden | Book | https://www.amazon.com/gp/product/1250756545 | Amazon | https://www.amazon.com/gp/product/1250756545 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.8 | 8451 | https://www.amazon.com/Edward-Snowden/e/B07W7PZFH8/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||||
Philosophical Dimensions of Privacy | 1984 | Philosophical Dimensions of Privacy: An Anthology | Ferdinand Schoeman | Book | https://www.amazon.com/Philosophical-Dimensions-Privacy-Ferdinand-Schoeman/dp/0521275547 | Amazon | GR | https://www.goodreads.com/book/show/2992173-philosophical-dimensions-of-privacy | LINK1 | https://books.google.com/books/about/Philosophical_Dimensions_of_Privacy.html?id=q_FrmXyl3hUC | https://www.amazon.com/Philosophical-Dimensions-Privacy-Ferdinand-Schoeman/dp/0521275547 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Politics of Privacy | 1981 | The Politics of Privacy: Planning for Personal Data Systems as Powerful Technologies | James B. Rule | Book | https://www.amazon.com/Politics-Privacy-Planning-Personal-Technologies/dp/B00EQCDMVM | Amazon | LINK1 | https://books.google.com/books/about/The_Politics_of_Privacy.html?id=SCu0sh65QAUC | https://www.amazon.com/Politics-Privacy-Planning-Personal-Technologies/dp/B00EQCDMVM | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Politics of Privacy in Contemporary Native | 2020 | The Politics of Privacy in Contemporary Native, Latinx and Asian American Metafictions | Colleen Eils | $70 | Book | Fiction: Literature & Fiction > History & Criticism | The Politics of Privacy in Contemporary Native, Latinx, and Asian American Metafictions is the first book-length study to approach contemporary issues of racialized visibility and privacy through narrative form. Using a formal maneuver, narrative privacy, Colleen G. Eils analyzes how writers of contemporary metafictions explicitly withhold stories from readers to illuminate and theorize the politics of privacy in a post–9/11 US context. As a formal device and reading strategy, narrative privacy has two primary critical interests: affirming the historically political nature of visibility, particularly for people of color and indigenous people, and theorizing privacy as a political assertion of power over representation and material vulnerability. | https://www.amazon.com/gp/product/0814214223 | Amazon | https://www.amazon.com/gp/product/0814214223 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 978-0814214220 | Ohio State University Press; 1st edition (September 11, 2020) | Ohio State University Press | 11-Sep-2020 | 1st edition | https://www.amazon.com/Colleen-G-Eils/e/B08HSPLJJH/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||
Poverty of Privacy Rights | 2017 | Poverty of Privacy Rights | Khiara M. Bridges, Th | Book | https://www.amazon.com/gp/product/1503602265 | Amazon | https://www.amazon.com/gp/product/1503602265 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Practical Guide to Data Privacy Laws by Country | 2021 | A Practical Guide to Data Privacy Laws by Country | i-sight.com | Web Resource | Laws | International Law | LINK1 | https://i-sight.com/resources/a-practical-guide-to-data-privacy-laws-by-country/ | https://i-sight.com/resources/a-practical-guide-to-data-privacy-laws-by-country/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Practical Guide to HIPAA Privacy and Security Compliance | 2014 | The Practical Guide to HIPAA Privacy and Security Compliance | Rebecca Herold and Kevin Beaver | Book | x | https://www.amazon.com/Practical-Guide-Privacy-Security-Compliance/dp/1439855587 | Amazon | LINK1 | https://books.google.com/books?id=67k3mhNAGrYC&printsec=copyright#v=onepage&q&f=false | https://www.amazon.com/Practical-Guide-Privacy-Security-Compliance/dp/1439855587 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
Practical Synthetic Data Generation | 2020 | Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data | Khaled El Emam, Lucy Mosquera, Richard Hoptroff | Book | Synthetic Data | Building and testing machine learning models requires access to large and diverse data. But where can you find usable datasets without running into privacy issues? This practical book introduces techniques for generating synthetic data—fake data generated from real data—so you can perform secondary analysis to do research, understand customer behaviors, develop new products, or generate new revenue. Data scientists will learn how synthetic data generation provides a way to make such data broadly available for secondary purposes while addressing many privacy concerns. Analysts will learn the principles and steps for generating synthetic data from real datasets. And business leaders will see how synthetic data can help accelerate time to a product or solution. | https://www.amazon.com/Practical-Synthetic-Data-Generation-Availability/dp/1492072745 | Amazon | LINK1 | https://books.google.com/books/about/Practical_Synthetic_Data_Generation.html?id=C9ejzAEACAAJ | https://www.amazon.com/Practical-Synthetic-Data-Generation-Availability/dp/1492072745 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||
Predict and Surveil | 2020 | Predict and Surveil: Data, Discretion and the Future of Policing | Sarah Brayne | $20 | Book | Computers & Technology > History & Culture | x | The scope of criminal justice surveillance has expanded rapidly in recent decades. At the same time, the use of big data has spread across a range of fields, including finance, politics, healthcare, and marketing. While law enforcement's use of big data is hotly contested, very little is known about how the police actually use it in daily operations and with what consequences. / In Predict and Surveil, Sarah Brayne offers an unprecedented, inside look at how police use big data and new surveillance technologies, leveraging on-the-ground fieldwork with one of the most technologically advanced law enforcement agencies in the world-the Los Angeles Police Department. Drawing on original interviews and ethnographic observations, Brayne examines the causes and consequences of algorithmic control. She reveals how the police use predictive analytics to deploy resources, identify suspects, and conduct investigations; how the adoption of big data analytics transforms police organizational practices; and how the police themselves respond to these new data-intensive practices. Although big data analytics holds potential to reduce bias and increase efficiency, Brayne argues that it also reproduces and deepens existing patterns of social inequality, threatens privacy, and challenges civil liberties. / A groundbreaking examination of the growing role of the private sector in public policing, this book challenges the way we think about the data-heavy supervision law enforcement increasingly imposes upon civilians in the name of objectivity, efficiency, and public safety. | https://www.amazon.com/gp/product/0190684097 | Amazon | https://www.amazon.com/gp/product/0190684097 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 0190684097, 978-0190684099 | Hardcover : 224 pages | Oxford University Press; 1st edition (November 2, 2020) | Oxford University Press | 2-Nov-2020 | 1st edition | 4.4 | https://www.amazon.com/Sarah-Brayne/e/B088C3S7PC/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||
Prediction Machines | 2018 | Prediction Machines: The Simple Economics of Artificial Intelligence | Ajay Agrawal, Joshua Gans, and Avi Goldfarb | Book | https://www.amazon.com/gp/product/1633695670 | Amazon | https://www.amazon.com/gp/product/1633695670 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Pride and Prejudice | 1813 | Pride and Prejudice | Jane Austen | Book | Fiction | https://www.amazon.com/gp/product/1503290565 | Amazon | https://www.amazon.com/gp/product/1503290565 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | BEST | ||||||||||||||||||||||||||||||
Primer on Data Privacy Enforcement Options | 2020 | A Primer on Data Privacy Enforcement Options | Jennifer Huddleston | Research/Report | Privacy Enforcement | Enforcement options for a federal data privacy law often are presented as a binary choice—either give people the right to sue, or maintain the status quo—but in reality a wide range of options exist. There are five general categories of potential enforcement mechanisms that policymakers might consider in various data privacy proposals | LINK1 | LINK2 | https://www.americanactionforum.org/insight/a-primer-on-data-privacy-enforcement-options/ | https://drive.google.com/file/d/1Amiwnr846VfClLtFk7mI-NwGYEhXhNuj/view?usp=sharing | https://www.americanactionforum.org/insight/a-primer-on-data-privacy-enforcement-options/ | Privacy Stan | https://twitter.com/Privacy_Stan | American Action Forum | American Action Forum | BEST | |||||||||||||||||||||||||
Privacy | 2012 | Privacy | Garret Keizer | Book | https://www.amazon.com/Privacy-BIG-IDEAS-small-books/dp/0312554842 | Amazon | GR | https://www.goodreads.com/book/show/13166912-privacy | LINK1 | https://us.macmillan.com/books/9780312554842 | https://www.amazon.com/Privacy-BIG-IDEAS-small-books/dp/0312554842 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Privacy 3.0 | 2018 | Privacy 3.0: Unlocking Our Data-Driven Future | Rahul Matthan | Book/Audio | Our personal space is dear to us all. We live our lives in full public view on social media posting photos of the food we just ate or even expressing intimate feelings for our loved ones but there are still things we would rather not share with the world. Indeed, it is privacy that sets man apart from the animals who must stick together in the wild for their own safety. But mankind was not born private. Our primitive ancestors too lived in large groups, every member of which knew all there was to know about the others. Privacy evolved over time as man developed technologies to wall himself off, even as he remained part of the society at large. But just as some technologies enhanced privacy, others such as the printing press or the portable camera chipped away at it. Every time this happened, man opposed the technology at first but made his peace with it eventually to benefit from the obvious good it could do. We are at a similar crossroads today with data technologies. Aadhaar is one example of the many ways in which we have begun to use data in everything we do. While it has made it far easier to avail of services from the government and private enterprises than ever before, there are those who rightly worry about people s private data being put to ill use and, worse, without consent. But this anxiety is no different from that which we felt during the teething troubles of every previous technology we adopted. What we really need is a new framework that unlocks the full potential of a data-driven future while still safeguarding what we hold most dear our privacy. In this pioneering work, technology lawyer Rahul Matthan traces the changing notions of privacy from the earliest times to its evolution through landmark cases in the UK, US and India. In the process, he re-imagines the way we should be thinking about privacy today if we are to take full advantage of modern data technologies, cautioning against getting so obsessed with their potential harms that we design our laws to prevent us from benefiting from them at all. | https://www.amazon.com/Privacy-3-0-Unlocking-Data-Driven-Future/dp/9352779886 | Amazon | https://www.amazon.com/Privacy-3-0-Unlocking-Data-Driven-Future/dp/9352779886 | Privacy Stan | https://twitter.com/Privacy_Stan | HarperCollins India (July 5, 2018) | https://images-na.ssl-images-amazon.com/images/I/41MwP5iIKHL._SY291_BO1,204,203,200_QL40_FMwebp_.jpg | BEST | ||||||||||||||||||||||||||||
Privacy Act Information | 2020 | Privacy Act Information | FCC | Web Resource | Privacy Act | LINK1 | https://www.fcc.gov/managing-director/privacy-transparency/privacy-act-information | https://www.fcc.gov/managing-director/privacy-transparency/privacy-act-information | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | BEST | ||||||||||||||||||||||||||||||
Privacy Advocates | 2010 | The Privacy Advocates: Resisting the Spread of Surveillance | Colin J. Bennett | Book | x | https://www.amazon.com/Privacy-Advocates-Resisting-Spread-Surveillance/dp/0262514877 | Amazon | LINK1 | https://mitpress.mit.edu/books/privacy-advocates | https://www.amazon.com/Privacy-Advocates-Resisting-Spread-Surveillance/dp/0262514877 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
Privacy and Data Protection in Brazil | 2020 | Privacy and Data Protection in Brazil: A comprehensive and Practical Guide on the LGPD | Aline Fuke Fachinetti | $35 | Book | The Brazilian Data Protection Law (Law No. 13.709 of 2018, Lei Geral de Proteção de Dados Pessoais), also known as “LGPD” was established in August 2018 to remedy the lack of comprehensive privacy and data protection regulation in Brazil, profoundly changing the landscape on such protection in the country. The new law creates data protection concepts and rules that apply to both public and private sector organizations, regardless of where they are located, if they fall within the scope of the law.The LGPD is viewed by many lawyers and privacy specialists as inspired and derived from the European Union (EU) General Data Protection Regulation (GDPR). This book is comprehensive and Practical Guide on the LGPD and includes, as a bonus, the translated version of the LGPD. | https://www.amazon.com/Privacy-Data-Protection-Brazil-comprehensive/dp/B08P8QRK1M | Amazon | LINK1 | https://www.amazon.com/gp/product/B08P8QRK1M | https://www.amazon.com/Privacy-Data-Protection-Brazil-comprehensive/dp/B08P8QRK1M | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 979-8575139218 | 88 | Independently published (September 30, 2020) | Independently published | 30-Sep-2020 | BEST | ||||||||||||||||||||||
Privacy and Data Security | 2020 | Privacy and Data Security: State of California Department of Justice | Office of the Attorney General | Web Resource | CCPA | x | LINK1 | https://oag.ca.gov/privacy | https://oag.ca.gov/privacy | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | BEST | |||||||||||||||||||||||||||||
Privacy and digital ethics after the pandemic | 2021 | Privacy and digital ethics after the pandemic | Carissa Véliz | Research/Report | AI, Ethics, Covid | The increasingly prominent — and inescapable — role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. / The coronavirus pandemic has permanently changed our relationship with technology, accelerating the drive towards digitization. While this change has brought advantages, such as increased opportunities to work from home and innovations in e-commerce, it has also been accompanied with steep drawbacks, which include an increase in inequality and undesirable power dynamics. | LINK1 | LINK2 | https://www.nature.com/articles/s41928-020-00536-y | https://drive.google.com/file/d/1UEKz45Y4WsR9ZYbglP-3-bESaYk6Urq-/view?usp=sharing | https://www.nature.com/articles/s41928-020-00536-y | Privacy Stan | https://twitter.com/Privacy_Stan | Nature | Nature | BEST | |||||||||||||||||||||||||
Privacy and Freedom | 1967 | Privacy and Freedom | Alan Westin | Book | In defining privacy as “the claim of individuals…to determine for themselves when, how and to what extent information about them is communicated,” Alan Westin’s 1967 classic Privacy and Freedom laid the philosophical groundwork for the current debates about technology and personal freedom, and is considered a foundational text in the field of privacy law. By arguing that citizens retained control over how their personal data was used, Westin redefined privacy as an individual freedom, taking Justice Louis Brandeis’ 19th century definition of privacy as a legal right and expanding it for use in modern times. Westin’s ideas transformed the meaning of privacy, leading to a spate of privacy laws in the 1970s, as well as prefiguring the arguments over privacy that have come to dominate the internet era. | https://www.amazon.com/gp/product/1935439979 | Amazon | https://www.amazon.com/gp/product/1935439979 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||||
Privacy and Human Behavior | 2015 | Privacy and Human Behavior in the Age of Information | Alessandro Acquisti, Laura Brandimarte, George Loewenstein | Research/Report | Behavioral Economics | This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people’s uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people’s concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age. | LINK1 | LINK2 | https://science.sciencemag.org/content/347/6221/509.abstract | https://drive.google.com/file/d/1DgbpeAbRrvhXycIc8LklLlvRwa56ypu5/view?usp=sharing | https://science.sciencemag.org/content/347/6221/509.abstract | Privacy Stan | https://twitter.com/Privacy_Stan | Science 30 Jan 2015: Vol. 347, Issue 6221, pp. 509-514 DOI: 10.1126/science.aaa1465 | Science | 30-Jan-2015 | Vol. 347, Issue 6221, pp. 509-514 DOI: 10.1126/science.aaa1465 | BEST | |||||||||||||||||||||||
Privacy and Human Rights | 2006 | Privacy and Human Rights | Electronic Privacy Information Center & Privacy International | Book | https://www.amazon.com/Privacy-Human-Rights-International-Developments-ebook/dp/B01LW3QM31 | Amazon | GR | https://www.goodreads.com/book/show/31344588-privacy-and-human-rights | LINK1 | https://epic.org/phr06/ | https://www.amazon.com/Privacy-Human-Rights-International-Developments-ebook/dp/B01LW3QM31 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Privacy and Security Training Requirements | 2020 | Privacy and Security Training Requirements | Daniel Solove | Web Resource | Training | x | Many laws, regulations, and industry codes require privacy awareness training and/or data security awareness training. This lists of a number of these requirements. | LINK1 | https://teachprivacy.com/privacy-training-and-data-security-training-requirements/ | https://teachprivacy.com/privacy-training-and-data-security-training-requirements/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||
Privacy and Technology | 2014 | Privacy and Technology: Standards and Practices for Engineers and Security and IT Professionals | J.C. Cannon | Book | x | https://www.amazon.com/Privacy-Technology-Standards-Practices-Professionals/dp/0988552566 | Amazon | https://www.amazon.com/Privacy-Technology-Standards-Practices-Professionals/dp/0988552566 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||||
Privacy and the Past | 2016 | Privacy and the Past: Research, Law, Archives, Ethics | Susan C. Lawrence | Book | Textbooks > Medicine & Health Sciences | https://www.amazon.com/gp/product/0813574366 | Amazon | LINK1 | https://books.google.com/books/about/Privacy_in_Technology.html?id=U4XVoAEACAAJ | https://www.amazon.com/gp/product/0813574366 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | ,978-0813574363 | Cover | English | 188 | BEST | ||||||||||||||||||||||||
Privacy and the Press | 1972 | Privacy and the Press; The Law, the Mass Media, and the First Amendment | Don R. Pember | Book | https://www.amazon.com/Privacy-Press-Media-First-Amendment/dp/0295951524 | Amazon | https://www.amazon.com/Privacy-Press-Media-First-Amendment/dp/0295951524 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Privacy as Trust | 2018 | Privacy as Trust: Information Privacy for an Information Age | Ari Ezra Waldman | Book | Politics & Social Sciences > Politics & Government | https://www.amazon.com/gp/product/1316636941 | Amazon | https://www.amazon.com/gp/product/1316636941 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.3 | 10 | Cover | BEST | |||||||||||||||||||||||||||
Privacy at Risk | 2007 | Privacy at Risk: The New Government Surveillance and the Fourth Amendment | Christopher Slobogin | Book | x | https://www.amazon.com/Privacy-Risk-Government-Surveillance-Amendment/dp/0226762831 | Amazon | LINK1 | https://press.uchicago.edu/ucp/books/book/chicago/P/bo5503960.html | https://www.amazon.com/Privacy-Risk-Government-Surveillance-Amendment/dp/0226762831 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
Privacy at the Margins | 2020 | Privacy at the Margins | Scott Skinner-Thompson | $33 | Book | Textbooks > Social Sciences | minorities | x | Limited legal protections for privacy leave minority communities vulnerable to concrete injuries and violence when their information is exposed. In Privacy at the Margins, Scott Skinner-Thompson highlights why privacy is of acute importance for marginalized groups. He explains how privacy can serve as a form of expressive resistance to government and corporate surveillance regimes - furthering equality goals - and demonstrates why efforts undertaken by vulnerable groups (queer folks, women, and racial and religious minorities) to protect their privacy should be entitled to constitutional protection under the First Amendment and related equality provisions. By examining the ways even limited privacy can enrich and enhance our lives at the margins in material ways, this work shows how privacy can be transformed from a liberal affectation to a legal tool of liberation from oppression. | https://www.amazon.com/gp/product/1316632636 | Amazon | LINK1 | https://www.cambridge.org/core/books/privacy-at-the-margins/821035ECA5D61516D87C454DD1FF8167 | https://www.amazon.com/gp/product/1316632636 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1316632636 | Paperback : 234 pages | Cambridge University Press (November 5, 2020) | Cambridge University Press | 5-Nov-2020 | 5 | https://www.amazon.com/Scott-Skinner-Thompson/e/B08DZPVDSL/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||
Privacy by Prosser | 1960 | Privacy, 48 Cal. L. Rev. 383 | William L. Prosser | Law Journal | LINK1 | LINK2 | LINK3 | https://canvas.cornell.edu/courses/21938/files/1919488/download?download_frd=1 | https://lawcat.berkeley.edu/record/1109651?ln=en | https://drive.google.com/file/d/1F2X1XxN50iY9qH-h_G03OozpB33Nga17/view?usp=sharing | https://canvas.cornell.edu/courses/21938/files/1919488/download?download_frd=1 | Privacy Stan | https://twitter.com/Privacy_Stan | Cal Law Review | Cal Law Review | BEST | |||||||||||||||||||||||||
Privacy Enforcement Casebook | 2020 | Privacy Enforcement Casebook: A Guide to Regulators’ Priorities and Expectations | Caitlin Fennessy (Editor) | Book | Textbook | x | Since the IAPP last published a privacy casebook in 2011, new data protection laws have been adopted by countries around the world, resulting in a significant uptick in privacy enforcement actions globally. Although by no means exhaustive, this casebook presents noteworthy privacy cases from around the world. These cases offer organizations insights into regulators’ priorities and expectations, which can inform the development of privacy programs that align with them. / The casebook is organized by geographic region. Prior to presenting cases in a particular region or country, a brief overview of key laws and regulators is provided to assist the reader in understanding the legal landscape in which the cases were brought. While countries have adopted different legal frameworks and approaches to regulating the collection, use, storage and flow of personal information, all are largely based on the same overarching fair information practice principles: (1) collection limitation; (2) data quality; (3) purpose specification; (4) use limitation; (5) security safeguards; (6) openness; (7) individual participation; and, (8) accountability. / Each case presented is tagged with one or two FIPPs to serve as an organizing principle (see index) and highlight the commonalities that cross borders, laws, frameworks and regimes. As widely accepted principles, relevant FIPPs are identified to assist organizations in analyzing privacy risks across jurisdictions and identifying suitable mitigation strategies. / The cases and laws presented here are summarized to capture the important elements for a practicing privacy professional. This casebook does not offer legal advice and is intended to be used for informational purposes only. Given the rapidly evolving legal and technological environment, it is important to confirm the current status of the laws or case cited before relying on these materials. | LINK1 | LINK2 | LINK3 | https://iapp.org/store/books/a191P000003ngS9QAI/ | https://books.google.com/books/about/Privacy_Enforcement_Casebook.html?id=KKI3zQEACAAJ | https://lawcat.berkeley.edu/record/1109651?ln=en | https://iapp.org/store/books/a191P000003ngS9QAI/ | Multi: CIPP/US IAPP Auth Resources & CIPP/E IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | 1948771306, 9781948771306 | The Westin Research Center. IAPP. 2020. | The Westin Research Center. IAPP | 12-Jul-1905 | BEST | ||||||||||||||||||||
Privacy Engineer’s Companion | 2020 | The Privacy Engineer’s Companion: A Workbook of Guidance Tools, Methodologies, and Templates | Michelle Finneran Dennedy et al. | Book | x | Engineer privacy into software, systems, and applications. This book is a resource for developers, engineers, architects, and coders. It provides tools, methodologies, templates, worksheets, and guidance on engineering privacy into software―from ideation to release and beyond―for technologies, products, systems, solutions, and applications. / This book can be used in conjunction with the ApressOpen bestseller, The Privacy Engineer’s Manifesto. This book trains and equips users to engage in their own privacy scoping requirements workshops, write privacy use cases or “stories” for agile development, document UI privacy patterns, conduct assessments, and align with product and information security teams. And, perhaps most importantly, the book brings clarity to a vitally important need―the protection of personal information―that is often shrouded in mystery during the engineering process. Go from policy to code to QA to value, all within these pages | https://www.amazon.com/Privacy-Engineers-Companion-Methodologies-Templates/dp/1484237056 | Amazon | https://www.amazon.com/Privacy-Engineers-Companion-Methodologies-Templates/dp/1484237056 | CIPP/T IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPT_Authoritative_Resource_List_4.1.0.pdf | 9781484237052, 1484237056 | 276 | ApressOpen | ApressOpen | 12-Jul-1905 | BEST | ||||||||||||||||||||||||
Privacy Engineer’s Manifesto | 2014 | The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value (1st Ed) | Michelle Finneran Dennedy, Jonathan Fox, and Thomas R. Finneran | Book | https://www.amazon.com/Privacy-Engineers-Manifesto-Getting-Policy/dp/1430263555 | Amazon | LINK1 | LINK2 | https://link.springer.com/book/10.1007/978-1-4302-6356-2 | https://drive.google.com/file/d/1FFj0s1sLpaKNr2VboUO5jqBvhHOD7Xe6/view?usp=sharing | https://www.amazon.com/Privacy-Engineers-Manifesto-Getting-Policy/dp/1430263555 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Privacy Engineering | 2015 | Privacy Engineering: A Dataflow and Ontological Approach | Ian Oliver | Book | https://www.amazon.com/Privacy-Engineering-Dataflow-Ontological-Approach/dp/1497569710 | Amazon | LINK1 | LINK2 | https://www.abebooks.com/9781497569713/Privacy-Engineering-Dataflow-Ontological-Approach-1497569710/plp | https://books.google.com/books/about/Privacy_Engineering.html?id=4DLDoQEACAAJ | https://www.amazon.com/Privacy-Engineering-Dataflow-Ontological-Approach/dp/1497569710 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Privacy Expert’s Guide to AI and Machine Learning | 2018 | The Privacy Expert’s Guide to AI and Machine Learning | Future of Privacy Forum | Research/Report | AI, ML | LINK1 | LINK2 | https://iapp.org/resources/article/the-privacy-experts-guide-to-ai-and-machine-learning/ | https://drive.google.com/file/d/1Fh7th88pFu8-0yjAWmMn-im6y6VrXA50/view?usp=sharing | https://iapp.org/resources/article/the-privacy-experts-guide-to-ai-and-machine-learning/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||
Privacy Homo Economicus | 2014 | Alan Westin's Privacy Homo Economicus | Chris Hoofnagle, Jennifer Urban | Law Journal | Notice & Choice | This Article contributes to the ongoing debate about notice and choice in two main ways. First, we consider the legacy of Professor Alan F. Westin, whose survey work greatly influenced the development of the notice-and-choice regime, and engage in sustained textual analysis, empirical testing, and critique of that work. Second, we report on original survey research exploring Americans' knowledge, preferences, and attitudes about a wide variety of data practices in online and mobile markets. This work both calls into question long-standing assumptions used by Westin and lends new insight into consumers' privacy knowledge and preferences. | LINK1 | LINK2 | LINK3 | https://www.ftc.gov/system/files/documents/public_comments/2015/09/00003-97143.pdf | https://drive.google.com/file/d/1CvzuLBxsJlOSTGm2RpUhTxm0IZ4is39v/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2434800 | https://www.ftc.gov/system/files/documents/public_comments/2015/09/00003-97143.pdf | Privacy Stan | https://twitter.com/Privacy_Stan | Berkeley Law | Berkeley Law | BEST | |||||||||||||||||||||||
Privacy in Colonial New England | 1972 | Privacy in Colonial New England 1630-1776 | David H. Flaherty | Book | https://www.amazon.com/Privacy-Colonial-New-England-1630-1776/dp/0813903394 | Amazon | GR | https://www.goodreads.com/book/show/1931987.Privacy_in_Colonial_New_England | https://www.amazon.com/Privacy-Colonial-New-England-1630-1776/dp/0813903394 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Privacy in Context | 2009 | Privacy in Context: Technology, Policy, and the Integrity of Social Life | Helen Nissenbaum | Book | https://www.amazon.com/Privacy-Context-Technology-Policy-Integrity/dp/0804752370 | Amazon | GR | https://www.goodreads.com/book/show/7677574-privacy-in-context | LINK1 | LINK2 | https://crypto.stanford.edu/portia/papers/privacy_in_context.pdf | https://drive.google.com/file/d/1FJ_7OAVotiUogV5fLQoYF5PXPWbsj7y-/view?usp=sharing | https://www.amazon.com/Privacy-Context-Technology-Policy-Integrity/dp/0804752370 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
Privacy in Pandemic | 2020 | Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 Crisis | Tiffany C. Li | Law Journal | Covid-19 | The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. / This Article is the first comprehensive account of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both widescale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social salience, and with a critical awareness of digital and political inequities, crafting normative recommendations with these concepts in mind. / Understanding privacy in this time of pandemic is critical for law and policymaking in the near future and for the long-term goals of creating a future society that protects both civil liberties and public health. It is also important to create a contemporary scholarly understanding of privacy in pandemic at this moment in time, as a matter of historical record. By examining privacy in pandemic, in the midst of pandemic, this Article seeks to create a holistic scholarly foundation for future work on privacy, technology, public health, and legal responses to global crises. | LINK1 | LINK2 | LINK3 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3690004 | https://scholarship.law.bu.edu/cgi/viewcontent.cgi?article=1970&context=faculty_scholarship | https://drive.google.com/file/d/1G6-bMg9qCUffs1t53Bz26I_z6ELS9Nmu/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3690004 | FPF Privacy Papers Award | https://www.linkedin.com/pulse/11th-annual-privacy-papers-policymakers-award-jules-polonetsky/ | Loyola University Chicago Law Journal, Volume 52, Issue 3 (Mar. 2021 Forthcoming) | Loyola University Chicago Law Journal | 1-Mar-2021 | Forthcoming Volume 52, Issue 3 | BEST | |||||||||||||||||||||
Privacy in Peril | 2007 | Privacy in Peril: How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (1st Ed) | James B. Rule | Book | https://www.amazon.com/Privacy-Peril-Sacrificing-Fundamental-Convenience/dp/0195394364 | Amazon | LINK1 | LINK2 | LINK3 | https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780195307832.001.0001/acprof-9780195307832 | https://www.researchgate.net/publication/285935463_Privacy_in_Peril_How_We_Are_Sacrificing_a_Fundamental_Right_in_Exchange_for_Security_and_Convenience | https://www.c-span.org/video/?202316-1/privacy-peril | https://www.amazon.com/Privacy-Peril-Sacrificing-Fundamental-Convenience/dp/0195394364 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
Privacy in the Age of Big Data | 2015 | Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family | Theresa Payton, Ted Claypoole | Book | Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to get just-in-time coupons, directions when we’re lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. | https://www.amazon.com/dp/1442242574/ref=cm_sw_r_em_apa_fabc_TmZdGbKXBS123?pldnSite=1 | Amazon | GR | https://www.goodreads.com/book/show/18324241-privacy-in-the-age-of-big-data | LINK1 | https://books.google.com/books/about/Privacy_in_the_Age_of_Big_Data.html?id=Fs-fAgAAQBAJ | https://www.amazon.com/dp/1442242574/ref=cm_sw_r_em_apa_fabc_TmZdGbKXBS123?pldnSite=1 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||
Privacy in the Modern Age | 2015 | Privacy in the Modern Age: The Search for Solutions | Marc Rotenberg, Julia Horwitz, and Jeramie Scott editors | Book | https://www.amazon.com/gp/product/1620971070 | Amazon | https://www.amazon.com/gp/product/1620971070 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Privacy in the New Media Age | 2015 | Privacy in the New Media Age | Jon L. Mills | Book | Textbooks > Communication & Journalism | https://www.amazon.com/gp/product/0813060583 | Amazon | https://www.amazon.com/gp/product/0813060583 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | Cover | 248 | BEST | |||||||||||||||||||||||||||
Privacy International: News | 2020 | Privacy International: News | Privacy International | Web Resource | Blog/News | Privacy International challenges overreaching state and corporate surveillance, so that people everywhere can have greater security and freedom through greater personal privacy. | LINK1 | https://privacyinternational.org/news | https://privacyinternational.org/news | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Privacy Is Power | 2020 | Privacy is Power: Why and How You Should Take Back Control of Your Data | Carissa Véliz | Book/Audio | https://www.amazon.com/Privacy-Power-Should-Take-Control/dp/1787634043 | Amazon | AUD | https://www.audible.com/pd/Privacy-Is-Power-Audiobook/1473588189?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/Privacy-Power-Should-Take-Control/dp/1787634043 | Privacy Stan | https://twitter.com/Privacy_Stan | Emma Gregory | 461 | BEST | |||||||||||||||||||||||||||
Privacy Law Fundamentals | 2019 | Privacy Law Fundamentals | Daniel J. Solove, Paul M. Schwartz | $75 | Book | Textbook | The 2019 edition of the popular Privacy Law Fundamentals incorporates extensive new developments in privacy law. / Privacy Law Fundamentals delivers vital information in a concise and digestible manner. It includes key provisions of privacy statutes; leading cases; tables summarizing the statutes; summaries of key state privacy laws; and overviews of various agency enforcement actions.The fourth edition of the popular Privacy Law Fundamentals text incorporates extensive developments in privacy law and includes an introductory chapter summarizing key new laws, cases and enforcement actions. / Privacy Law Fundamentals is no treatise—its accessible, portable format delivers vital information in a concise and digestible manner. It includes key provisions of privacy statutes; leading cases; tables summarizing the statutes (private rights of action, preemption, liquidated damages, etc.); summaries of key state privacy laws; an overview of FTC enforcement actions; and answers to frequently asked questions | https://www.amazon.com/gp/product/0988552574 | Amazon | GR | https://www.goodreads.com/book/show/52816792-privacy-law-fundamentals | LINK1 | LINK2 | https://iapp.org/resources/article/privacy-law-fundamentals-fifth-edition/ | https://teachprivacy.com/privacy-law-fundamentals-2019/ | https://www.amazon.com/gp/product/0988552574 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 0979590191 (ISBN13: 9780979590191) | 3.52 · Rating details · 23 ratings · 4 reviews | Hardcover, 189 pages | Published by International Association of Privacy Professi (first published January 1st 2013) | IAPP | 11-Jul-1905 | first published January 1st 2013 | 3.6 | 6 | Cover | BEST | ||||||||||||
Privacy Life and Privacy in Nazi Germany | 2020 | Privacy Life and Privacy in Nazi Germany | Edited by Elizabeth Harvey, Johannes Hürter, Maiken Umbach, Andreas Wirsching | $33 | Book | Textbooks > Humanities | Was it possible to have a private life under the Nazi dictatorship? It has often been assumed that private life and the notion of privacy had no place under Nazi rule. Meanwhile, in recent years historians of Nazism have been emphasising the degree to which Germans enthusiastically embraced notions of community. This volume sheds fresh light on these issues by focusing on the different ways in which non-Jewish Germans sought to uphold their privacy. It highlights the degree to which the regime permitted or even fostered such aspirations, and it offers some surprising conclusions about how private roles and private self-expression could be served by, and in turn serve, an alignment with the community. Furthermore, contributions on occupied Poland offer insights into the efforts by 'ethnic Germans' to defend their aspirations to privacy and by Jews to salvage the remnants of private life in the ghetto. | https://www.amazon.com/gp/product/1108719031 | Amazon | https://www.amazon.com/gp/product/1108719031 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1108719031, 978-1108719032 | Paperback : 410 pages | Cambridge University Press (June 18, 2020) | Cambridge University Press | 18-Jun-2020 | Cover | BEST | ||||||||||||||||||||||
Privacy Matters: DLA Piper Blog | 2020 | Privacy Matters: DLA Piper Blog | DLA Piper | Web Resource | Blog | Privacy Matters is written and maintained by DLA Piper's Data Protection and Privacy practice. Posts update readers about legal matters and regulations regarding data protection, plus include analysis of data protection happenings around the world. | LINK1 | https://blogs.dlapiper.com/privacymatters/tag/data-protection/ | https://blogs.dlapiper.com/privacymatters/tag/data-protection/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Privacy on the Ground | 2015 | Privacy on the Ground: Driving Corporate Behavior in the United States and Europe | Kenneth A. Bamberger & Deirdre K. Mulligan | Book | Business & Money > Economics | Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on the ground” in changing corporate (or government) behavior—until now. / This paper is the Introduction from the book, Privacy on the Ground: Driving Corporate Behavior in the US and Europe, an intensive five-nation study that goes inside corporations to examine how the people charged with protecting privacy actually do their work, and what kinds of regulation effectively shape their behavior. / The research yields a surprising result. The countries with more ambiguous regulation—Germany and the United States—had the strongest corporate privacy management practices, despite very different cultural and legal environments. The more rule-bound countries—like France and Spain—trended instead toward compliance processes, not embedded privacy practices. At a crucial time, when Big Data and the Internet of Things are snowballing, Privacy on the Ground helpfully searches out the best practices by corporations, provides guidance to policymakers, and offers important lessons for everyone concerned with privacy, now and in the future. | https://www.amazon.com/exec/obidos/ASIN/%200262029987 | Amazon | GR | https://www.goodreads.com/book/show/26263217-privacy-on-the-ground | LINK1 | LINK2 | https://mitpress.mit.edu/books/privacy-ground | https://books.google.com/books/about/Privacy_on_the_Ground.html?id=2Ku5zQEACAAJ | https://www.amazon.com/exec/obidos/ASIN/%200262029987 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.1 | https://www.amazon.com/Kenneth-A-Bamberger/e/B018126J08/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||
Privacy on the Line | 1999 | Privacy on the Line: The Politics of Wiretapping and Encryption | Whitfield Diffie & Susan Landau | Book | https://www.amazon.com/Privacy-Line-Politics-Wiretapping-Encryption/dp/0262042401 | Amazon | LINK1 | https://mitpress.mit.edu/books/privacy-line-updated-and-expanded-edition | https://www.amazon.com/Privacy-Line-Politics-Wiretapping-Encryption/dp/0262042401 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Privacy Podcast Database | 2021 | Privacy Podcast Database | Jeff Jockisch | Web Resource | Podcasts | Covers 54 Privacy-related Podcasts. It's a spreadsheet so it's sortable on any number of fields. - Links to the content on Apple Podcasts, Google Podcasts, Spotify/Stitcher, and the native website. - Info on the most recent episode and headers for other recent episodes - Podcast summaries, icons, topics tags, more | LINK1 | https://bit.ly/PrivacyPodcastList | https://bit.ly/PrivacyPodcastList | Privacy Stan | https://twitter.com/Privacy_Stan | Jeff Jockisch | Jeff Jockisch | BEST | |||||||||||||||||||||||||||
Privacy Professor | 2020 | Data Security & Privacy Training | Rebecca Herold | Web Resource | Training | x | LINK1 | https://privacyguidance.com/index.html | https://privacyguidance.com/index.html | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | BEST | |||||||||||||||||||||||||||||
Privacy Program Management | 2019 | Privacy Program Management: Tools for Managing Privacy Within Your Organization | Russell R. Densmore | $75 | Book | Textbook: Computers & Technology > History & Culture | Privacy program management is here to stay, and the need for sophisticated leaders who understand the complexities of the global digital marketplace will only increase. / Privacy Program Management: Tools for Managing Privacy Within Your Organization provides the critical tools necessary for anyone responsible for managing privacy program governance and operations within their organization. / Reorganized with expanded topics relevant to privacy program leaders, the second edition takes a global view of privacy managers’ obligations and practices | https://www.amazon.com/Determanns-Field-Guide-Data-Privacy/dp/1789906180 | Amazon | LINK1 | https://iapp.org/store/books/a191P0000035FGjQAM/ | https://www.amazon.com/Determanns-Field-Guide-Data-Privacy/dp/1789906180 | CIPP/M IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPM_Authoritative_Resource_List_4.1.0.pdf | Portsmouth: IAPP, 2019. (Digital and Print Copies available) | Portsmouth: IAPP Publications | 11-Jul-1905 | Print & Digital copies | 4.5 | https://www.amazon.com/Lothar-Determann/e/B001K20I90/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||
Privacy Revisited | 2016 | Privacy Revisited: A Global Perspective on the Right to Be Left Alone | Ronald J. Krotoszynski | Book | Law > Constitutional Law | https://www.amazon.com/gp/product/0199315213 | Amazon | https://www.amazon.com/gp/product/0199315213 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 978-0199315215 | 5 | Cover | English | 312 | BEST | |||||||||||||||||||||||||
Privacy Rights | 2010 | Privacy Rights: Moral and Legal Foundations | Adam D. Moore | Book | https://www.amazon.com/Privacy-Rights-Moral-Legal-Foundations/dp/0271036869 | Amazon | LINK1 | LINK2 | LINK3 | https://www.researchgate.net/publication/286635840_Privacy_rights_Moral_and_legal_foundations | https://books.google.com/books/about/Privacy_Rights.html?id=ed-TtcfYE-MC | https://www.jstor.org/stable/10.5325/j.ctt7v5q9 | https://www.amazon.com/Privacy-Rights-Moral-Legal-Foundations/dp/0271036869 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
Privacy, Due Process and the Computational Turn | 2013 | Privacy, Due Process and the Computational Turn | Mireille Hildebrandt and Katja de Vries, editors | Book | https://www.amazon.com/Privacy-Due-Process-Computational-Turn-ebook/dp/B00D5VJMX2 | Amazon | LINK1 | https://books.google.com/books/about/Privacy_Due_Process_and_the_Computationa.html?id=2c9v5-fzU9EC | https://www.amazon.com/Privacy-Due-Process-Computational-Turn-ebook/dp/B00D5VJMX2 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Privacy, Property, and Free Speech | 2012 | Privacy, Property, and Free Speech: Law and the Constitution | Jeffrey Rosen | Book/Audio | Online Course | x | Although the courts have struggled to balance the interests of individuals, businesses, and law enforcement, the proliferation of intrusive new technologies puts many of our presumed freedoms in legal limbo. For instance, it's not hard to envision a day when websites such as Facebook or Google Maps introduce a feature that allows real-time tracking of anyone you want, based on face-recognition software and ubiquitous live video feeds. / Does this scenario sound like an unconstitutional invasion of privacy? These 24 eye-opening lectures immerse you in the Constitution, the courts, and the post-9/11 Internet era that the designers of our legal system could scarcely have imagined. Professor Rosen explains the most pressing legal issues of the modern day and asks how the framers of the U.S. Constitution and the Bill of Rights would have reacted to aspects of the modern life such as full-body scans, cell phone surveillance, and privacy in cloud servers. / Called "the nation's most widely read and influential legal commentator" by the Los Angeles Times, Professor Rosen is renowned for his ability to bring legal issues alive - to put real faces and human drama behind the technical issues that cloud many legal discussions. Here he asks how you would decide particular cases about liberty and privacy. You'll come away with a more informed opinion about whether modern life gives even the most innocent among us reason to worry | https://www.amazon.com/Privacy-Property-Free-Speech-Constitution/dp/B00DTO5RHK | Amazon | GR | https://www.goodreads.com/book/show/18749348-privacy-property-and-free-speech | LINK1 | https://www.thegreatcourses.com/courses/privacy-property-and-free-speech-law-and-the-constitution.html | AUD | https://www.goodreads.com/book/show/18749348-privacy-property-and-free-speech?from_search=true&from_srp=true&qid=6oeoC5DZ8v&rank=1 | https://www.amazon.com/Privacy-Property-Free-Speech-Constitution/dp/B00DTO5RHK | Privacy Stan | https://twitter.com/Privacy_Stan | Jeffrey Rosen | 720 | 1682763692 (ISBN13: 9781682763698) | 4.19 · Rating details · 143 ratings · 18 reviews | Published December 18th 2012 by The Great Courses (first published January 1st 2012) | The Great Courses | 18-Dec-2012 | first published January 1st 2012 | BEST | ||||||||||||||
Privacy, Security and Accountability | 2015 | Privacy, Security and Accountability: Ethics, Law and Policy | Adam D. Moore (editor) | Book | x | https://www.amazon.com/gp/product/1783484764 | Amazon | https://www.amazon.com/gp/product/1783484764 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||||
Privacy: A Personal Chronicle | 2019 | Privacy: A Personal Chronicle | Simon Davies | Book | Privacy has become one of the most important public policy issues of our time, but how did we get here? What events and campaigns inspired this crucial issue? In Privacy: A Personal Chronicle, author Simon Davies, one of the pioneers of the privacy movement, recounts his personal experience from the 1980's in establishing the global privacy advocacy movement and tells the inside story of some of the campaigns that ended up changing the world. From the pre-Internet analogue era to the time of mass digital surveillance, this is the narrative of one person's journey through the maze of one of the modern world's most important and controversial rights.The book takes you on a journey from the remote deserts of Africa to the board rooms of the world's most influential corporations. It recounts campaigns that held the most powerful entities on earth to account. And, perhaps more important, it describes how an ordinary person – with the guidance of astute campaigning tactics – can help shift the perceptions of entire nations.It also offers a digestible primer for anyone interested in this field and who wants to understand the basis of law and technology. | https://www.amazon.com/Privacy-Personal-Chronicle-Simon-Davies/dp/1732613907 | Amazon | LINK1 | https://books.google.com/books/about/Privacy.html?id=CPgYxQEACAAJ | https://www.amazon.com/Privacy-Personal-Chronicle-Simon-Davies/dp/1732613907 | Privacy Stan | https://twitter.com/Privacy_Stan | EPIC | EPIC | BEST | ||||||||||||||||||||||||||
Privacy: Past, Present and Future | 2020 | Privacy: Past, Present, And Future | Leslie N. Gruis | $30 | Book | x | x | Top analyst Leslie Gruis’s timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them. | https://www.amazon.com/gp/product/1680531867 | Amazon | https://www.amazon.com/gp/product/1680531867 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1680531867, 978-1680531862 | Hardcover : 280 pages | Academica Press (February 20, 2020) | Academica Press | 20-Feb-2020 | BEST | ||||||||||||||||||||||
Privacy: Studies in Social and Cultural History | 1984 | Privacy: Studies in Social and Cultural History | Barrington Moore, Jr. | Book | https://www.amazon.com/Privacy-Studies-Social-Cultural-History/dp/087332269X | Amazon | LINK1 | https://books.google.com/books/about/Privacy.html?id=NN7fAAAAMAAJ | https://www.amazon.com/Privacy-Studies-Social-Cultural-History/dp/087332269X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Privacy: The Frontier of Social Evolution | 2013 | Privacy: The Frontier of Social Evolution | Timothy M Jurgensen, Privacy | Book | https://www.amazon.com/Privacy-Frontier-Evolution-Timothy-Jurgensen/dp/0980182123 | Amazon | https://www.amazon.com/Privacy-Frontier-Evolution-Timothy-Jurgensen/dp/0980182123 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Privacy: The Lost Right | 2008 | Privacy: The Lost Right | Jon Mills | Book | https://www.amazon.com/Privacy-Lost-Right-Jon-Mills/dp/0195367359 | Amazon | LINK1 | LINK2 | https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780195367355.001.0001/acprof-9780195367355 | https://books.google.com/books/about/Privacy.html?id=MFYOAQAAMAAJ | https://www.amazon.com/Privacy-Lost-Right-Jon-Mills/dp/0195367359 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Privacy's Constitutional Moment and the Limits of Data Protection | 2020 | Privacy's Constitutional Moment and the Limits of Data Protection | Woodrow Hartzog, Neil M. Richards | Law Journal | Policy | America’s privacy bill has come due. Since the dawn of the Internet, Congress has repeatedly failed to build a robust identity for American privacy law. But now both California and the European Union have forced Congress’s hand by passing the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR). These data protection frameworks, structured around principles for Fair Information Processing called the “FIPs,” have industry and privacy advocates alike clamoring for a “U.S. GDPR.” States seemed poised to blanket the country with FIP-based laws if Congress fails to act. The United States is thus in the midst of a “constitutional moment” for privacy, in which intense public deliberation and action may bring about constitutive and structural change. And the European data protection model of the GDPR is ascendant. / In this article we highlight the risks of U.S. lawmakers embracing a watered-down version of the European model as American privacy law enters its constitutional moment. European-style data protection rules have undeniable virtues, but they won’t be enough. The FIPs assume data processing is always a worthy goal, but even fairly processed data can lead to oppression and abuse. Data protection is also myopic because it ignores how industry’s appetite for data is wrecking our environment, our democracy, our attention spans, and our emotional health. Even if E.U.-style data protection were sufficient, the United States is too different from Europe to implement and enforce such a framework effectively on its European law terms. Any U.S. GDPR would in practice be what we call a “GDPR-Lite.” / Our argument is simple: In the United States, a data protection model cannot do it all for privacy, though if current trends continue, we will likely entrench it as though it can. Drawing from constitutional theory and the traditions of privacy regulation in the United States, we propose instead a “comprehensive approach” to privacy that is better focused on power asymmetries, corporate structures, and a broader vision of human well-being. Settling for an American GDPR-lite would be a tragic ending to a real opportunity to tackle the critical problems of the information age. In this constitutional moment for privacy, we can and should demand more. This article offers a path forward to do just that. | LINK1 | LINK2 | LINK3 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3441502 | https://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3886&context=bclr | https://drive.google.com/file/d/1Fyf_G047hPaK39mXq6tG1KbFam1YR-fi/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3441502 | Privacy Stan | https://twitter.com/Privacy_Stan | Boston College Law Review | Boston College Law Review | 12-Jul-1905 | BEST | ||||||||||||||||||||||
Privacy’s Blueprint | 2018 | Privacy’s Blueprint: The Battle to Control the Design of New Technologies | Woodrow Hartzog | Book | Computers & Technology > Computer Science | https://www.amazon.com/gp/product/0674976002 | Amazon | https://www.amazon.com/gp/product/0674976002 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.7 | 13 | https://www.amazon.com/Woodrow-Hartzog/e/B079ZW7L8T/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Privacy’s Perfect Storm | 2020 | Privacy’s Perfect Storm: Digital Policy for the Post-Pandemic Times | Stuart N. Brotman | $8 | Book | The COVID-19 pandemic has expanded our online world at work and home to record levels. Our most personal and confidential data is being collected from multiple digital devices and stored, disseminated, and sold to government and commercial organizations, often without our knowledge, consent, or control. We are all now in Privacy’s Perfect Storm, which includes recent efforts by the European Union and the United States to set new legal boundaries. / Stuart N. Brotman offers a thoughtful guide to achieving better digital privacy protection in these turbulent times. He provides a consistently thoughtful, transparent, and inclusive approach to tech regulation, always considering what policies might best serve the public and our digital society. / Stuart Brotman brings a constructive new perspective to the digital privacy dialogue. Drawing on his extensive background as policy adviser, legal analyst, and business consultant, Stuart brings his unique brand of visionary thinking to bear, synthesizing a fresh multi-stakeholder approach to digital privacy policy. His insights on how the COVID-19 pandemic will continue to affect digital privacy in the post-pandemic world are especially prescient. Stuart moves far beyond conventional wisdom in this fascinating and thought-provoking collection of essays. A “must read” for anyone who cares about digital privacy in all its facets—and wants to be ready for what lies ahead. -- Richard T. Kaplar | https://www.amazon.com/gp/product/1939282489 | Amazon | https://www.amazon.com/gp/product/1939282489 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1939282489, 978-1939282484 | Paperback : 171 pages | Miniver Press (August 4, 2020) | Miniver Press | 4-Aug-2020 | BEST | ||||||||||||||||||||||||
Private Eye | 2014 | The Private Eye | Brian K. Vaughan, Marcos Martin, Muntsa Vicente | Graphic Novel | Fiction | https://www.amazon.com/gp/product/1632155729 | Amazon | https://www.amazon.com/gp/product/1632155729 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | BEST | ||||||||||||||||||||||||||||||
PrivSec Report | 2020 | PrivSec Report | PrivSec Report | Web Resource | Blog | x | PrivSec.Report provides the latest news, information and advice on cybercrime and data protection from thought leaders and sector experts, creating and curating engaged GRC market places. PrivSec.Report is produced by Data Protection World Forum, producers of leading content for the privacy and security sector. | LINK1 | https://gdpr.report/ | https://gdpr.report/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||
Propaganda | 2004 | Propaganda | Edward Bernays, Mark Crispin Miller - introduction | Book/Audio | Disinformation | A seminal and controversial figure in the history of political thought and public relations, Edward Bernays (1891–1995), pioneered the scientific technique of shaping and manipulating public opinion, which he famously dubbed “engineering of consent.” During World War I, he was an integral part of the U.S. Committee on Public Information (CPI), a powerful propaganda apparatus that was mobilized to package, advertise and sell the war to the American people as one that would “Make the World Safe for Democracy.” The CPI would become the blueprint in which marketing strategies for future wars would be based upon. Bernays applied the techniques he had learned in the CPI and, incorporating some of the ideas of Walter Lipmann, became an outspoken proponent of propaganda as a tool for democratic and corporate manipulation of the population. His 1928 bombshell Propaganda lays out his eerily prescient vision for using propaganda to regiment the collective mind in a variety of areas, including government, politics, art, science and education. To read this book today is to frightfully comprehend what our contemporary institutions of government and business have become in regards to organized manipulation of the masses. This is the first reprint of Propaganda in over 30 years and features an introduction by Mark Crispin Miller, author of The Bush Dyslexicon: Observations on a National Disorder. | https://www.amazon.com/Propaganda-Edward-Bernays/dp/0970312598 | Amazon | GR | https://www.goodreads.com/book/show/493212.Propaganda | AUD | https://www.audible.com/pd/Propaganda-Audiobook/B0741R8RD8?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/Propaganda-Edward-Bernays/dp/0970312598 | Privacy Stan | https://twitter.com/Privacy_Stan | Grover Gardner | 282 | 0970312598 (ISBN13: 9780970312594) | 3.83 · Rating details · 4,304 ratings · 497 reviews | Paperback, 168 pages | Published September 1st 2004 by Ig Publishing (first published 1928) | Ig Publishing | 1-Sep-2004 | first published 1928 | BEST | ||||||||||||||||
Proskauer on Privacy | 2006 | Proskauer on Privacy: A Guide to Privacy and Data Security Law in the Information Age | Christopher Wolf (editor) | Book | https://www.amazon.com/Proskauer-Privacy-Guide-Security-Information/dp/B000K5EELG | Amazon | LINK1 | LINK2 | https://books.google.com/books/about/Proskauer_on_Privacy.html?id=JXPVAgAACAAJ | https://www.worldcat.org/title/proskauer-on-privacy-a-guide-to-privacy-and-data-security-law-in-the-information-age/oclc/818750599 | https://www.amazon.com/Proskauer-Privacy-Guide-Security-Information/dp/B000K5EELG | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Proskauer Privacy Law Blog | 2020 | Proskauer Privacy Law Blog | Proskauer Rose LLP | Web Resource | Blog | The Privacy Law Blog is written by the Proskauer Rose Privacy & Data Security Group and gives updates on privacy legal issues. | LINK1 | https://privacylaw.proskauer.com/ | https://privacylaw.proskauer.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Prosser's Privacy Law: A Mix acy Law: A Mixed Legacy | 2010 | Prosser's Privacy Law: A Mix acy Law: A Mixed Legacy | Daniel J. Solove, Neil M. Richards | Law Journal | Notice & Consent | This Article examines the complex ways in which William Prosser shaped the development of the American law of tort privacy. Although Prosser certainly gave tort privacy an order and legitimacy that it had previously lacked, he also stunted its development in ways that limited its ability to adapt to the problems of the Information Age. His skepticism about privacy, as well as his view that tort privacy lacked conceptual coherence, led him to categorize the law into a set of four narrow categories and strip it of any guiding concept to shape its future development. Prosser’s legacy for tort privacy law is thus a mixed one: He greatly increased the law’s stature at the cost of giving it no guidance and making it less able to adapt to new circumstances in the future. If tort privacy is to remain vital in a digital age, it must move beyond Prosser’s conception. | LINK1 | LINK2 | LINK3 | https://heinonline.org/HOL/LandingPage?handle=hein.journals/calr98&div=64&id=&page= | https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2104&context=faculty_publications | https://drive.google.com/file/d/1F-ax_FImEIw6JPvTRSWKl77gx10JDOlf/view?usp=sharing | https://heinonline.org/HOL/LandingPage?handle=hein.journals/calr98&div=64&id=&page= | Privacy Stan | https://twitter.com/Privacy_Stan | George Washington University Law School, | George Washington University Law School | BEST | |||||||||||||||||||||||
Protecting Personal Information | 2019 | Protecting Personal Information: The Right to Privacy Reconsidered | Andrea Monti and Raymond Wacks | Book | https://www.amazon.com/gp/product/150992485X | Amazon | https://www.amazon.com/gp/product/150992485X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Protecting Privacy in Surveillance Societies | 1992 | Protecting Privacy in Surveillance Societies | David H. Flaherty | Book | x | https://www.amazon.com/Protecting-Privacy-Surveillance-Societies-Republic/dp/0807843520 | Amazon | LINK1 | https://books.google.com/books/about/Protecting_Privacy_in_Surveillance_Socie.html?id=9EOPAAAAMAAJ | https://www.amazon.com/Protecting-Privacy-Surveillance-Societies-Republic/dp/0807843520 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
Protecting Student Data Privacy | 2019 | Protecting Student Data Privacy: Classroom Fundamentals | Linnette Attai | Book | https://www.amazon.com/gp/product/1475845227 | Amazon | https://www.amazon.com/gp/product/1475845227 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Public Parts | 2011 | Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live | Jeff Jarvis | Book | https://www.amazon.com/Public-Parts-Sharing-Digital-Improves/dp/1451636008 | Amazon | GR | https://www.goodreads.com/book/show/11238922-public-parts | LINK1 | https://books.google.com/books/about/Public_Parts.html?id=djTOx4cnfhsC | https://www.amazon.com/Public-Parts-Sharing-Digital-Improves/dp/1451636008 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Qualityland | 2017 | Qualityland | Marc-Uwe Kling | Book/Audio | Fiction | https://www.amazon.com/Qualityland-Marc-Uwe-Kling/dp/1538732963 | Amazon | AUD | https://www.audible.com/pd/Qualityland-Audiobook/1549122525?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/Qualityland-Marc-Uwe-Kling/dp/1538732963 | Privacy Stan | https://twitter.com/Privacy_Stan | Patricia Rodriguez | 642 | BEST | ||||||||||||||||||||||||||
Quantum Thief | 2010 | Quantum Thief | Hannu Rajaniemi | Book | Fiction: Science Fiction & Fantasy > Science Fiction | https://www.amazon.com/gp/product/0765367661 | Amazon | https://www.amazon.com/gp/product/0765367661 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 3.9 | 531 | https://www.amazon.com/Hannu-Rajaniemi/e/B003VNOJY6/ref=dp_byline_cont_book_1 | BEST | |||||||||||||||||||||||||||
Re-Engineering Humanity | 2018 | Re-Engineering Humanity | Brett Frischmann and Evan Selinger | Book | Politics & Social Sciences > Social Sciences | Every day, new warnings emerge about artificial intelligence rebelling against us. All the while, a more immediate dilemma flies under the radar. Have forces been unleashed that are thrusting humanity down an ill-advised path, one that's increasingly making us behave like simple machines? In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart environments. They explain how the goal of designing programmable worlds goes hand in hand with engineering predictable and programmable people. Detailing new frameworks, provocative case studies, and mind-blowing thought experiments, Frischmann and Selinger reveal hidden connections between fitness trackers, electronic contracts, social media platforms, robotic companions, fake news, autonomous cars, and more. This powerful analysis should be read by anyone interested in understanding exactly how technology threatens the future of our society, and what we can do now to build something better. | https://www.amazon.com/gp/product/1107147093 | Amazon | https://www.amazon.com/gp/product/1107147093 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | ,978-1107147096 | 4.6 | 50 | https://www.amazon.com/Evan-Selinger/e/B0788BY1L9/ref=dp_byline_cont_book_2 | Cover | English | 430 | BEST | ||||||||||||||||||||||
Rear Window | 1954 | Rear Window | Alfred Hitchcock | Movie | Horror, Suspense | x | Long before voice assistants or smart appliances were raising privacy concerns, Alfred Hitchcock’s “Rear Window” prompted the question of how much privacy we can expect in our own homes. Released in 1954, the suspense stars James Stewart, a magazine war photographer who is confined to a wheelchair with a broken leg. Unable to leave his two-room apartment, Stewart’s character is fascinated with watching his neighbors through their windows – becoming convinced one of them has committed murder. This film, and the lack of privacy Jeffries’ neighbors have, unbeknownst to them, has intrigued me from the first time I watched it in high school film class. I hope it’s one you can enjoy, too, during this down time – and remember to close your blinds. | https://www.amazon.com/Rear-Window-James-Stewart/dp/B002RSOTSM | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0047396/ | https://en.wikipedia.org/wiki/Rear_Window | https://www.amazon.com/Rear-Window-Collectors-James-Stewart/dp/B00003CXC7 | https://www.amazon.com/Rear-Window-James-Stewart/dp/B002RSOTSM | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | ||||||||||||||||||||||
Reconstructing the Fourth Amendment | 2006 | Reconstructing the Fourth Amendment: A History of Search and Seizure, 1789-1868 | Andrew E. Taslitz | Book | History | https://www.amazon.com/Reconstructing-Fourth-Amendment-History-1789-1868/dp/0814782639 | Amazon | LINK1 | LINK2 | https://nyupress.org/9780814783269/reconstructing-the-fourth-amendment/ | https://www.researchgate.net/publication/314184787_Reconstructing_the_Fourth_Amendment_a_history_of_search_seizure_1789-1868 | https://www.amazon.com/Reconstructing-Fourth-Amendment-History-1789-1868/dp/0814782639 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||
Regulating Privacy | 1992 | Regulating Privacy: Data Protection and Public Policy in Europe and the United States (1st Ed) | Colin J. Bennett | Book | https://www.amazon.com/Regulating-Privacy-Protection-Public-Policy/dp/0801480108 | Amazon | LINK1 | LINK2 | https://www.cornellpress.cornell.edu/book/9780801480102/regulating-privacy/#bookTabs=1 | https://www.jstor.org/stable/10.7591/j.ctv2n7hxs | https://www.amazon.com/Regulating-Privacy-Protection-Public-Policy/dp/0801480108 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Reimagining Reality | 2020 | Reimagining Reality: Human Rights and Immersive Technology | Brittan Heller | Harvard Kennedy Schoo; | VR, Biometrics | LINK1 | LINK2 | LINK3 | https://carrcenter.hks.harvard.edu/publications/reimagining-reality-human-rights-and-immersive-technology | https://carrcenter.hks.harvard.edu/files/cchr/files/ccdp_2020-008_brittanheller.pdf | https://drive.google.com/file/d/1cSrjfSh3e9B59x_37KWLFFgd96iz5RPy/view?usp=sharing | https://carrcenter.hks.harvard.edu/publications/reimagining-reality-human-rights-and-immersive-technology | FPF Privacy Papers Award | https://www.linkedin.com/pulse/11th-annual-privacy-papers-policymakers-award-jules-polonetsky/ | BEST | ||||||||||||||||||||||||||
Reinventing Capitalism in the Age of Big Data | 2018 | Reinventing Capitalism in the Age of Big Data | Viktor Mayer-Schönberger | $9 | Book | Business & Money > Biography & History | From the New York Times bestselling author of Big Data, a prediction for how data will revolutionize the market economy and make cash, banks, and big companies obsolete | https://www.amazon.com/gp/product/046509368X | Amazon | https://www.amazon.com/gp/product/046509368X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 3.8 | 38 | https://www.amazon.com/Thomas-Ramge/e/B001K6DN5W/ref=dp_byline_cont_book_2 | BEST | |||||||||||||||||||||||||
Right of Publicity | 2018 | Right of Publicity: Privacy Reimagined for a Public World | Jennifer Rothman, Th | $42 | Book | Law > Constitutional Law | https://www.amazon.com/gp/product/0674980980 | Amazon | https://www.amazon.com/gp/product/0674980980 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | 8 | Cover | BEST | ||||||||||||||||||||||||||
Right to Erasure in EU Data Protection Law | 2020 | The Right to Erasure in EU Data Protection Law | Jef Ausloos | $90 | Book | Computers & Technology > History & Culture | This book critically investigates the role of data subject rights in countering information and power asymmetries online. It aims at dissecting 'data subject empowerment' in the information society through the lens of the right to erasure ("right to be forgotten") in Article 17 of the General Data Protection Regulation (GDPR). In doing so, it provides an extensive analysis of the interaction between the GDPR and the fundamental right to data protection in Art.8 of the Charter of Fundamental Rights of the EU (Charter), how data subject rights affect fair balancing of fundamental rights, and what the practical challenges are to effective data subject rights. / The book starts with exploring the data-driven asymmetries that characterise individuals' relationship with tech giants. These commercial entities increasingly anticipate and govern how people interact with each other and the world around them, affecting core values such as individual autonomy, dignity and freedom. The book explores how data protection law, and data subject rights in particular, enable resisting, breaking down or at the very least critically engaging with these asymmetric relationships. It concludes that despite substantial legal and practical hurdles, the GDPR's right to erasure does play a meaningful role in furthering the fundamental right to data protection (Art. 8 Charter) in the face of power asymmetries online. | https://www.amazon.com/gp/product/0198847971 | Amazon | https://www.amazon.com/gp/product/0198847971 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 0198847971, 978-0198847977 | 560 | Oxford University Press (June 23, 2020) | Oxford University Press | 23-Jun-2020 | 4 | 2 | Cover | BEST | ||||||||||||||||||||
Right to Life | 2008 | The Right to Life, Security, Privacy and Ownership in Islam | Mohammad Hashim Kamali | Book | x | https://www.amazon.com/Security-Privacy-Ownership-Fundamental-Liberties/dp/190368255X | Amazon | GR | https://www.goodreads.com/book/show/777775.The_Right_to_Life_Security_Privacy_and_Ownership_in_Islam | LINK1 | https://books.google.com/books/about/The_Right_to_Life_Security_Privacy_and_O.html?id=Z3BBHQAACAAJ | https://www.amazon.com/Security-Privacy-Ownership-Fundamental-Liberties/dp/190368255X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||
Right to Privacy (1890) | 1890 | The Right to Privacy, Harvard Law Review 193 | Warren & Brandeis | Law Journal | Privacy Rights | Samuel D. Warren & Louis D. Brandeis,The Right to Privacy, 4 Harv. L. Rev. 193 (1890). This article inspires the recognition during the twentieth century of privacy torts in the majority of the states. // "The Right to Privacy" (4 Harvard L.R. 193 (Dec. 15, 1890)) is a law review article written by Samuel Warren and Louis Brandeis, and published in the 1890 Harvard Law Review. It is "one of the most influential essays in the history of American law" and is widely regarded as the first publication in the United States to advocate a right to privacy, articulating that right primarily as a "right to be let alone". / Warren and Brandeis then discuss the origin of what they called a "right to be let alone". They explain that the right of property provides the foundation for the right to prevent publication. But at the time the right of property only protected the right of the creator to any profits derived from the publication. The law did not yet recognize the idea that there was value in preventing publication. As a result, the ability to prevent publication did not clearly exist as a right of property. The authors proceed to examine case law regarding a person's ability to prevent publication. Warren and Brandeis observed that, although the court in Prince Albert v. Strange asserted that its decision was based on the protection of property, a close examination of the reasoning reveals the existence of other unspecified rights—that is, the right to be let alone. If this conclusion is correct, then existing law does afford "a principle which may be invoked to protect the privacy of the individual from invasion either by the too enterprising press, the photographer, or the possessor of any other modern device for recording or reproducing scenes or sounds." / Furthermore, Warren and Brandeis suggest the existence of a right to privacy based on the jurisdictional justifications used by the courts to protect material from publication. The article states, "where protection has been afforded against wrongful publication, the jurisdiction has been asserted, not on the ground of property, or at least not wholly on that ground, but upon the ground of an alleged breach of an implied contract or of a trust or confidence." Warren and Brandeis proceed to point out that: "This protection of implying a term in a contract, or of implying a trust, is nothing more nor less than a judicial declaration that public morality, private justice, and general convenience demand the recognition of such a rule." In other words, the courts created a legal fiction that contracts implied a provision against publication or that a relationship of trust mandated nondisclosure. Yet, the article raises a problematic scenario where a casual recipient of a letter, who did not solicit the correspondence, opens and reads the letter. Simply by receiving, opening, and reading a letter the recipient does not create any contract or accept any trust. Warren and Brandeis argue that courts have no justification to prohibit the publication of such a letter, under existing theories or property rights. Rather, they argue, "the principle which protects personal writings and any other productions of the intellect or the emotions, is the right to privacy." | LINK1 | LINK2 | LINK3 | https://en.wikipedia.org/wiki/The_Right_to_Privacy_(article) | https://www.cs.cornell.edu/~shmat/courses/cs5436/warren-brandeis.pdf | https://louisville.edu/law/library/special-collections/the-louis-d.-brandeis-collection/the-right-to-privacy | https://en.wikipedia.org/wiki/The_Right_to_Privacy_(article) | Privacy Stan | https://twitter.com/Privacy_Stan | Harvard Law | Harvard Law | BEST | |||||||||||||||||||||||
Right to Privacy (1997) | 1997 | The Right to Privacy | Ellen Alderman & Caroline Kennedy | Book | https://www.amazon.com/Right-Privacy-Caroline-Kennedy/dp/0679744347 | Amazon | GR | https://www.goodreads.com/book/show/845679.The_Right_to_Privacy | LINK1 | https://books.google.com/books/about/The_Right_to_Privacy.html?id=VxUwP6SAAU4C | https://www.amazon.com/Right-Privacy-Caroline-Kennedy/dp/0679744347 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Right to Privacy (2020) | 2020 | The Right to Privacy: Origins and Influence of a Nineteenth-Century Idea | Megan Richardson | Book | Law > Constitutional Law | Using original and archival material, The Right to Privacy traces the origins and influence of the right to privacy as a social, cultural and legal idea. Richardson argues that this right had emerged as an important legal concept across a number of jurisdictions by the end of the nineteenth century, providing a basis for its recognition as a universal human right in later centuries. This book is a unique contribution to the history of the modern right to privacy. It covers the transition from Georgian to Victorian England, developments in Second Empire France, insights in the lead up to the Bürgerliches Gesetzbuch (BGB) of 1896, and the experience of a rapidly modernising America around the turn of the twentieth century. It will appeal to an audience of academic and postgraduate researchers, as well as to the judiciary and legal practice. | https://www.amazon.com/gp/product/1108411681 | Amazon | https://www.amazon.com/gp/product/1108411681 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1108411681, 978-1108411684 | Paperback : 185 pages | Cambridge University Press (January 23, 2020) | Cambridge University Press | 23-Jan-2020 | Cover | BEST | |||||||||||||||||||||||
Rise of Big Data Policing | 2019 | The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement | Andrew Guthrie Ferguson | Book | x | In a high-tech command center in downtown Los Angeles, a digital map lights up with 911 calls, television monitors track breaking news stories, surveillance cameras sweep the streets, and rows of networked computers link analysts and police officers to a wealth of law enforcement intelligence. / This is just a glimpse into a future where software predicts future crimes, algorithms generate virtual “most-wanted” lists, and databanks collect personal and biometric information. The Rise of Big Data Policing introduces the cutting-edge technology that is changing how the police do their jobs and shows why it is more important than ever that citizens understand the far-reaching consequences of big data surveillance as a law enforcement tool. / Andrew Guthrie Ferguson reveals how these new technologies ―viewed as race-neutral and objective―have been eagerly adopted by police departments hoping to distance themselves from claims of racial bias and unconstitutional practices. After a series of high-profile police shootings and federal investigations into systemic police misconduct, and in an era of law enforcement budget cutbacks, data-driven policing has been billed as a way to “turn the page” on racial bias. | https://www.amazon.com/gp/product/147986997X | Amazon | https://www.amazon.com/gp/product/147986997X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Rise of the Right to Know | 2015 | The Rise of the Right to Know: Politics and the Culture of Transparency, 1945-1975 | Michael Schudson | Book | https://www.amazon.com/Rise-Right-Know-Transparency-1945-1975/dp/0674986938/ref=sr_1_1 | Amazon | https://www.amazon.com/Rise-Right-Know-Transparency-1945-1975/dp/0674986938/ref=sr_1_1 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Risk | 2016 | Risk | Laura Poitras | Movie | Documentary | Risk, the follow-up to Citzenfour by filmmaker Laura Poitras, is also worth catching. This time Poitras describes the transition of Julian Assange and WikiLeaks from widely being considered public advocates for releasing important details about US operations in Afghanistan and Iraq, to the controversial hacking of the Democratic National Committee during the presidential election of 2016. Not all security pros have to deal with presidential election security, but all organizations must deal with the reality of insider threats. Risk and Citizenfour are much-watch films for people serious about information security. | https://www.amazon.com/Risk-Julian-Assange/dp/B071JT39PL | Amazon | LINK1 | LINK2 | https://www.imdb.com/title/tt4964772/ | https://en.wikipedia.org/wiki/Risk_(2016_film) | https://www.amazon.com/Risk-Julian-Assange/dp/B071JT39PL | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334206 | BEST | |||||||||||||||||||||||||
Risk Management | 2020 | Risk Management | RM Magazine | Web Resource | LINK1 | http://www.rmmagazine.com/ | http://www.rmmagazine.com/ | CIPP/M IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPM_Authoritative_Resource_List_4.1.0.pdf | BEST | |||||||||||||||||||||||||||||||
Risky Business | 2013 | Risky Business: Sharing Health Data While Protecting Privacy | Khaled El Emam, editor | Book | https://www.amazon.com/Risky-Business-Sharing-Protecting-Privacy/dp/1466980508 | Amazon | GR | https://www.goodreads.com/book/show/17605911-risky-business | https://www.amazon.com/Risky-Business-Sharing-Protecting-Privacy/dp/1466980508 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Rule 34 | 2011 | Rule 34 | Charles Stross | Book | Fiction | https://www.amazon.com/Rule-34-Charles-Stross/dp/0441020348/ref=tmm_hrd_swatch_0 | Amazon | https://www.amazon.com/Rule-34-Charles-Stross/dp/0441020348/ref=tmm_hrd_swatch_0 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||||
Schneier on Security | 2021 | Schneier on Security | Bruce Schneier | Web Resource | Blog | LINK1 | https://www.schneier.com/ | https://www.schneier.com/ | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||||||
Secrets and Lies | 2004 | Secrets and Lies: Digital Security in a Networked World | Bruce Schneier | Book | x | https://www.amazon.com/Secrets-Lies-Digital-Security-Networked/dp/1119092434 | Amazon | GR | https://www.goodreads.com/book/show/304482.Secrets_and_Lies | LINK1 | https://www.schneier.com/books/secrets-and-lies/ | https://www.amazon.com/Secrets-Lies-Digital-Security-Networked/dp/1119092434 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||
Securing Privacy in the Internet Age | 2008 | Securing Privacy in the Internet Age | Anupam Chander, Lauren Gelman, and Margaret Jane Radin (editors) | Book | https://www.amazon.com/Securing-Privacy-Internet-Anupam-Chander/dp/0804759189 | Amazon | LINK1 | https://books.google.com/books/about/Securing_Privacy_in_the_Internet_Age.html?id=CCDAwAEACAAJ | https://www.amazon.com/Securing-Privacy-Internet-Anupam-Chander/dp/0804759189 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||
Sexting Panic | 2015 | Sexting Panic: Rethinking Criminalization, Privacy, and Consent | Amy Adele Hasinoff | Book | Health, Fitness & Dieting > Psychology & Counseling | https://www.amazon.com/gp/product/0252080629 | Amazon | https://www.amazon.com/gp/product/0252080629 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.4 | 6 | https://www.amazon.com/Amy-Adele-Hasinoff/e/B00OHFYQ22/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Shockwave Rider | 1975 | The Shockwave Rider | John Brunner | Book | Fiction: Literature & Fiction > Action & Adventure | CyberPunk | He was the most dangerous fugitive alive, but he didn'™t exist! | https://www.amazon.com/gp/product/0345467175 | Amazon | https://www.amazon.com/gp/product/0345467175 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 4.3 | 114 | https://www.amazon.com/John-Brunner/e/B000AQ26P6/ref=dp_byline_cont_book_1 | BEST | |||||||||||||||||||||||||
Simple Proactive | 2019 | Simple Proactive Privacy and Security | Alex Summers | Book | x | This is the book Silicon Valley does not want you reading. From phone calls to channel surfing, and from web browsing to social media, everything we do gets tracked and our data gets collected and sold. Military Veteran Alex Summers got fed up and worked to reduce the digital tracking of his family. In doing so, he realized the information he needed to enjoy both technology and privacy was scattered all over the web. This book brings his research together in a way anyone and everyone can easily use. In Simple Proactive Privacy and Security, Alex Summers shows you easy ways to:* Avoid the bait of phishing attacks. / * Remove yourself from 27 people locator websites that share our names, addresses & other private info.* Use a password manager and password generator.* Adjust your home router's settings to better protect your entire home network.* Get your browser to help block tracking and script hacking.* Change your Windows or Mac PC settings to better protect you.* Improve your privacy on Android and iPhone.* Protect your phone calls and text messages with encryption.* Reduce the tracking on common smarthome devices like speakers, TV's, and other IoT gadgets.* Stop your free email and cloud providers from being able to read your emails and cloud files.* Setup the best settings and practices for more private social media usage.And more | https://www.amazon.com/Simple-Proactive-Privacy-Security-Summers/dp/1077498292 | Amazon | https://www.amazon.com/Simple-Proactive-Privacy-Security-Summers/dp/1077498292 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Skating on Stilts | 2010 | Skating on Stilts: Why We Aren’t Stopping Tomorrow’s Terrorism | Stewart Baker | Book | https://www.amazon.com/Skating-Stilts-Tomorrows-Institution-Publication/dp/0817911545 | Amazon | GR | https://www.goodreads.com/book/show/8765217-skating-on-stilts | LINK1 | https://www.hoover.org/research/skating-stilts-why-we-arent-stopping-tomorrows-terrorism | https://www.amazon.com/Skating-Stilts-Tomorrows-Institution-Publication/dp/0817911545 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Smart Surveillance | 2019 | Smart Surveillance: How to Interpret the Fourth Amendment in the Twenty-First Century | Ric Simmons | Book | Textbooks > Law | x | https://www.amazon.com/gp/product/1108728960 | Amazon | https://www.amazon.com/gp/product/1108728960 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | Cover | BEST | |||||||||||||||||||||||||||
Snoop: What Your Stuff Says About You | 2009 | Snoop: What Your Stuff Says About You | Sam Gosling | Book | https://www.amazon.com/Snoop-What-Your-Stuff-About/dp/0465013821 | Amazon | GR | https://www.goodreads.com/book/show/1581330.Snoop | LINK1 | https://books.google.com/books/about/Snoop.html?id=APZOAQAAIAAJ | https://www.amazon.com/Snoop-What-Your-Stuff-About/dp/0465013821 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Snow Crash | 1992 | Snow Crash | Neal Stephenson | Book | Fiction: Humor & Entertainment > Humor | CyberPunk | https://www.amazon.com/gp/product/0553380958 | Amazon | https://www.amazon.com/gp/product/0553380958 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 4.5 | 1247 | https://www.amazon.com/Neal-Stephenson/e/B000APS8L8/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||
Snowden | 2016 | Snowden | Oliver Stone (Director) | Movie | Drama | x | As mentioned, Snowden is known for disclosing numerous global surveillance programs ran by the NSA in cooperation with entities such as telecommunication companies and European governments. This sparked a global discussion about national security and personal privacy. It was also the inspiration for the 2017 Cinema for Peace Award for Justice-winning biographical thriller movie starring Joseph Gordon-Levitt as the CIA whistleblower. | https://www.amazon.com/Snowden-Joseph-Gordon-Levitt/dp/B01LWYVHKV | Amazon | LINK1 | LINK2 | LINK3 | https://play.google.com/store/movies/details/Snowden?id=9J9OMlk1qss&hl=en | https://en.wikipedia.org/wiki/Snowden_(film) | https://www.imdb.com/title/tt3774114/ | https://www.amazon.com/Snowden-Joseph-Gordon-Levitt/dp/B01LWYVHKV | Nolisoli | https://nolisoli.ph/81744/7-films-on-data-privacy-ymagcamit-20200610/ | BEST | ||||||||||||||||||||||
So You’ve Been Publicly Shamed | 2015 | So You’ve Been Publicly Shamed | Jon Ronson | Book | https://www.amazon.com/gp/product/1594634017 | Amazon | https://www.amazon.com/gp/product/1594634017 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Social Dilemma | 2020 | The Social Dilemma | Jeff Orlowski | Movie | Docudrama | Social Media | Explores the dangerous human impact of social networking, with tech experts sounding the alarm on their own creations. | LINK1 | LINK2 | LINK3 | https://www.netflix.com/title/81254224 | https://www.imdb.com/title/tt11464826/ | https://en.wikipedia.org/wiki/The_Social_Dilemma | https://www.netflix.com/title/81254224 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||
Social Dimensions of Privacy | 2015 | Social Dimensions of Privacy | Beate Roessler & Dorota Mokrosinska (editors) | Book | Textbooks > Humanities | https://www.amazon.com/gp/product/1107052378 | Amazon | https://www.amazon.com/gp/product/1107052378 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1 | Cover | 378 | BEST | |||||||||||||||||||||||||||
Spam Nation | 2014 | Spam Nation | Brian Krebs | Book | https://www.amazon.com/Spam-Nation-Organized-Cybercrime--Epidemic/dp/1492603236/ | Amazon | https://www.amazon.com/Spam-Nation-Organized-Cybercrime--Epidemic/dp/1492603236/ | Make Use Of | https://www.makeuseof.com/tag/books-online-privacy-security-need-read/ | BEST | |||||||||||||||||||||||||||||||
Strategic Privacy by Design | 2018 | Strategic Privacy by Design | Jason Cronk | $50 | Book | Textbook | Strategic Privacy by Design is a new handy guide to implementing privacy by design, written from a practitioner's perspective. Authored by R. Jason Cronk, CIPP/US, CIPM, CIPT, FIP, this is the first IAPP book to get into the details of how privacy by design works, with dozens of sample scenarios, workflows, charts, and tables. Use it as a standalone text to inform your work, or pair it with our CIPM and CIPT textbooks to create a fuller picture of how managing a global privacy program today requires mix of legal knowledge, management skills, and technical acumen. / While this book is not written specifically for the EU's General Data Protection Regulation, it can certainly be used as a process for data protection by design and default (Article 25), and use of the proffered privacy-by-design process herein will help organizations comply with many global regulations. This book is about how to build better processes, products, and services that consider privacy as a design requirement. It is about how to build things that people can trust. | GR | https://www.goodreads.com/en/book/show/42395084-strategic-privacy-by-design | LINK1 | LINK2 | LINK3 | https://iapp.org/store/books/a191a00000345yDAAQ/ | https://teachprivacy.com/strategic-privacy-by-design/ | https://enterprivacy.com/2018/10/07/jason-cronks-upcoming-book-strategic-privacy-by-design/ | https://www.goodreads.com/en/book/show/42395084-strategic-privacy-by-design | CIPP/T IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPT_Authoritative_Resource_List_4.1.0.pdf | Portsmouth. IAPP Publication, 2018. (Print & Digital copies | Portsmouth: IAPP Publications | 10-Jul-1905 | Print & Digital copies | BEST | ||||||||||||||||||
Student Data Privacy | 2020 | Student Data Privacy: Managing Vendor Relationships | Linnette Attai | $30 | Book | How do education institutions protect student data privacy while working with technology providers? Often times, the work is clouded by a good deal of fear and uncertainty. In Student Data Privacy: Managing Vendor Relationships, Linnette Attai leverages her decades of experience working with technology providers and education institutions to provide the guidance education technology providers can use to manage their privacy responsibilities from a position of strength. | https://www.amazon.com/gp/product/1475845251 | Amazon | https://www.amazon.com/gp/product/1475845251 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 1475845251, 978-1475845259 | Paperback : 126 pages | Rowman & Littlefield Publishers; Illustrated edition (August 1, 2020) | Rowman & Littlefield Publishers | 1-Aug-2020 | Illustrated edition | BEST | |||||||||||||||||||||||
Super Sad True Love Story | 2011 | Super Sad True Love Story: A Novel | Gary Shteyngart | Book | Fiction: Literature & Fiction > Humor & Satire | In the near future, America is crushed by a financial crisis and our patient Chinese creditors may just be ready to foreclose on the whole mess. Then Lenny Abramov, son of an Russian immigrant janitor and ardent fan of “printed, bound media artifacts” (aka books), meets Eunice Park, an impossibly cute Korean American woman with a major in Images and a minor in Assertiveness. Could falling in love redeem a planet falling apart? | https://www.amazon.com/gp/product/0812977866 | Amazon | https://www.amazon.com/gp/product/0812977866 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 3.9 | 592 | https://www.amazon.com/Gary-Shteyngart/e/B001JP7L70/ref=dp_byline_cont_book_1 | BEST | ||||||||||||||||||||||||||
Supervision | 2012 | SuperVision: An Introduction to the Surveillance Society | John Gilliom and Torin Monahan | Book | x | https://www.amazon.com/SuperVision-Introduction-Surveillance-John-Gilliom/dp/0226924440 | Amazon | LINK1 | LINK2 | LINK3 | https://press.uchicago.edu/ucp/books/book/chicago/S/bo14365311.html | https://books.google.com/books/about/SuperVision.html?id=QH32505P4ZsC | https://www.researchgate.net/publication/273290140_SuperVision_An_introduction_to_the_surveillance_society | https://www.amazon.com/SuperVision-Introduction-Surveillance-John-Gilliom/dp/0226924440 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||
Surveillance and Film | 2016 | Surveillance and Film | J. Macgregor Wise | Book | Textbooks > Humanities | x | https://www.amazon.com/exec/obidos/ASIN/1628924853 | Amazon | https://www.amazon.com/exec/obidos/ASIN/1628924853 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 5 | https://www.amazon.com/J-Macgregor-Wise/e/B001JCJ7YS/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
Surveillance and the Law | 2020 | Surveillance and the Law | Maria Helen Murphy | $23 | Book | Law > Criminal Law | x | Surveillance of citizens is a clear manifestation of government power. The act of surveillance is generally deemed acceptable in a democratic society where it is necessary to protect the interests of the nation and where the power is exercised non-arbitrarily and in accordance with the law. / Surveillance and the Law analyses the core features of surveillance that create stark challenges for transparency and accountability by examining the relationship between language, power, and surveillance. It identifies a number of features of surveillance law, surveillance language, and the distribution of power that perpetuate the existing surveillance paradigm. Using case studies from the US, the UK, and Ireland, it assesses the techniques used to maintain the status quo of continued surveillance expansion. These jurisdictions are selected for their similarities, but also for their key constitutional distinctions, which influence how power is distributed and restrained in the different systems. Though the book maintains that the classic principles of transparency and accountability remain the best means available to limit the arbitrary exercise of government power, it evaluates how these principles could be better realised in order to restore power to the people and to maintain an appropriate balance between government intrusion and the right to privacy. / By identifying the common tactics used in the expansion of surveillance around the globe, this book will appeal to students and scholars interested in privacy law, human rights, information technology law, and surveillance studies. | https://www.amazon.com/gp/product/0367606720 | Amazon | https://www.amazon.com/gp/product/0367606720 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 0367606720, 978-0367606725 | Paperback : 108 pages | Routledge; 1st edition (June 30, 2020) | Routledge | 30-Jun-2020 | 1st edition | 5 | Cover | BEST | |||||||||||||||||||
Surveillance as Loss of Obscurity | 2016 | Surveillance as Loss of Obscurity | Evan Selinger, Woodrow Hartzog | Research/Report | Anonyminity | Everyone seems concerned about government surveillance, yet we have a hard time agreeing when and why it is a problem and what we should do about it. When is surveillance in public unjustified? Does metadata raise privacy concerns? Should encrypted devices have a backdoor for law enforcement officials? Despite increased attention, surveillance jurisprudence and theory still struggle for coherence. A common thread for modern surveillance problems has been difficult to find. / In this article we argue that the concept of ‘obscurity,’ which deals with the transaction costs involved in finding or understanding information, is the key to understanding and uniting modern debates about government surveillance. Obscurity can illuminate different areas where transactions costs for surveillance are operative and explain why making surveillance hard but possible is the central issue in the government-surveillance debates. Obscurity can also explain why the solutions to the government-surveillance problem should revolve around introducing friction and inefficiency into process, whether it be legally through procedural requirements like warrants or technologies like robust encryption. / Ultimately, obscurity can provide a clearer picture of why and when government surveillance is troubling. It provides a common thread for disparate surveillance theories and can be used to direct surveillance reform. | LINK1 | LINK2 | LINK3 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2711816&s=03 | https://scholarlycommons.law.wlu.edu/wlulr/vol72/iss3/10/ | https://www.researchgate.net/publication/310310106_Surveillance_and_Loss_of_Obscurity | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2711816&s=03 | Privacy Stan | https://twitter.com/Privacy_Stan | 72 Washington and Lee Law Review 1343 (2015) | Washington and Lee Law Review | 7-Jul-1905 | BEST | ||||||||||||||||||||||
Surveillance or Security | 2013 | Surveillance or Security?: The Risks Posed by New Wiretapping | Susan Landau | Book | x | x | https://www.amazon.com/Surveillance-Security-Risks-Wiretapping-Technologies/dp/0262518740 | Amazon | LINK1 | LINK2 | LINK3 | https://mitpress.mit.edu/books/surveillance-or-security | https://www.jstor.org/stable/j.ctt5vjqkc | https://books.google.com/books/about/Surveillance_Or_Security.html?id=KW4UOtP0ud0C | https://www.amazon.com/Surveillance-Security-Risks-Wiretapping-Technologies/dp/0262518740 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||
Surveillance State | 2015 | The Surveillance State: Big Data, Freedom, and You | Paul Rosenzweig | Book/Audio | Online Course | x | x | The news is full of stories like these, in which new technologies lead to dilemmas that could not have been imagined just a few decades ago. The 21st century has seen remarkable technological advances, with many wonderful benefits. But with these advances come new questions about privacy, security, civil liberties, and more. Big Data is here, which means that government and private industries are collecting massive amounts of information about each of us—information that may be used in marketing, to help solve criminal investigations, and to promote the interests of national security. Pandora’s Box has been opened, but in many ways the government is behind the times, relying on legislation from the 1970s to inform its stance on regulating the collection and use of this information. Our society now faces a host of critical questions, including: / Where is the line between promoting national security and defending personal liberty? What information may the government collect about you from your Internet service provider? When it comes to search and seizure, is a cell phone any different from a diary? How will we respond to future technologies such as quantum computers and artificial intelligence? / Explore these questions and more in The Surveillance State: Big Data, Freedom, and You. Taught by Paul Rosenzweig, J.D., esteemed legal expert and professorial lecturer at The George Washington University School of Law, these 24 revealing lectures tackle the tough questions about surveillance and data in the 21st century. Get an insider’s look at how technology from search engines to your car’s toll road transponder gathers information about American citizens. With Professor Rosenzweig’s guidance, you’ll scrutinize our system of oversight for intelligence agencies, and you’ll consider the ways in which the information that is collected impacts (or potentially impacts) our civil liberties. He presents the facts objectively, giving you the information you need to draw your own conclusions. | https://www.amazon.com/Surveillance-State-Big-Data-Freedom/dp/B01JTOF37W | Amazon | GR | https://www.goodreads.com/book/show/40030605-the-surveillance-state---big-data-freedom-and-you?from_search=true&from_srp=true&qid=r0VsV3PwEz&rank=1 | LINK1 | https://www.thegreatcourses.com/courses/the-surveillance-state-big-data-freedom-and-you.html | AUD | https://www.audible.com/pd/The-Surveillance-State-Audiobook/B01BVPPFFM?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/Surveillance-State-Big-Data-Freedom/dp/B01JTOF37W | Privacy Stan | https://twitter.com/Privacy_Stan | Paul Rosenzweig | 728 | 150193824X (ISBN13: 9781501938245) | 3.93 · Rating details · 82 ratings · 17 reviews | Published 2016 by The Great Courses | The Great Courses | 8-Jul-1905 | BEST | ||||||||||||||
Surveillance, Privacy and Public Space | 2020 | Surveillance, Privacy and Public Space | Edited by Bryce Clayton Newell, Tjerk Timan, Bert-Jaap Koops | $50 | Book | Textbooks > Social Sciences | x | Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. / Surveillance, Privacy, and Public Space problematizes our traditional understanding of ‘public space’. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. / / Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology. | https://www.amazon.com/gp/product/0367486644 | Amazon | https://www.amazon.com/gp/product/0367486644 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 0367486644, 978-0367486648 | Paperback : 261 pages | Routledge; 1st edition (February 25, 2020) | Routledge | 25-Feb-2020 | 1st edition | Cover | BEST | ||||||||||||||||||||
Swiped | 2015 | Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves | Adam Levin | Book | https://www.amazon.com/Swiped-Yourself-Scammers-Phishers-Identity/dp/1610397207 | Amazon | GR | https://www.goodreads.com/book/show/29502357-swiped | LINK1 | https://adamlevin.com/swiped-book-adam-levin/ | https://www.amazon.com/Swiped-Yourself-Scammers-Phishers-Identity/dp/1610397207 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Synthetic Data | 2020 | Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data | Khaled El Emam, Lucy Mosquera, Richard Hoptroff | Book | Building and testing machine learning models requires access to large and diverse data. But where can you find usable datasets without running into privacy issues? This practical book introduces techniques for generating synthetic data—fake data generated from real data—so you can perform secondary analysis to do research, understand customer behaviors, develop new products, or generate new revenue. / Data scientists will learn how synthetic data generation provides a way to make such data broadly available for secondary purposes while addressing many privacy concerns. Analysts will learn the principles and steps for generating synthetic data from real datasets. And business leaders will see how synthetic data can help accelerate time to a product or solution. / This book describes: ** Steps for generating synthetic data using multivariate normal distributions ** Methods for distribution fitting covering different goodness-of-fit metrics ** How to replicate the simple structure of original data ** An approach for modeling data structure to consider complex relationships ** Multiple approaches and metrics you can use to assess data utility ** How analysis performed on real data can be replicated with synthetic data ** Privacy implications of synthetic data and methods to assess identity disclosure | https://www.amazon.com/Practical-Synthetic-Data-Generation-Availability/dp/1492072745 | Amazon | LINK1 | LINK2 | https://www.oreilly.com/library/view/practical-synthetic-data/9781492072737/ | https://books.google.com/books/about/Practical_Synthetic_Data_Generation.html?id=C9ejzAEACAAJ | https://www.amazon.com/Practical-Synthetic-Data-Generation-Availability/dp/1492072745 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | ||||||||||||||||||||||||||
Taking Trust Seriously in Privacy Law | 2015 | Taking Trust Seriously in Privacy Law | Neil M. Richards, Woodrow Hartzog | Research/Report | Trust | Trust is beautiful. The willingness to accept vulnerability to the actions of others is the essential ingredient for friendship, commerce, transportation, and virtually every other activity that involves other people. It allows us to build things, and it allows us to grow. Trust is everywhere, but particularly at the core of the information relationships that have come to characterize our modern, digital lives. Relationships between people and their ISPs, social networks, and hired professionals are typically understood in terms of privacy. But the way we have talked about privacy has a pessimism problem – privacy is conceptualized in negative terms, which leads us to mistakenly look for “creepy” new practices, focus excessively on harms from invasions of privacy, and place too much weight on the ability of individuals to opt out of harmful or offensive data practices. / But there is another way to think about privacy and shape our laws. Instead of trying to protect us against bad things, privacy rules can also be used to create good things, like trust. In this paper, we argue that privacy can and should be thought of as enabling trust in our essential information relationships. This vision of privacy creates value for all parties to an information transaction and enables the kind of sustainable information relationships on which our digital economy must depend. / Drawing by analogy on the law of fiduciary duties, we argue that privacy laws and practices centered on trust would enrich our understanding of the existing privacy principles of confidentiality, transparency, and data protection. Re-considering these principles in terms of trust would move them from procedural means of compliance for data extraction towards substantive principles to build trusted, sustainable information relationships. Thinking about privacy in terms of trust also reveals a principle that we argue should become a new bedrock tenet of privacy law: the Loyalty that data holders must give to data subjects. Rejuvenating privacy law by getting past Privacy Pessimism is essential if we are to build the kind of digital society that is sustainable and ultimately beneficial to all – users, governments, and companies. There is a better way forward for privacy. Trust us. | LINK1 | LINK2 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2655719&s=03 | https://law.stanford.edu/publications/taking-trust-seriously-in-privacy-law/ | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2655719&s=03 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||
Targeted | 2019 | Targeted: My Inside Story of Cambridge Analytica and How Trump and Facebook Broke Democracy | Brittany Kaiser | Book/Audio | In this explosive memoir, a political consultant and technology whistleblower reveals the disturbing truth about the multi-billion-dollar data industry, revealing to the public how companies are getting richer using our personal information and exposing how Cambridge Analytica exploited weaknesses in privacy laws to help elect Donald Trump--and how this could easily happen again in the 2020 presidential election. / When Brittany Kaiser joined Cambridge Analytica--the UK-based political consulting firm funded by conservative billionaire and Donald Trump patron Robert Mercer--she was an idealistic young professional working on her fourth degree in human rights law and international relations. A veteran of Barack Obama's 2008 campaign, Kaiser's goal was to utilize data for humanitarian purposes, most notably to prevent genocide and human rights abuses. But her experience inside Cambridge Analytica opened her eyes to the tremendous risks that this unregulated industry poses to privacy and democracy. / Targeted is Kaiser's eyewitness chronicle of the dramatic and disturbing story of the rise and fall of Cambridge Analytica. She reveals to the public how Facebook's lax policies and lack of sufficient national laws allowed voters to be manipulated in both Britain and the United States, where personal data was weaponized to spread fake news and racist messaging during the Brexit vote and the 2016 election. But the damage isn't done Kaiser warns; the 2020 election can be compromised as well if we continue to do nothing. / In the aftermath of the U.S. election, as she became aware of the horrifying reality of what Cambridge Analytica had done in support of Donald Trump, Kaiser made the difficult choice to expose the truth. Risking her career, relationships, and personal safety, she told authorities about the data industry's unethical business practices, eventually testifying before Parliament about the company's Brexit efforts and helping Special Counsel Robert Mueller's investigation into Russian interference in the 2016 election, alongside at least 10 other international investigations. / Packed with never-before-publicly-told stories and insights, Targeted goes inside the secretive meetings with Trump campaign personnel and details the promises Cambridge Analytica made to win. Throughout, Kaiser makes the case for regulation, arguing that legal oversight of the data industry is not only justifiable but essential to ensuring the long-term safety of our democracy | https://www.amazon.com/Targeted-Cambridge-Analytica-Facebook-Democracy/dp/0008363897 | Amazon | GR | https://www.goodreads.com/book/show/45943454-targeted?from_search=true&from_srp=true&qid=R5A3LUB3oG&rank=1 | AUD | https://www.audible.com/pd/Targeted-Audiobook/0062965816?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/Targeted-Cambridge-Analytica-Facebook-Democracy/dp/0008363897 | Privacy Stan | https://twitter.com/Privacy_Stan | Brittany Kaiser | 782 | 1094028193 (ISBN13: 9781094028194) | 3.61 · Rating details · 599 ratings · 112 reviews | Published October 22nd 2019 by HarperCollins | HarperCollins | 22-Oct-2019 | BEST | |||||||||||||||||||
TeachPrivacy | 2020 | Privacy & Security Training | Daniel Solove | Web Resource | Training | x | LINK1 | https://teachprivacy.com/ | https://teachprivacy.com/ | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | BEST | |||||||||||||||||||||||||||||
Technology & Marketing Law Blog | 2021 | Technology & Marketing Law Blog | Eric Goldman | Web Resource | Blog | LINK1 | https://blog.ericgoldman.org/ | https://blog.ericgoldman.org/ | IAPP | https://iapp.org/news/a/put-these-privacy-themed-movies-in-your-quarantine-queue/ | BEST | ||||||||||||||||||||||||||||||
Technology and Privacy | 1998 | Technology and Privacy: The New Landscape | Philip Agre & Marc Rotenberg, editors | Book | https://www.amazon.com/Technology-Privacy-Landscape-Philip-Agre/dp/0262511010 | Amazon | LINK1 | LINK2 | LINK3 | https://books.google.com/books/about/Technology_and_Privacy.html?id=H2KB2DK4w78C | https://jolt.law.harvard.edu/articles/pdf/v11/11HarvJLTech871.pdf | https://drive.google.com/file/d/1FJosAou_Mx-k7RpvB199cIuQHnpoUx36/view?usp=sharing | https://www.amazon.com/Technology-Privacy-Landscape-Philip-Agre/dp/0262511010 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
Technology and Regulation | 2020 | Technology and Regulation | Ronald Leenes (Editor) | Web Resource | Magazine | Technology and Regulation (TechReg) is a new interdisciplinary journal of law, technology and society. TechReg provides an open-access platform for disseminating original research on the legal and regulatory challenges posed by existing and emerging technologies. / The Editor-in-Chief is Professor Ronald Leenes of the Tilburg Law School. Our Editorial Board Committee comprises a distinguished panel of international experts in law, regulation, technology and society across different disciplines and domains. / TechReg aspires to become the leading outlet for scholarly research on technology and regulation topics, and has been conceived to be as accessible as possible for both authors and readers. | LINK1 | https://techreg.org/index.php/techreg | https://techreg.org/index.php/techreg | Privacy Stan | https://twitter.com/Privacy_Stan | Technology and Regulation • DOI: 10.26116/techreg • ISSN: 2666-139X | Technology and Regulation | DOI: 10.26116/techreg • ISSN: 2666-139X | BEST | ||||||||||||||||||||||||||
Ten Arguments for Deleting Your Social Media Accounts Right Now | 2018 | Ten Arguments for Deleting Your Social Media Accounts Right Now | Jaron Lanier | Book | Politics & Social Sciences | You might have trouble imagining life without your social media accounts, but virtual reality pioneer Jaron Lanier insists that we’re better off without them. In Ten Arguments for Deleting Your Social Media Accounts Right Now, Lanier, who participates in no social media, offers powerful and personal reasons for all of us to leave these dangerous online platforms. Lanier’s reasons for freeing ourselves from social media’s poisonous grip include its tendency to bring out the worst in us, to make politics terrifying, to trick us with illusions of popularity and success, to twist our relationship with the truth, to disconnect us from other people even as we are more “connected” than ever, to rob us of our free will with relentless targeted ads. How can we remain autonomous in a world where we are under continual surveillance and are constantly being prodded by algorithms run by some of the richest corporations in history that have no way of making money other than being paid to manipulate our behavior? How could the benefits of social media possibly outweigh the catastrophic losses to our personal dignity, happiness, and freedom? Lanier remains a tech optimist, so while demonstrating the evil that rules social media business models today, he also envisions a humanistic setting for social networking that can direct us toward a richer and fuller way of living and connecting with our world. | https://www.amazon.com/Arguments-Deleting-Social-Media-Accounts-ebook/dp/B079DTVVG8/ref=pd_sim_351_3 | Amazon | GR | https://www.goodreads.com/book/show/37830765-ten-arguments-for-deleting-your-social-media-accounts-right-now | LINK1 | LINK2 | https://us.macmillan.com/books/9781250196682 | http://www.jaronlanier.com/tenarguments.html | https://www.amazon.com/Arguments-Deleting-Social-Media-Accounts-ebook/dp/B079DTVVG8/ref=pd_sim_351_3 | Privacy Stan | https://twitter.com/Privacy_Stan | 1725 | https://www.amazon.com/Jaron-Lanier/e/B00J1ZK6S6/ref=dp_byline_cont_ebooks_1 | BEST | |||||||||||||||||||||
Terms and Conditions May Apply | 2013 | Terms and Conditions May Apply | Cullen Hoback (Director) | Movie | Documentary | Let’s be honest: You don’t really read all the terms and conditions on a website before clicking “I agree,” do you? This documentary by award-winning investigative filmmaker Cullen Hoback uses this as a starting point in tackling anonymity—or lack thereof—in the Internet. You may not have realized how agreeing to the terms and conditions of a website basically equates to handing your information to them on a silver platter. Let corporate bigwigs like Google’s former CEO Eric Schmidt and Facebook’s Mark Zuckerberg—who are featured in the film—change your mind. | https://www.amazon.com/Terms-Conditions-Apply-Cullen-Hoback/dp/B07WSRVLCQ | Amazon | LINK1 | https://www.imdb.com/title/tt2084953/ | https://www.amazon.com/Terms-Conditions-Apply-Cullen-Hoback/dp/B07WSRVLCQ | Nolisoli | https://nolisoli.ph/81744/7-films-on-data-privacy-ymagcamit-20200610/ | BEST | |||||||||||||||||||||||||||
Terror in the Balance | 2006 | Terror in the Balance: Security, Liberty, and the Courts (1st Ed) | Eric A. Posner & Adrian Vermeule | Book | https://www.amazon.com/Terror-Balance-Security-Liberty-Courts/dp/019531025X | Amazon | GR | https://www.goodreads.com/book/show/38099.Terror_in_the_Balance | LINK1 | LINK2 | LINK3 | https://books.google.com/books/about/Terror_in_the_Balance.html?id=LfIEbWwSiygC | https://www.law.upenn.edu/institutes/cerl/conferences/ethicsofsecrecy/papers/reading/PosnerVermeule.pdf | https://onlinelibrary.wiley.com/doi/abs/10.1002/j.1538-165X.2008.tb01746.x | https://www.amazon.com/Terror-Balance-Security-Liberty-Courts/dp/019531025X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||
Testaments | 2019 | The Testaments: The Sequel to The Handmaid’s Tale | Margaret Atwood | Book | Fiction: Literature & Fiction > History & Criticism | The Testaments is a modern masterpiece, a powerful novel that can be read on its own or as a companion to Margaret Atwood’s classic, The Handmaid’s Tale. / More than fifteen years after the events of The Handmaid's Tale, the theocratic regime of the Republic of Gilead maintains its grip on power, but there are signs it is beginning to rot from within. At this crucial moment, the lives of three radically different women converge, with potentially explosive results. / Two have grown up as part of the first generation to come of age in the new order. The testimonies of these two young women are joined by a third: Aunt Lydia. Her complex past and uncertain future unfold in surprising and pivotal ways. | https://www.amazon.com/gp/product/0385543786 | Amazon | https://www.amazon.com/gp/product/0385543786 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 0385543786, 978-0385543781 | Hardcover : 432 pages | Nan A. Talese; First Ed edition (September 10, 2019) | Nan A. Talese | 10-Sep-2019 | 1st edition | 4.6 | 18172 | https://www.amazon.com/Margaret-Atwood/e/B000AQTHI0/ref=dp_byline_cont_book_1 | 432 | BEST | |||||||||||||||||||
The Circle | 2017 | The Circle | James Ponsoldt | Movie | Drama | Social Media | This dramatic 2017 story has Emma Watson landing her dream job of being an IT professional at a social media company called Circle. Soon she was forced by the founder and owner into an experiment that took transparency and privacy to a whole new level. The movie is an ideal representation of artificial intelligence, social media and mass surveillance. | https://www.amazon.com/Circle-Emma-Watson/dp/B07495F265 | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt4287320/ | https://en.wikipedia.org/wiki/The_Circle_(2017_film) | https://www.amazon.com/Circle-DVD-Emma-Watson/dp/B071GB3P5N | https://www.amazon.com/Circle-Emma-Watson/dp/B07495F265 | CPO Mag | https://www.cpomagazine.com/cyber-security/movies-that-can-help-you-understand-data-privacy-and-hacking/ | BEST | ||||||||||||||||||||||
The Circle | 2013 | The Circle | Dave Eggers | Book | Fiction: Humor & Entertainment > Humor | A bestselling dystopian novel that tackles surveillance, privacy and the frightening intrusions of technology in our livesa compulsively readable parable for the 21st century' (Vanity Fair). | https://www.amazon.com/gp/product/0345807294 | Amazon | https://www.amazon.com/gp/product/0345807294 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 3.7 | 5797 | https://www.amazon.com/Dave-Eggers/e/B001H6UAH4/ref=dp_byline_cont_book_1 | BEST | ||||||||||||||||||||||||||
The Conversation | 1974 | The Conversation | Francis Ford Coppola | Movie | Drama | x | Directed by Francis Ford Coppola, The Conversation is one of the classic movies about surveillance. Starring Gene Hackman, the movie begins when a surveillance expert on a job of recording a couple in part begins to explore a mystery that arises out of this job. The movie depicts a long-range audio recording device as well as other bugging and wiretapping technology which seem quaint by today’s standards. The movie captures the creepiness of it all exceedingly well. There is one scene that by today’s standards wouldn’t be very violent or shocking, but that in this movie really achieves a remarkable intensity. This scene demonstrates that special effects and over-the-top gore are not necessary to create a thrilling and frightening scene. Great direction and storytelling are all that’s needed. | https://www.amazon.com/Conversation-Gene-Hackman/dp/B001LHATTS | Amazon | LINK1 | LINK2 | LINK3 | https://en.wikipedia.org/wiki/The_Conversation | https://www.imdb.com/title/tt0071360/ | https://www.amazon.com/gp/product/B003O7I6SE | https://www.amazon.com/Conversation-Gene-Hackman/dp/B001LHATTS | Solove Films | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | BEST | ||||||||||||||||||||||
The Guardian | 2020 | Data Protection coverage by The Guardian | The Guardian | Web Resource | Newspaper | Articles tagged with data protection on The Guardian | LINK1 | https://www.theguardian.com/technology/data-protection | https://www.theguardian.com/technology/data-protection | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
The Secret Ballot at Risk | 2016 | The Secret Ballot at Risk: Recommendations for Protecting Democracy | EPIC, Verified Voting, Common Cause | Research/Report | Voting | The right to cast a secret ballot in a public election is a core value in the United States’ system of self-governance. Secrecy and privacy in elections guard against coercion and are essential to integrity in the electoral process. Secrecy of the ballot is guaranteed in state constitutions and statutes nationwide. However, as states permit the marking and transmitting of marked ballots over the Internet, the right to a secret ballot is eroded and the integrity of our elections is put at risk. | LINK1 | LINK2 | LINK3 | https://secretballotatrisk.org/Secret-Ballot-At-Risk.pdf | https://secretballotatrisk.org/ | https://drive.google.com/file/d/1TDciHgHt_hQAwtVupCustmzZJtYcSKA6/view?usp=sharing | https://secretballotatrisk.org/Secret-Ballot-At-Risk.pdf | Privacy Stan | https://twitter.com/Privacy_Stan | EPIC | EPIC | BEST | |||||||||||||||||||||||
The Trial | 1914 | The Trial | Franz Kafka | $12 | Book | Fiction: Literature & Fiction > History & Criticism | https://www.amazon.com/gp/product/0805209999 | Amazon | https://www.amazon.com/gp/product/0805209999 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 4.6 | 538 | https://www.amazon.com/Franz-Kafka/e/B002DPABLS/ref=dp_byline_cont_book_1 | Cover | BEST | |||||||||||||||||||||||||
There Will be Cyberwar | 2015 | There Will be Cyberwar | Richard Stiennon | Book | History > Military | https://www.amazon.com/gp/product/0985460784 | Amazon | https://www.amazon.com/gp/product/0985460784 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.7 | 21 | https://www.amazon.com/Richard-Stiennon/e/B003L5VNJ8/ref=dp_byline_cont_book_1 | Cover | BEST | ||||||||||||||||||||||||||
They Know Everything About You | 2015 | They Know Everything About You | Robert Scheer | Book | https://www.amazon.com/gp/product/1568584520 | Amazon | https://www.amazon.com/gp/product/1568584520 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
Threat Modeling | 2014 | Threat Modeling: Designing for Security | Adam Shostack | Book | x | https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998 | Amazon | LINK1 | LINK2 | https://threatmodelingbook.com/ | https://www.wiley.com/en-us/Threat+Modeling%3A+Designing+for+Security-p-9781118809990 | https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||
THX 1138 | 1971 | THX 1138 | George Lucas | Movie | Drama, Sci-Fi, Thriller | In the twenty-fifth century, a time when people have designations instead of names, a man, THX 1138, and a woman, LUH 3417, rebel against their rigidly controlled society. | https://www.amazon.com/THX-1138-George-Lucas-Directors/dp/B075753137 | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0066434/ | https://www.amazon.com/THX-1138-Two-Disc-Directors-Special/dp/B0002CHIKG | https://en.wikipedia.org/wiki/THX_1138 | https://www.amazon.com/THX-1138-George-Lucas-Directors/dp/B075753137 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||
Tinker-ing with Machine Learning | 2020 | Tinker-ing with Machine Learning: The Legality and Consequences of Online Surveillance of Students | Amy B. Cyphert | Law Journal | ML, AI | All across the nation, high schools and middle schools are quietly entering into contracts with software companies to monitor the online activity of their students, attempting to predict the next school shooter or to intervene with a student who might be contemplating suicide. Systems using algorithms powered by machine learning trawl the Facebook posts of fifteen–year–olds and weed through the Twitter feeds of seventeen–year–olds. When certain keywords or features are flagged, the posts are forwarded to school administrators, who can decide whether the post requires an intervention and whether the student requires discipline. Who (or what) decides what these keywords are? What protections are given to the massive amounts of student data these third parties are collecting? Do parents and students even realize such online surveillance is happening? // Too often, the answers to these questions are unclear. This Article explores the legal and policy questions related to this new era of surveillance, which is fueled by machine learning. Although this technology is relatively new to schools, it has been used for decades now in the criminal justice system, which has embraced sentencing algorithms and predictive policing. As is true with so many things in the criminal justice system, there is evidence that these technologies have had a disproportionate impact on people of color. In much the same way, evidence is emerging that the online monitoring of students is having a disproportionate impact on students of color. Despite having an aura of neutrality, at each stage in the machine learning process, there is a possibility for bias to creep in. | LINK1 | LINK2 | LINK3 | https://scholars.law.unlv.edu/nlj/vol20/iss2/4/ | https://scholars.law.unlv.edu/cgi/viewcontent.cgi?article=1813&context=nlj | https://drive.google.com/file/d/1GBmsouIAxCVENu-XOWswA6UHGOlRUGlF/view?usp=sharing | https://scholars.law.unlv.edu/nlj/vol20/iss2/4/ | FPF Privacy Papers Award | https://www.linkedin.com/pulse/11th-annual-privacy-papers-policymakers-award-jules-polonetsky/ | Nevada Law Journal | Nevada Law Journal | BEST | |||||||||||||||||||||||
Too Smart | 2020 | Too Smart: How Digital Capitalism is Extracting Data, Controlling Our Lives, and Taking Ove r the World | Jathan Sadowski | Book | AI | Who benefits from smart technology? Whose interests are served when we trade our personal data for convenience and connectivity? Smart technology is everywhere: smart umbrellas that light up when rain is in the forecast; smart cars that relieve drivers of the drudgery of driving; smart toothbrushes that send your dental hygiene details to the cloud. Nothing is safe from smartification. In Too Smart, Jathan Sadowski looks at the proliferation of smart stuff in our lives and asks whether the tradeoff—exchanging our personal data for convenience and connectivity—is worth it. Who benefits from smart technology? Sadowski explains how data, once the purview of researchers and policy wonks, has become a form of capital. Smart technology, he argues, is driven by the dual imperatives of digital capitalism: extracting data from, and expanding control over, everything and everybody. He looks at three domains colonized by smart technologies' collection and control systems: the smart self, the smart home, and the smart city. The smart self involves more than self-tracking of steps walked and calories burned; it raises questions about what others do with our data and how they direct our behavior—whether or not we want them to. The smart home collects data about our habits that offer business a window into our domestic spaces. And the smart city, where these systems have space to grow, offers military-grade surveillance capabilities to local authorities. | https://www.amazon.com/Too-Smart-Capitalism-Extracting-Controlling/dp/026253858X | Amazon | GR | https://www.goodreads.com/book/show/52052188-too-smart | LINK1 | https://books.google.com/books/about/Too_Smart.html?id=_y5RzQEACAAJ | https://www.amazon.com/Too-Smart-Capitalism-Extracting-Controlling/dp/026253858X | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||
Tools and Weapons | 2019 | Tools and Weapons: The Promise and the Peril of the Digital Age | Brad Smith, Carol Ann Browne, Bill Gates - foreword | Book/Audio | In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort. | https://www.amazon.com/gp/product/1984877712 | Amazon | AUD | https://www.audible.com/pd/Tools-and-Weapons-Audiobook/0593107527?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=5XK9YMC6RE0NK0KC02HA | https://www.amazon.com/gp/product/1984877712 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Brad Smith, Carol Ann Browne | 671 | BEST | ||||||||||||||||||||||||||
Tort Law vs. Privacy | 2014 | Tort Law vs. Privacy | Eugene Volokh | Law Journal | Torts | Tort law is often seen as a tool for protecting privacy. But tort law can also diminish privacy, by pressuring defendants to disclose sensitive information, to gather such information, and to install comprehensive surveillance. And such pressure is growing, as technology makes surveillance and other information gathering more cost-effective and thus more likely to be seen as part of defendants’ obligation of “reasonable care.” Moreover, these tort law rules can increase government surveillance power as well as demanding greater surveillance by private entities. Among other things, the NSA PRISM story shows how easily a surveillance database in private hands can become a surveillance database in government hands. | LINK1 | LINK2 | LINK3 | https://columbialawreview.org/wp-content/uploads/2016/04/May-2014-7-Article-Volokh.pdf | https://drive.google.com/file/d/1Cb4eOmiN7eLHCf-GjOoT4zdoksBY5KJl/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2359287 | https://columbialawreview.org/wp-content/uploads/2016/04/May-2014-7-Article-Volokh.pdf | Privacy Stan | https://twitter.com/Privacy_Stan | Columbia Law Review | Columbia Law Review | BEST | |||||||||||||||||||||||
Track Down | 2000 | Track Down | Joe Chappelle | Movie | Biography, Crime, Drama | This 2000 movie is based on the nonfiction book Takedown by security expert Tsutomu Shimomura, who wrote it with journalist John Markoff. Both men were involved in the FBI's chase to catch hacker Kevin Mitnick in the 1990s. Watch the movie knowing that it's shrouded in controversy and is refuted by the book The Fugitive Game: Online with Kevin Mitnick, by Jonathan Littman. Draw your own conclusions, but the Mitnick case remains one of the more high-profile and controversial cases in the history of computing, and security pros should inform themselves of both sides. As a sequel, Mitnick has for several years been on the right side of the law, consulting for Fortune 500 companies and now working as chief hacking officer for the security awareness company KnowBe4. | https://www.amazon.com/Track-Down-Lionsgate/dp/B00G3NC7BI | Amazon | LINK1 | LINK2 | https://en.wikipedia.org/wiki/Track_Down | https://www.imdb.com/title/tt0159784/ | https://www.amazon.com/Track-Down-Lionsgate/dp/B00G3NC7BI | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334207 | BEST | |||||||||||||||||||||||||
Transborder Data Flow Regulation and Data Privacy Law | 2013 | Transborder Data Flow Regulation and Data Privacy Law | Christopher Kuner | Book | https://www.amazon.com/Transborder-Data-Flow-Regulation-Privacy/dp/0199674612 | Amazon | LINK1 | LINK2 | LINK3 | https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199674619.001.0001/acprof-9780199674619 | https://www.researchgate.net/publication/259994485_Transborder_Data_Flows_and_Data_Privacy_Law | https://books.google.com/books/about/Transborder_Data_Flows_and_Data_Privacy.html?id=YgHpMgEACAAJ | https://www.amazon.com/Transborder-Data-Flow-Regulation-Privacy/dp/0199674612 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
Transferring Personal Data in Asia | 2020 | Transferring Personal Data in Asia: A path to legal certainty and regional convergence | Clarisse Girot | Law Journal | Dat Transfers, Asia | LINK1 | LINK2 | https://abli.asia/NEWS-EVENTS/Whats-New/ID/159 | https://info.sal.org.sg/abli/ebooks/privacy/ | https://abli.asia/NEWS-EVENTS/Whats-New/ID/159 | FPF Privacy Papers Award | https://www.linkedin.com/pulse/11th-annual-privacy-papers-policymakers-award-jules-polonetsky/ | Singapore Academy of Law | Singapore Academy of Law | BEST | ||||||||||||||||||||||||||
Transparent Society | 1988 | The Transparent Society | David Brin | Book | x | Forecasts social transparency and some degree of erosion of privacy, as it is overtaken by low-cost surveillance, communication and database technology, and proposes new institutions and practices that he believes would provide benefits that would more than compensate for lost privacy | https://www.amazon.com/Transparent-Society-Technology-Between-Privacy/dp/0738201448 | Amazon | GR | https://www.goodreads.com/book/show/96477.The_Transparent_Society | LINK1 | LINK2 | https://en.wikipedia.org/wiki/The_Transparent_Society | https://www.davidbrin.com/transparentsociety.html | https://www.amazon.com/Transparent-Society-Technology-Between-Privacy/dp/0738201448 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||
True Enough | 2008 | True Enough: Learning to Live in a Post-Fact Society | Farhad Manjoo | Book/Audio | Disinformation | Why has punditry lately overtaken news? Why do lies seem to linger so long in the cultural subconscious even after they’ve been thoroughly discredited? And why, when more people than ever before are documenting the truth with laptops and digital cameras, does fact-free spin and propaganda seem to work so well? True Enough explores leading controversies of national politics, foreign affairs, science, and business, explaining how Americans have begun to organize themselves into echo chambers that harbor diametrically different facts—not merely opinions—from those of the larger culture | https://www.amazon.com/True-Enough-Learning-Post-Fact-Society/dp/1620458403 | Amazon | GR | https://www.goodreads.com/book/show/3034994-true-enough?from_search=true&from_srp=true&qid=7YqRCueVbe&rank=1 | AUD | https://www.audible.com/pd/True-Enough-Audiobook/B002V57R80?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/True-Enough-Learning-Post-Fact-Society/dp/1620458403 | Privacy Stan | https://twitter.com/Privacy_Stan | Ray Porter | 441 | 0470050101 (ISBN13: 9780470050101) | 3.75 · Rating details · 678 ratings · 138 reviews | Hardcover, 250 pages | Published March 1st 2008 by Wiley (first published January 1st 2008) | Wiley | 1-Mar-2008 | first published January 1st 2008 | BEST | ||||||||||||||||
Truman Show | 1998 | The Truman Show | Peter Weir | Movie | Fiction | x | In The Truman Show, Jim Carrey stars as a man who grows up in a fictional world built to chronicle his life on a TV show. The movie cleverly shows scenes as they are caught on the various hidden cameras throughout the little town Truman inhabits. The movie shows how the producers manipulate so-called “real life,” and it demonstrates the consequences of reality TV run amok. As with Enemy of the State, the lessons from The Truman Show appear not to have been learned. The only flaw is that Truman’s life is built to be rather dull. These days, his show would be lesser-rated fare on the Bravo channel. | https://www.amazon.com/Truman-Show-Jim-Carrey/dp/B002SGYPS2 | Amazon | LINK1 | LINK2 | LINK3 | https://en.wikipedia.org/wiki/The_Truman_Show | https://www.imdb.com/title/tt0120382/ | https://www.amazon.com/gp/product/B00AEBB8BK | https://www.amazon.com/Truman-Show-Jim-Carrey/dp/B002SGYPS2 | Solove Films | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | Paramount Pictures | Paramount Pictures | BEST | ||||||||||||||||||||
Turning Point | 2020 | Turning Point: Policymaking in the Era of Artificial Intelligence | Darrell M. West, John R. Allen | Book | AI | Artificial Intelligence is here, today. How can society make the best use of it? Until recently, “artificial intelligence” sounded like something out of science fiction. But the technology of artificial intelligence, AI, is becoming increasingly common, from self-driving cars to e-commerce algorithms that seem to know what you want to buy before you do. Throughout the economy and many aspects of daily life, artificial intelligence has become the transformative technology of our time. Despite its current and potential benefits, AI is little understood by the larger public and widely feared. The rapid growth of artificial intelligence has given rise to concerns that hidden technology will create a dystopian world of increased income inequality, a total lack of privacy, and perhaps a broad threat to humanity itself. In their compelling and readable book, two experts at Brookings discuss both the opportunities and risks posed by artificial intelligence—and how near-term policy decisions could determine whether the technology leads to utopia or dystopia. Drawing on in-depth studies of major uses of AI, the authors detail how the technology actually works. They outline a policy and governance blueprint for gaining the benefits of artificial intelligence while minimizing its potential downsides. | https://www.amazon.com/Turning-Point-Policymaking-Artificial-Intelligence-ebook/dp/B084P8F951 | Amazon | GR | https://www.goodreads.com/book/show/51458063-turning-point | LINK1 | https://www.brookings.edu/book/turning-point/ | https://www.amazon.com/Turning-Point-Policymaking-Artificial-Intelligence-ebook/dp/B084P8F951 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||
Twenty-Six Words That Created the Internet | 2019 | The Twenty-Six Words That Created the Internet | Jeff Kosseff | $10 | Book/Audio | "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider." Did you know that these twenty-six words are responsible for much of America's multibillion-dollar online industry? What we can and cannot write, say, and do online is based on just one law―a law that protects online services from lawsuits based on user content. Jeff Kosseff exposes the workings of Section 230 of the Communications Decency Act, which has lived mostly in the shadows since its enshrinement in 1996. Because many segments of American society now exist largely online, Kosseff argues that we need to understand and pay attention to what Section 230 really means and how it affects what we like, share, and comment upon every day. The Twenty-Six Words That Created the Internet tells the story of the institutions that flourished as a result of this powerful statute. It introduces us to those who created the law, those who advocated for it, and those involved in some of the most prominent cases decided under the law. Kosseff assesses the law that has facilitated freedom of online speech, trolling, and much more. His keen eye for the law, combined with his background as an award-winning journalist, demystifies a statute that affects all our lives –for good and for ill. While Section 230 may be imperfect and in need of refinement, Kosseff maintains that it is necessary to foster free speech and innovation. For filings from many of the cases discussed in the book and updates about Section 230, visit jeffkosseff.com | https://www.amazon.com/gp/product/1501714414 | Amazon | LINK1 | LINK2 | https://www.cornellpress.cornell.edu/book/9781501714412/the-twenty-six-words-that-created-the-internet/ | https://www.jeffkosseff.com/home | AUD | https://www.audible.com/pd/The-Twenty-Six-Words-That-Created-the-Internet-Audiobook/B07VV762WY?ref=a_library_t_c5_libItem_&pf_rd_p=85df3330-9dc4-4a45-ae69-93cc2fc25ca4&pf_rd_r=VMJY3WPMXH3MD4B9W1W0 | https://www.amazon.com/gp/product/1501714414 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | Douglas R Pratt | 759 | BEST | |||||||||||||||||||||
U.S. Private-Sector Privacy | 2018 | U.S. Private-Sector Privacy, Third Edition | Peter P. Swire, DeBrae Kennedy-Mayo | Book | Textbook | An indispensable guidepost for those working in the constantly changing privacy landscape. Peter Swire and DeBrae Kennedy-Mayo provide thoughtful analysis of U.S. laws and regulations and the technological and social developments that influence them. Covering the medical, financial, educational, telecommunications and marketing sectors, as well as enforcement, data breach and incident management, online activities, and privacy issues in investigations and litigation, U.S. Private Sector Privacy is a comprehensive resource encompassing the essentials of privacy practice. | GR | https://www.goodreads.com/book/show/48497383-u-s-private-sector-privacy | LINK1 | LINK2 | https://iapp.org/resources/article/u-s-private-sector-privacy-third-edition/ | https://peterswire.net/books/ | https://www.goodreads.com/book/show/48497383-u-s-private-sector-privacy | CIPP/US IAPP Auth Resources | https://iapp.org/media/pdf/certification/CIPP_US%20Authoritative%20Resource%20%203.2.2.pdf | 0998322369 (ISBN13: 9780998322360) | · Rating details · 42 ratings · 6 reviews | Published 2018 by IAPP (first published January 1st 2012) | IAPP | 10-Jul-1905 | first published January 1st 2012 | BEST | |||||||||||||||||||
Unauthorized Access | 2013 | Unauthorized Access: The Crisis in Online Privacy and Security | Robert H. Sloan & Richard Warner | Book | x | https://www.amazon.com/Unauthorized-Access-Crisis-Privacy-Security-ebook/dp/B00GM0DLYE | Amazon | LINK1 | https://books.google.com/books/about/Unauthorized_Access.html?id=-GsBwgEACAAJ | https://www.amazon.com/Unauthorized-Access-Crisis-Privacy-Security-ebook/dp/B00GM0DLYE | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||||
Under Surveillance | 2017 | Under Surveillance: Being Watched in Modern America | Randolph Lewis | Book | Never before has so much been known about so many. CCTV cameras, TSA scanners, NSA databases, big data marketers, predator drones, "stop and frisk" tactics, Facebook algorithms, hidden spyware, and even old-fashioned nosy neighbors--surveillance has become so ubiquitous that we take its presence for granted. While many types of surveillance are pitched as ways to make us safer, almost no one has examined the unintended consequences of living under constant scrutiny and how it changes the way we think and feel about the world. In Under Surveillance, Randolph Lewis offers a highly original look at the emotional, ethical, and aesthetic challenges of living with surveillance in America since 9/11. Taking a broad and humanistic approach, Lewis explores the growth of surveillance in surprising places, such as childhood and nature. He traces the rise of businesses designed to provide surveillance and security, including those that cater to the Bible Belt's houses of worship. And he peers into the dark side of playful surveillance, such as eBay's online guide to "Fun with Surveillance Gadgets." A worried but ultimately genial guide to this landscape, Lewis helps us see the hidden costs of living in a "control society" in which surveillance is deemed essential to governance and business alike. Written accessibly for a general audience, Under Surveillance prompts us to think deeply about what Lewis calls "the soft tissue damage" inflicted by the culture of surveillance. | https://www.amazon.com/Under-Surveillance-Watched-Modern-America/dp/1477312439 | Amazon | https://www.amazon.com/Under-Surveillance-Watched-Modern-America/dp/1477312439 | NYPL | https://www.nypl.org/blog/2019/10/23/privacy-essential-reading-list | BEST | ||||||||||||||||||||||||||||||
Understanding Privacy | 2008 | Understanding Privacy | Daniel J. Solove | Book | https://www.amazon.com/Understanding-Privacy-Daniel-J-Solove/dp/0674035070 | Amazon | LINK1 | LINK2 | LINK3 | https://www.danielsolove.com/understanding-privacy/ | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 | https://drive.google.com/file/d/1FOGskaU0xSdV-RJAW7_13yr4uQXiHLFs/view?usp=sharing | https://www.amazon.com/Understanding-Privacy-Daniel-J-Solove/dp/0674035070 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
Uneasy Access | 1988 | Uneasy Access: Privacy for Women in a Free Society | Anita Allen | Book | https://www.amazon.com/Uneasy-Access-Feminist-Perspectives-1988-06-28/dp/B01K96HF48 | Amazon | GR | https://www.goodreads.com/book/show/4267545-uneasy-access | LINK1 | https://books.google.com/books/about/Uneasy_Access.html?id=GCZQoqfCH4YC | https://www.amazon.com/Uneasy-Access-Feminist-Perspectives-1988-06-28/dp/B01K96HF48 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
Unpopular privacy | 2011 | Unpopular Privacy: What Must We Hide? | Anita Allen | Book | https://www.amazon.com/Unpopular-Privacy-Studies-Feminist-Philosophy/dp/0195141377 | Amazon | GR | https://www.goodreads.com/book/show/6919092-unpopular-privacy | LINK1 | LINK2 | https://books.google.com/books/about/Unpopular_Privacy.html?id=fxYhR6hqc3QC | https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780195141375.001.0001/acprof-9780195141375 | https://www.amazon.com/Unpopular-Privacy-Studies-Feminist-Philosophy/dp/0195141377 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
Unwanted Gaze | 2000 | The Unwanted Gaze: The Destruction of Privacy in America | Jeffrey Rosen | Book | https://www.amazon.com/Unwanted-Gaze-Destruction-Privacy-America/dp/0679765204 | Amazon | GR | https://www.goodreads.com/book/show/454251.The_Unwanted_Gaze | LINK1 | LINK2 | https://www.penguinrandomhouse.com/books/157389/the-unwanted-gaze-by-jeffrey-rosen/ | https://www.researchgate.net/publication/248052741_The_UnWanted_Gaze_The_Destruction_of_Privacy_in_America | https://www.amazon.com/Unwanted-Gaze-Destruction-Privacy-America/dp/0679765204 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||
V for Vendetta | 2005 | V for Vendetta | James McTeigue | Movie | Action, Drama, Sci-Fi | In a future British tyranny, a shadowy freedom fighter, known only by the alias of "V", plots to overthrow it with the help of a young woman. | https://www.amazon.com/V-Vendetta-Natalie-Portman/dp/B000HVHM5S | Amazon | LINK1 | LINK2 | LINK3 | https://www.imdb.com/title/tt0434409/ | https://www.amazon.com/V-Vendetta-Widescreen-Andy-Wachowski/dp/B000FS9FCG | https://en.wikipedia.org/wiki/V_for_Vendetta_(film) | https://www.amazon.com/V-Vendetta-Natalie-Portman/dp/B000HVHM5S | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||
Verizon DBIR | 2019 | Verizon Data Breach Investigations Report [Yearly] | Verizon | Research/Report | Data Breach | x | industry-leading data, information and processes | LINK1 | LINK2 | LINK3 | https://enterprise.verizon.com/resources/reports/dbir/ | https://drive.google.com/file/d/1DlLtsiRLKQtKZoG-q2otbUgJxyTml1Ev/view?usp=sharing | https://drive.google.com/file/d/1Sbmd1xzl_jRGtnm5xxRy1u9iJMof4fYr/view?usp=sharing | https://enterprise.verizon.com/resources/reports/dbir/ | Privacy Stan | https://twitter.com/Privacy_Stan | Verizon | Verizon | BEST | ||||||||||||||||||||||
Visions of Privacy | 2020 | Visions of Privacy | IAPP | Research/Report | Predictions | This 20th anniversary publication, “Visions of Privacy,” is a future-looking anthology of contributions from privacy thought-leaders from around the world. We asked these leading voices to take a moment for reflection on the last 20 years of privacy — to pause and think deeply about the future of privacy. We are excited to provide you with these incredible reflections on how far we have come as a profession over the past two decades and what the future might hold. | LINK1 | LINK2 | https://iapp.org/resources/article/iapp-visions-of-privacy/ | https://drive.google.com/file/d/1D_B6KFeoKzNh01bdj6-KXPGQwefAtanO/view?usp=sharing | https://iapp.org/resources/article/iapp-visions-of-privacy/ | Privacy Stan | https://twitter.com/Privacy_Stan | IAPP | IAPP | BEST | |||||||||||||||||||||||||
War on Privacy | 2006 | War on Privacy | Jacqueline Klosek | Book | https://www.amazon.com/War-Privacy-Jacqueline-Klosek/dp/0275988910 | Amazon | GR | https://www.goodreads.com/book/show/3241697-the-war-on-privacy | LINK1 | https://books.google.com/books?id=a3RP3LW6ZcwC&printsec=frontcover&source=gbs_atb#v=onepage&q&f=false | https://www.amazon.com/War-Privacy-Jacqueline-Klosek/dp/0275988910 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||
WarGames | 1983 | WarGames | John Badham (Director) | Movie | Fiction | x | The smash-hit deserves a day off to get a well-deserved appreciation when watched. The movie features Matthew Broderick hacking a military database that activates a nuclear arsenal of the USA that raises a few red flags for the nation. The movie is the first mass-consumed movie of that decade as a visual representation of the side effects of the internet. It takes the web as a framework and vehicle for the USA’s earliest emergence of technology. Media has focused on a real-life war games scenario after the wakeup call from the movie. The movie’s high tech hacking and military security concerns led the U.S. federal government to create an internet policy for the first time as the Computer Fraud and Abuse Act of 1984. As the movie pictures a scene showing a computer dialing system to lead a term as War Dialing, an advanced technique was introduced to scan a list of phone numbers and drive a broadcast call to every number as Demon Driving or Demon Dialing. | https://www.amazon.com/WarGames-Matthew-Broderick/dp/B0011EQBOS | Amazon | LINK1 | LINK2 | LINK3 | https://www.youtube.com/watch?v=z_3rGDqSil4 | https://www.imdb.com/title/tt0086567/ | https://www.amazon.com/gp/product/0792838467 | https://www.amazon.com/WarGames-Matthew-Broderick/dp/B0011EQBOS | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | 20th Century Fox | 20th Century Fox | BEST | ||||||||||||||||||||
Watchers | 2010 | The Watchers: The Rise of America’s Surveillance State | Shane Harris | Book | x | https://www.amazon.com/Watchers-Rise-Americas-Surveillance-State/dp/0143118900 | Amazon | GR | https://www.goodreads.com/book/show/7054128-the-watchers | LINK1 | LINK2 | https://www.cato.org/events/watchers-rise-americas-surveillance-state | https://books.google.com/books/about/The_Watchers.html?id=EbIVSwAACAAJ | https://www.amazon.com/Watchers-Rise-Americas-Surveillance-State/dp/0143118900 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||
Watchman in Pieces | 2013 | The Watchman in Pieces: Surveillance, Literature, and Liberal Personhood | David Rosen and Aaron Santesso | Book | x | https://www.amazon.com/Watchman-Pieces-Surveillance-Literature-Personhood/dp/0300155417 | Amazon | LINK1 | LINK2 | https://yalebooks.yale.edu/book/9780300155419/watchman-pieces | https://www.jstor.org/stable/j.ctt32bwhr | https://www.amazon.com/Watchman-Pieces-Surveillance-Literature-Personhood/dp/0300155417 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | ||||||||||||||||||||||||||
We Are Data | 2017 | We Are Data: Algorithms and The Making of Our Digital Selves | John Cheney-Lippold | Book | https://www.amazon.com/gp/product/1479857599 | Amazon | https://www.amazon.com/gp/product/1479857599 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST | |||||||||||||||||||||||||||||||
We Are Legion | 2012 | We Are Legion: The Story of the Hacktivists | Brian Knappenberger (Director) | Movie | Documentary | x | Those who are interested in the deep dark web—and conspiracy theories—may have heard of Anonymous, the decentralized international group of hackers known for their attacks against government and corporate institutions. This has led to their reputation as leading hacktivists (hacker activists) who randomly appear when they perceive threats to the cyber freedom or data privacy of regular citizens. “We Are Legion: The Story of the Hacktivists” introduces their operations, history, beliefs and motivations behind some of their movements. Fun fact: Anonymous was reported to have resurfaced recently to help seek retribution for George Floyd’s death. | LINK1 | LINK2 | https://www.imdb.com/title/tt2177843/ | https://www.youtube.com/watch?v=-zwDhoXpk90 | https://www.imdb.com/title/tt2177843/ | Nolisoli | https://nolisoli.ph/81744/7-films-on-data-privacy-ymagcamit-20200610/ | BEST | ||||||||||||||||||||||||||
We Have Been Harmonized | 2020 | We Have Been Harmonized: Life in China's Surveillance State | Kai Strittmatter | Book/Audio | https://www.amazon.com/We-Have-Been-Harmonized-Surveillance/dp/0063027291 | Amazon | GR | https://www.goodreads.com/book/show/49203415-we-have-been-harmonized | AUD | https://www.audible.com/pd/We-Have-Been-Harmonized-Audiobook/0063027321 | https://www.amazon.com/We-Have-Been-Harmonized-Surveillance/dp/0063027291 | Dominga Leone CIPP/E CIPM | https://www.linkedin.com/in/dlcipm/ | BEST | |||||||||||||||||||||||||||
Weapons of Math Destruction | 2016 | Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy | Cathy O'Neil | Book | https://www.amazon.com/Weapons-Math-Destruction-Increases-Inequality/dp/0553418815 | Amazon | GR | https://www.goodreads.com/book/show/28186015-weapons-of-math-destruction | https://www.amazon.com/Weapons-Math-Destruction-Increases-Inequality/dp/0553418815 | Privacy Stan | https://twitter.com/Privacy_Stan | BEST | |||||||||||||||||||||||||||||
Web Privacy in RTB Systems | 2019 | Web Privacy Measurement in Real-Time Bidding Systems. A Graph-Based Approach to RTB System Classification | Rob van Eijk | Research/Report | AdTech | Web Privacy Measurement (WPM) has been established as an academic research field since 2012. WPM scholars observe websites and services to detect, characterize, and quantify privacy impacting behaviors. The main goal of the research field is to increase transparency through measurement. In the doctoral thesis, Robbert J. van Eijk investigates the advertisements online that seem to follow you. The technology enabling the advertisements is called Real-Time Bidding (RTB). An RTB system is defined as a network of partners enabling big data applications within the organizational field of marketing. The system aims to improve sales by real-time data-driven marketing and personalized (behavioral) advertising. The author applies network science algorithms to arrive at measuring the privacy component of RTB. In the thesis, it is shown that cluster-edge betweenness and node betweenness support us in understanding the partnerships of the ad-technology companies. From our research it transpires that the interconnection between partners in an RTB network is caused by the data flows of the companies themselves due to their specializations in ad technology. Furthermore, the author provides that a Graph-Based Methodological Approach (GBMA) controls the situation of differences in consent implementations in European countries. The GBMA is tested on a dataset of national and regional European news websites. | LINK1 | LINK2 | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3319284 | https://drive.google.com/file/d/1Ddt3DPSF6r7CRlp6PqMbv1F2Nmg_sOXJ/view?usp=sharing | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3319284 | Privacy Stan | https://twitter.com/Privacy_Stan | Leiden Law School | Leiden Law School | BEST | |||||||||||||||||||||||||
Who Am I | 2014 | Who Am I: No System Is Safe | Baran bo Odar | Movie | Crime, Drama, Mystery | The main lesson of German hacker movie Who Am I: No System is Safe has to be the most basic security lesson of all: Human beings are the weak link. A review in INQPOP! compares this movie to Mr. Robot in that it sheds light on the hacker's world and uses masks as props to incite terror and fear and create a palpable sense of the creepy. If you can hack the English subtitles, this one's a coming-of-age movie for the hacker generation. | LINK1 | LINK2 | https://en.wikipedia.org/wiki/Who_Am_I_(2014_film) | https://www.imdb.com/title/tt3042408/ | https://en.wikipedia.org/wiki/Who_Am_I_(2014_film) | Dark Reading | https://www.darkreading.com/analytics/10-movies-all-security-pros-should-watch/d/d-id/1334208 | BEST | |||||||||||||||||||||||||||
Windows into the Soul | 2016 | Windows into the Soul: Surveillance and Society in an Age of High Technology | Gary T. Marx | Book | Politics & Social Sciences > Politics & Government | x | https://www.amazon.com/gp/product/022628588X | Amazon | https://www.amazon.com/gp/product/022628588X | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | 4.7 | Cover | BEST | |||||||||||||||||||||||||||
Wool | 2011 | Wool Series | Hugh Howey | Book | Fiction | https://www.amazon.com/gp/product/1476733953 | Amazon | https://www.amazon.com/gp/product/1476733953 | Solove Fiction | https://teachprivacy.com/great-fictional-works-about-privacy-and-security/ | BEST | ||||||||||||||||||||||||||||||
Your Evil Twin | 2004 | Your Evil Twin: Behind the Identity Theft Epidemic | Bob Sullivan | Book | https://www.amazon.com/Your-Evil-Twin-Identity-Epidemic/dp/0471648108 | Amazon | GR | https://www.goodreads.com/book/show/1067787.Your_Evil_Twin | LINK1 | https://www.wiley.com/en-us/Your+Evil+Twin%3A+Behind+the+Identity+Theft+Epidemic-p-9780471679714 | https://www.amazon.com/Your-Evil-Twin-Identity-Epidemic/dp/0471648108 | PricSec Acad NonFict | https://www.privacysecurityacademy.com/non-fiction-privacy-security-books/ | BEST |