Privacy Library: Books

◈ Last edit: Mar 14, 2021
◈ 298 Privacy-related Books
◈ Textbooks, Research, & Fiction

Privacy Library Logo

Unique data. Hand-curated.

Visit the live Privacy Library spreadsheet. Includes 428 Books, PDFs, Movies, and Web Resources.

Submit your suggestions to the Library. If accepted, we will add the resource to the database along with your attribution.

Privacy Library: Books

Short TitleYearAuthor(s)FormatContentTagSurveilInfosecAmazonGoodReadLINK 1LINK 2LINK 3AudibleSourcePublisherRatingVotesImagePages
198419491984George Orwell$7Book/AudioFiction: Literature & Fiction > Genre Fictionxa classic literary example of political and dystopian fiction. Many terms used in the novel have entered common usage, including Big Brother, doublethink, thoughtcrime, Newspeak, Room 101, telescreen, 2 + 2 = 5, prole, and memory hole. Nineteen Eighty-Four also popularised the adjective "Orwellian", connoting things such as official deception, secret surveillance, brazenly misleading terminology, and manipulation of recorded history by a totalitarian or authoritarian state. Stan Prebble6829780451524935,978-04515249354.732407
2020 California Consumer Privacy Act (CCPA) Definitive Guide2019The 2020 California Consumer Privacy Act (CCPA) Definitive Guide: An Applied Solution Using NIST 800-171Mark A. Russo$35BookLaw > BusinessCCPAxIn this edition we have included information and changes affecting businesses attempting to meet the current CCPA deadlines. The author has included an additional chapter on current 2019-2020 amendments, and provides a plain-English interpretation for the reader. Understanding what the CCPA is and how to effectively apply the NIST 800-171 Security Framework is the approach of this how-to guide. The 2020 California Consumer Privacy Act (CCPA) Guide designed to provide clear direction and understanding of how to implement the CCPA either in a business, agency or organization. The CCPA provides provisions specific to California residents and the companies regarding the 2018 compulsory law to protect personal information statewide. While NIST 800-series cybersecurity publications tell a business “what” is required, they do not necessarily help in telling “how” to meet the 110 security control requirements in NIST 800-171. This book is also written to explain what the National Institute of Standards and Technology (NIST) 800-171 security controls require and how to meet them effectively for the purposes of CCPA compliance. And, will walk you and your IT staff through the security controls in enough detail to ensure a complete and "good faith" security effort has occurred.Mr. Russo is the former Chief Information Security Officer (CISO) for the Department of Education where he and his team were responsible for closing over 95% of the outstanding security findings identified by the House Oversight Committee in 2016 . He was also a Senior Information Security Engineer with the Department of Defense's (DOD) F-35 Joint Strike Fighter program. He has an extensive background in cybersecurity and is an expert in the Risk Management Framework (RMF) and DOD Instruction 8510 which implements RMF throughout the DOD and the federal government. He holds both a Certified Information Systems Security Professional (CISSP) certification and a CISSP in information security architecture (ISSAP). He holds a 2017 certification as a Chief Information Security Officer (CISO) from the National Defense University, Washington, DC. He retired from the US Army Reserves in 2012 as the Senior Intelligence Officer.He speaks regularly within the federal government and Intelligence Community on advanced topics regarding the evolution of cybersecurity in the 21st Century. IAPP Auth Resources, 978-1688805033Paperback : 283 pagesIndependently published (August 27, 2019)Independently published27-Aug-201943CoverBEST
99 Privacy Breaches to Beware of201899 Privacy Breaches to Beware of: Practical Data Protection Tips from Real-Life ExperiencesKevin Shepherdson, William Hioe, Lynn Boxall$15BookData protection laws are new in Singapore, Malaysia, Philippines, Indonesia and Thailand. In Europe, the General Data Protection Regulation (GDPR) ― a single law across all of EU – comes into force from May 2018. There are also strict laws in the US that govern the processing of personal data. / Over a hundred countries in the world have a comprehensive data protection law and it is very easy for individuals and companies to breach these laws. Data or privacy breaches are on the rise and businesses can be prosecuted under data protection laws. Fines for non-compliance can be from S$1 million in Singapore, up to three years jail in Malaysia, and up to 4% of global revenues for EU countries. / The focus on this book is operational compliance. The book is for everyone as all of us in the course of our daily work process personal data. Organised into sections, each idea provides practical advice and examples of how a breach of the law may happen. Examples cover HR, Finance, Admin, Marketing, etc, allowing the reader to relate to his or her own area of work IAPP Auth Resources pagesMarshall Cavendish International (Asia) Pte Ltd; 2nd EditionMarshall Cavendish International(Asia) Pte Ltd; 2nd EditionBEST
A Democratic Conception of Privacy2013A Democratic Conception of PrivacyAnnabelle LeverBookTextbooks > Humanities Acad NonFict,978-1491878385
A Scanner Darkly2006A Scanner DarklyRichard LinklaterMovieAction, Adventure, Drama, Fantasy, Science FictionxSet in suburban Orange County, California, in a future where America has lost the war on drugs, one reluctant undercover cop (Reeves) is ordered to start spying on his friends. Stan
Active Measures2020Active MeasuresThomas RidBook/AudioPolitics & Social Sciences > Politics & GovernmentDisinformation Stan Perkins8850374287260 (ISBN13: 9780374287269)4.25 · Rating details · 325 ratings · 41 reviewsHardcover, 528 pagesPublished April 21st 2020 by Farrar, Straus and GirouxFarrar, Straus and Giroux21-Apr-20204.5216
After Snowden2015After Snowden: Privacy, Secrecy, and Security in the Information AgeRonald Goldfarb (editor)BookPolitics & Social Sciences > Politics & Government Acad NonFict
Age of Surveillance Capitalism2019Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of PowerShoshana Zuboff$20Book/AudioxThe challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. / In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. / Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." / The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. / With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it. Acad NonFict Zanzarella14561610395697, 978-1610395694Hardcover : 704 pagesPublicAffairs; 1st edition (January 15, 2019)PublicAffairs15-Jan-20191st editionBEST
AI & Privacy2021AI & Privacy: How To Find BalancePunit Bhatia, Eline ChivotBookAIWe are going through a pandemic that is driving the world into a digital era. Automation and artificial intelligence (AI) are becoming standard practice for many organizations. At the same time, debates over the impact of AI on our daily lives have triggered an increased focus on the protection of individual privacy. The core objective of this book is to help you go beyond the debate and navigate the complexities of privacy and AI. This book is designed to assist you in learning ideas, principles, and frameworks about how to make decisions which balance privacy compliance and the use of AI systems. This book will answer the following questions: ✅ What are the common principles of privacy and AI? ✅ What frameworks are available for AI governance and development? ✅ How are challenging scenarios handled in a practical way? ✅ How are initiatives evaluated using an all-encompassing framework? ✅ What are the critical success factors for AI use? Stan
AI Superpowers2018AI Superpowers: China, Silicon Valley, And The New World OrderKai-Fu LeeBook/AudioComputers & Technology > Computer ScienceAIIn AI Superpowers, Kai-fu Lee argues powerfully that because of these unprecedented developments in AI, dramatic changes will be happening much sooner than many of us expected. Indeed, as the US-Sino AI competition begins to heat up, Lee urges the US and China to both accept and to embrace the great responsibilities that come with significant technological power. Most experts already say that AI will have a devastating impact on blue-collar jobs. But Lee predicts that Chinese and American AI will have a strong impact on white-collar jobs as well. Is universal basic income the solution? In Lee’s opinion, probably not. But he provides a clear description of which jobs will be affected and how soon, which jobs can be enhanced with AI, and most importantly, how we can provide solutions to some of the most profound changes in human history that are coming soon. Leone CIPP/E CIPM
Aisles Have Eyes2018The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your PowerJoseph TurowBookEngineering & Transportation > Engineering Acad NonFict
American Privacy2009American Privacy: The 400-Year History of Our Most Contested RightFrederick S. LaneBookTextbooks > HumanitiesAs America reacts to Edward Snowden’s leaks about NSA surveillance, American Privacy offers a timely look at our national experience with the right to privacy. Acad NonFict
An Artificial Revolution2020An Artificial Revolution: On Power, Politics and AIIvana BartolettiBookPolitics & Social Sciences > Politics & GovernmentAIPrivacy consultant and AI expert Ivana Bartoletti explores the urgent existential threat that artificial intelligence poses to international social justice When most people think about AI, they think about the future—from driverless cars and smart cities to HAL 9000 and the Terminator—and are unaware that AI is already creating a dystopian present. The third book in the Mood Indigo series argues that the rapid growth of the AI industry is threatening to undo decades of progress in human rights and global equality. AI has unparalleled transformative potential to reshape society, our economies and our working lives, but without legal scrutiny, international oversight and public debate, we are sleepwalking into a future written by algorithms which encode racist, sexist and classist biases into our daily lives. This book exposes the reality of the AI revolution, from the low-paid workers who toil to train algorithms to recognize cancerous polyps, to the rise of techno-racism and techno-chauvinism and the symbiotic relationship between AI and right wing populism. Leone CIPP/E CIPM
An Introduction to Privacy for Technology Professionals2020An Introduction to Privacy for Technology ProfessionalsTravis Breaux$75BookTextbookGR IAPP Auth Resources, 420 pagesPublished 2020 by International Association of Privacy ProfessionalsIAPP12-Jul-1905BEST
Antisocial Media2018Antisocial MediaSiva VaidhyanathanBook/AudioPolitics & Social Sciences > Social SciencesDisinformation Stan Garrett6200190841168 (ISBN13: 9780190841164)3.97 · Rating details · 398 ratings · 74 reviewsHardcover, 288 pagesPublished June 21st 2018 by Oxford University Press (first published May 15th 2018)Oxford University Press21-Jun-2018first published May 15th 20184.491
Architecture of Privacy2015The Architecture of PrivacyCourtney Bowman, Ari Gesher, John K Grant, Daniel Slate, & Elissa LernerBook Acad NonFict
Art of Invisibility2017The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big DataKevin Mitnick & Robert VamosiBook/AudioComputers & Technology > Networking & Cloud ComputingxBe online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility" -- online and real-world tactics to protect you and your family, using easy step-by-step instructions. / Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. / The world's most famous -- and formerly the US government's most wanted -- computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes; privacy is a power you deserve and need in the age of Big Brother and Big Data. Acad NonFict Porter5574.61119CoverBEST
Artificial Unintelligence2018Artificial Unintelligence: How Computers Misunderstand the WorldMeredith BroussardBookComputers & Technology > Computer Science Acad NonFict
Asian Data Privacy Laws2014Asian Data Privacy Laws: Trade and Human Rights PerspectivesGraham GreenleafBookComputers & Technology > History & Culture Acad NonFict,978-01996796694.8
Assault on Privacy1972The Assault on PrivacyArthur MillerBookLaw > Constitutional Law Acad NonFict
At Home2010At Home: A Short History of Private LifeBill BrysonBookArts & Photography > Architecture Acad NonFict
Attack Surface2020Attack SurfaceCory Doctorow $22BookFiction: Mystery, Thriller & Suspense > Thrillers & Suspense Stan,978-12507575314.5233
Attention Merchants2016The Attention Merchants: The Epic Scramble to Get Inside Our HeadsTiim WuBookBusiness & Money > Biography & HistoryAI, AttentionOurs is often called an information economy, but at a moment when access to information is virtually unlimited, our attention has become the ultimate commodity. In nearly every moment of our waking lives, we face a barrage of efforts to harvest our attention. This condition is not simply the byproduct of recent technological innovations but the result of more than a century’s growth and expansion in the industries that feed on human attention. Wu’s narrative begins in the nineteenth century, when Benjamin Day discovered he could get rich selling newspapers for a penny. Since then, every new medium – from radio to television to Internet companies such as Google and Facebook – has attained commercial viability and immense riches by turning itself into an advertising platform. Since the early days, the basic business model of “attention merchants” has never changed: free diversion in exchange for a moment of your time, sold in turn to the highest-bidding advertiser. Full of lively, unexpected storytelling and piercing insight, The Attention Merchants lays bare the true nature of a ubiquitous reality we can no longer afford to accept at face value. Leone CIPP/E CIPM
Automating Inequality2018Automating Inequality: How High-Tech Tools Profile, Police, and Punish the PoorVirginia EubanksBookPolitics & Social Sciences > Politics & Government Acad NonFict
BakerHostetler's Data Counsel Blog2020BakerHostetler's Data Counsel BlogBakerHostetlerWeb ResourceBlogCommentary Addressing Risks and Opportunities Through the Lifecycle of Data, Technology, Advertising and InnovationLINK1 Stan
Being Watched2017Being Watched: Legal Challenges to Government SurveillanceJeffrey L. VagleBookx Acad NonFict
Ben Franklin’s Web Site2004Ben Franklin’s Web Site: Privacy and Curiosity from Plymouth Rock to the InternetRobert Ellis SmithBookPolitics & Social Sciences > Politics & Government Acad NonFict
Between Truth and Power2019Between Truth and Power: The Legal Constructions of Informational CapitalismJulie E. CohenBookPolitics & Social Sciences > Politics & GovernmentOur current legal system is to a great extent the product of an earlier period of social and economic transformation. From the late nineteenth century through the mid-twentieth century, as accountability for industrial-age harms became a pervasive source of conflict, the U.S. legal system underwent profound, tectonic shifts. Today, struggles over ownership of information-age resources and accountability for information-age harms are producing new systemic changes. / In Between Truth and Power, Julie E. Cohen explores the relationships between legal institutions and political and economic transformation. Systematically examining struggles over the conditions of information flow and the design of information architectures and business models, she argues that as law is enlisted to help produce the profound economic and sociotechnical shifts that have accompanied the emergence of the informational economy, it is too is transforming in fundamental ways. Drawing on elements from legal theory, science and technology studies, information studies, communication studies and organization studies to develop a complex theory of institutional change, Cohen develops an account of the gradual emergence of legal institutions adapted to the information age and of the power relationships that such institutions reflect and reproduce. / A tour de force of ambitious interdisciplinary scholarship, Between Truth and Power will transform our thinking about the possible futures of law and legal institutions in the networked information era. Acad NonFict, 978-0190246693Hardcover : 376 pagesOxford University Press (October 1, 2019)Oxford University Press1-Oct-20194
Beyond Fear2006Beyond Fear: Thinking Sensibly About Security in an Uncertain WorldBruce SchneierBookTextbooks > Medicine & Health Sciences Acad NonFict
Beyond Snowden2017Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSATimothy H. EdgarBookPolitics & Social Sciences > Politics & Governmentx Stan
Big Data - FTC Report2016Big Data: A Tool for Inclusion or Exclusion?Federal Trade Commission PDFResearch/ReportBig DataThe report, Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues, looks specifically at big data at the end of its lifecycle – how it is used after being collected and analyzed, and draws on information from the FTC’s 2014 workshop, “Big Data: A Tool for Inclusion or Exclusion?,” as well as the Commission’s seminar on Alternative Scoring Products. The Commission also considered extensive public comments and additional public research in compiling the report. // The report highlights a number of innovative uses of big data that are providing benefits to underserved populations, including increased educational attainment, access to credit through non-traditional methods, specialized health care for underserved communities, and better access to employment. // In addition, the report looks at possible risks that could result from biases or inaccuracies about certain groups, including more individuals mistakenly denied opportunities based on the actions of others, exposing sensitive information, creating or reinforcing existing disparities, assisting in the targeting of vulnerable consumers for fraud, creating higher prices for goods and services in lower-income communities and weakening the effectiveness of consumer choice. // The report outlines some of the various laws that apply to the use of big data, especially in regards to possible issues of discrimination or exclusion, including the Fair Credit Reporting Act, FTC Act and equal opportunity laws. It also provides a range of questions for businesses to consider when they examine whether their big data programs comply with these laws. // The report also proposes four key policy questions that are drawn from research into the ways big data can both present and prevent harms. The policy questions are designed to help companies determine how best to maximize the benefit of their use of big data while limiting possible harms, by examining both practical questions of accuracy and built-in bias as well as whether the company’s use of big data raises ethical or fairness concerns.LINK1LINK2 Stan
Big Data and the Future of Privacy2021EPIC Big Data and the Future of PrivacyElectronic Privacy Information CenterWeb ResourceBig DataLINK1 Stan
Billy Budd1924Billy Budd, SailorHerman MelvilleBookFiction: Literature & Fiction > United States Fiction
Bird & Bird: Guide to the General Data Protection Regulation2020Bird & Bird: Guide to the General Data Protection RegulationBoardman, Ruth et al. PDFResearch/ReportGDPRThe General Data Protection Regulation (GDPR) is the latest version of Europe’s cornerstone data protection law. It took effect in May 2018, a marathon six and a half years after the European Commission’s original first draft was published following an unprecedented period of debate, negotiation and lobbying. This guide summarises that Regulation - a law which has significantly overhauled Europe’s data protection rules at a time when information systems and digital business underpin human life. As with the legislation which the GDPR replaced, many jurisdictions outside the European Union (EU) have followed concepts which it introduced. So understanding the GDPR and how it is enforced is important for businesses around the world.LINK1LINK2LINK3 IAPP Auth Resources & BirdBird & BirdBEST
Black Box Society2015The Black Box Society: The Secret Algorithms that Control Money and InformationFrank PasqualeBookComputers & Technology > History & Culture Acad NonFict
Black Code2013Black Code: Surveillance, Privacy, and the Dark Side of the InternetRonald J. DeibertBookComputers & Technology > Networking & Cloud Computingx Acad NonFict,978-07710253584.345CoverEnglish336BEST
Blackhat2015BlackhatMichael MannMovieAction, Crime, Thriller This Michael Mann movie, starring hunky Thor star Chris Hemsworth, may deserve the award for most critiqued movie, both from the hacking and science communities. Rain Capital's Wang points out that the hacker Hemsworth plays says he would need more than a month to crack a 512-bit encryption key. If it was public key encryption he was talking about, a good hacker in 2015 could have cracked that in a few hours, she says. CSO contributor Maria Korolov also details what the movie got right and wrong from a hacking perspective. And in Forbes, scientist James Conca takes the movie to task for getting all of the details about nuclear power plants wrong. Still, Blackhat shines a window into our frenetic, modern world where technology has taken over our lives – and poses some important questions about how potentially vulnerable industrial plants are to cyberattacks. Reading
Blockchain and the Law2018Blockchain and the Law: The Rule of CodePrimavera De Filippi and Aaron Wright$14BookComputers & Technology > Networking & Cloud Computing Acad NonFict
Blockchain Chicken Farm2020Blockchain Chicken Farm: And Other Stories of Tech in China's CountrysideXiaowei Wang$15BookReference > Writing, Research & Publishing GuidesAIIn Blockchain Chicken Farm, the technologist and writer Xiaowei Wang explores the political and social entanglements of technology in rural China. Their discoveries force them to challenge the standard idea that rural culture and people are backward, conservative, and intolerant. Instead, they find that rural China has not only adapted to rapid globalization but has actually innovated the technology we all use today. From pork farmers using AI to produce the perfect pig, to disruptive luxury counterfeits and the political intersections of e-commerce villages, Wang unravels the ties between globalization, technology, agriculture, and commerce in unprecedented fashion. Accompanied by humorous “Sinofuturist” recipes that frame meals as they transform under new technology, Blockchain Chicken Farm is an original and probing look into innovation, connectivity, and collaboration in the digitized rural world. Leone CIPP/E CIPM
Book of Anonymity2021Book of AnonymityAnon CollectiveBookAnonymity is highly contested, marking the limits of civil liberties and legality. Digital technologies of communication, identification, and surveillance put anonymity to the test. They challenge how anonymity can be achieved, and dismantled. Everyday digital practices and claims for transparency shape the ways in which anonymity is desired, done, and undone.The Book of Anonymity includes contributions by artists, anthropologists, sociologists, media scholars, and art historians. It features ethnographic research, conceptual work, and artistic practices conducted in France, Germany, India, Iran, Switzerland, the UK, and the US. From police to hacking cultures, from Bitcoin to sperm donation, from Yik-Yak to Amazon and IKEA, from DNA to Big Data — thirty essays address how the reconfiguration of anonymity transforms our concepts of privacy, property, self, kin, addiction, currency, and labor.The Book of Anonymity is written in the tradition of author-less texts. Editing and contributing anonymously constitute experiments in anonymity that speak to the aggressive valuation regimes shaping contemporary artistic and academic knowledge productions alike. This is not to discount the usefulness of attribution, but to trouble the ease with which labour is still dissected, measured and attached to the nexus of person, value and knowledge. To name, one contribution insists is to “define people, things, as individuals, to mark them, hold them, hierarchize them, to press them into service and turn them into value.” Another contribution advocates and questions if an ethics of anonymity can engender the kind of care that individualised practices arguably strive for yet undermine. Not all contributions speak to such concerns directly but all consider what is at stake in the im/possibilities of anonymous expression, at a time of thick digital traces. Editing and contributing anonymously thus is a practical commitment to one of the red threads that criss-cross the kaleidoscopic accounts presented in this book. Stan Books (March 2, 2021),204,203,200_.jpgBEST
Born Digital2010Born Digital: Understanding the First GenerationJohn PalfreyBookScience & Math > Technology Acad NonFict
Brave New World1932Brave New WorldAldous HuxleyBookFiction: Literature & Fiction > United States Fiction
BSI Home2020Topics: BSI Home for Industry Reports, Research, Blogs and NewsBSIWeb ResourceLINK1 IAPP Auth Resources British Standards Institution. 2020.The British Standards Institution12-Jul-1905BEST
Building an Anonymization Pipeline2020Building an Anonymization Pipeline: Creating Safe DataLuk Arbuckle, Khaled El EmamBookBusiness & Money > Business CultureAnonymizationHow can you use data in a way that protects individual privacy but still provides useful and meaningful analytics? With this practical book, data architects and engineers will learn how to establish and integrate secure, repeatable anonymization processes into their data flows and analytics in a sustainable manner. / Luk Arbuckle and Khaled El Emam from Privacy Analytics explore end-to-end solutions for anonymizing device and IoT data, based on collection models and use cases that address real business needs. These examples come from some of the most demanding data environments, such as healthcare, using approaches that have withstood the test of time. Stan
Bulk Collection2017Bulk Collection: Systematic Government Access to Private-Sector DataFred H. Cate & James X. Dempsey editorsBookLaw > Businessx Acad NonFict
Byte Back2021Byte Back: Husch Blackwell’s Data Privacy and Cybersecurity Legal ResourceHusch BlackwellWeb ResourceBlogxHusch Blackwell’s Data Privacy, Security and Breach Response team helps clients navigate complex statutes and regulations surrounding privacy and information security. With deep subject matter expertise, our attorneys handle data security incidents; regulatory issues regarding federal and state privacy laws, such as HIPAA, FERPA, COPPA, GLBA and CCPA; international privacy law compliance, such as GDPR; and data security litigation matters. Learn more about the practice. LINK1 Stan
California Consumer Privacy Act2019California Consumer Privacy ActJohn StephensWeb ResourceCCPALINK1 IAPP Auth Resources
California Privacy Law2020California Privacy Law: Practical Guide and Commentary U.S. Federal and California Law (4th Ed)Lothar DetermannBookTextbookCCPALINK1 IAPP Auth Resources 978-1-948771-42-9softcover, 668Portsmouth: IAPP Publications, 2020Portsmouth: IAPP Publications12-Jul-1905BEST
Cambridge Handbook of Consumer Privacy2018The Cambridge Handbook of Consumer PrivacyEvan Selinger, Jules Polonetsky, and Omer Tene$50BookTextbook: Business & Money > EconomicsxBusinesses are rushing to collect personal data to fuel surging demand. Data enthusiasts claim personal information that's obtained from the commercial internet, including mobile platforms, social networks, cloud computing, and connected devices, will unlock path-breaking innovation, including advanced data security. By contrast, regulators and activists contend that corporate data practices too often disempower consumers by creating privacy harms and related problems. As the Internet of Things matures and facial recognition, predictive analytics, big data, and wearable tracking grow in power, scale, and scope, a controversial ecosystem will exacerbate the acrimony over commercial data capture and analysis. The only productive way forward is to get a grip on the key problems right now and change the conversation. That's exactly what Jules Polonetsky, Omer Tene, and Evan Selinger do. They bring together diverse views from leading academics, business leaders, and policymakers to discuss the opportunities and challenges of the new data economy. Acad NonFict
Camera Power2019Camera Power: Proof, Policing, Privacy, and Audiovisual Big DataMary D. FanBookPolitics & Social Sciences > Social Sciences Acad NonFict
CCPA Genius2020CCPA GeniusWestin ResearchWeb ResourceThe Westin Research Center released this interactive tool, the "CCPA Genius," to help IAPP members navigate the California Consumer Privacy Act, providing ready access to critical CCPA resources. It maps CCPA legal requirements to the CCPA regulations, expert analysis, compliance guidance, the California Privacy Rights Act ballot initiative and more. Informative enforcement actions and court decisions will be added, as well.LINK1 Stan
Chronicle of Data Protection2020Chronicle of Data ProtectionHogan LovellsWeb ResourceBlogThe blog of Hogan Lovells, privacy attorneys and data security lawyers, Chronicle of Data Protection includes posts about consumer and financial privacy, cybersecurity and data breaches, and other topics of relevance to data protection. With the latest information on security news and trends, Chronicle of Data Protection is a useful read for those who need the most up-to-date data protection regulations and news.LINK1LINK2 Stan
Citizenfour2014CitizenfourLaura PoitrasMovieDocumentary, Biography, History xxThis documentary, by filmmaker Laura Poitras, chronicles in real time how "Citizenfour" (Edward Snowden) leaked classified intelligence documents to journalist Glenn Greenwald and his colleagues at The Guardian and The Washington Post in June 2013. Whether you consider Snowden a hero or a felon who should be extradited to the United States and tried for espionage, security pros will find this movie riveting. Viewers get to see Snowden, Greenwald, and filmmaker Poitras hatch the plan for how the stories based on the leaks would be published and managed in the media at large – right as it was happening. / Today Snowden remains in Russia, where he has been outspoken against both the Trump administration and the Putin government. His asylum runs until 2020, so it will be interesting to see what happens next. Cynics may claim that nothing has changed and privacy has only become worse in the past five or six years, but the stories that followed the release of the classified NSA materials did launch an important national debate on the role of government surveillance in the Internet era. More importantly, security pros can't overlook that one day their organizations could fall prey to an insider either looking to make a political point, as Snowden was, or worse - bent on malicious intent. Reading
Class Actions in Privacy Law2020Class Actions in Privacy LawIgnacio N. CofoneBookClass ActionClass actions in privacy law are rapidly growing as a legal vehicle for citizens around the world to hold corporations liable for privacy violations. Current and future developments in these class actions stand to shift the corporate liability landscape for companies that interact with people’s personal information. / Privacy class actions are at the intersection of civil litigation, privacy law, and data protection. Developments in privacy class actions raise complex issues of substantive law as well as challenges to the established procedures governing class action litigation. Their outcomes are integral to the evolution of privacy law and data protection law across jurisdictions. This book brings together established scholars in privacy law, data protection law, and collective litigation to offer a detailed perspective on the present and future of collective litigation for privacy claims. / Taking a comparative approach, this book incorporates considerations from consumer protection law, procedural law, cross-border litigation, tort law, and data protection law, which are key to understanding the development of privacy class actions. In doing so, it offers an analysis of the novel challenges they pose for courts, regulatory agencies, scholars, and litigators, together with their potential solutions. Stan
Click Here to Kill Everybody2018Click Here to Kill Everybody: Security and Survival in a Hyper-connected WorldBruce SchneierBookPolitics & Social Sciences > Politics & Government Acad NonFict
Complete Guide to GDPR Compliance2021Complete Guide to GDPR Compliance. Horizon 2020 Framework Programme for the European Union.GDPR.EUWeb ResourceGDPRLINK1 IAPP Auth Resources
Confidential Confidential2018Confidential Confidential: The Inside Story of Hollywood’s Notorious Scandal MagazineSamantha BarbasBookReference > Writing, Research & Publishing Guides Acad NonFict
Cost of Counterterrorism2008The Cost of Counterterrorism: Power, Politics, and LibertyLaura DonohueBookTextbooks > Social Sciences Acad NonFict,978-05218444445
Costs of Privacy1992The Costs of Privacy: Surveillance and Reputation in AmericaSteven L. NockBookTextbooks > Social Sciences Acad NonFict,978-02023045574
Creditworthy2017Creditworthy: A History of Consumer Surveillance and Financial Identity in AmericaJosh LauerBookBusiness & Money > Biography & HistoryHistoryx Acad NonFict,978-02311680834.17CoverEnglish368BEST
Crime Dot Com2020Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went GlobalGeoff WhiteBook/AudioFrom Anonymous to the Dark Web, a dizzying account of hacking—past, present, and future. “Brilliantly researched and written.”—Jon Snow, Channel 4 News “A comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades. . . . Lively, insightful, and, often, alarming.”—Ewen MacAskill, Guardian On May 4, 2000, an email that read “kindly check the attached LOVELETTER” was sent from a computer in the Philippines. Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States’ hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war. From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it. Stan (ISBN-13 : 978-1789142853)Reaktion Books; New edition (September 12, 2020)Reaktion Books12-Sep-2020
Cuckoo's Egg1989The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer EspionageCliff StollBookPolitics & Social Sciences > Politics & GovernmentTrue Crime Stan
Cult of the Constitution2019Cult of the ConstitutionMary Anne Franks, Th$19BookIn this controversial and provocative book, Mary Anne Franks examines the thin line between constitutional fidelity and constitutional fundamentalism. The Cult of the Constitution reveals how deep fundamentalist strains in both conservative and liberal American thought keep the Constitution in the service of white male supremacy. / Constitutional fundamentalists read the Constitution selectively and self-servingly. Fundamentalist interpretations of the Constitution elevate certain constitutional rights above all others, benefit the most powerful members of society, and undermine the integrity of the document as a whole. The conservative fetish for the Second Amendment (enforced by groups such as the NRA) provides an obvious example of constitutional fundamentalism; the liberal fetish for the First Amendment (enforced by groups such as the ACLU) is less obvious but no less influential. Economic and civil libertarianism have increasingly merged to produce a deregulatory, "free-market" approach to constitutional rights that achieves fullest expression in the idealization of the Internet. The worship of guns, speech, and the Internet in the name of the Constitution has blurred the boundaries between conduct and speech and between veneration and violence. / But the Constitution itself contains the antidote to fundamentalism. The Cult of the Constitution lays bare the dark, antidemocratic consequences of constitutional fundamentalism and urges readers to take the Constitution seriously, not selectively Acad NonFict ISBN-13 : 978-1503603226Hardcover : 272 pagesStanford University Press; 1st edition (May 14, 2019) Stanford University Press; 1st edition 14-May-20191st editionBEST
Customer Data and Privacy2020Customer Data and Privacy: The Insights You Need from Harvard Business ReviewHarvard Business ReviewBookxIs it possible to take advantage of the benefits of data collection--and mitigate risks--for both companies and customers? / Most consumers are not very skilled at evaluating privacy risks; they're either unable to determine the cost of sharing personal data online or unaware of what they're sharing. (Doesn't everyone scroll down without reading to click "I accept"?) Without much intervention from most federal or state-level governments, companies are on their own to define what qualifies as reasonable use. In today's digital surveillance economy, there are no clear-cut best practices or guidelines. Gathering and using information can help customers--we see that in personalization and autofill of online forms. But companies must act in the best interest of their customers and treat the sensitive information users give them with the ethical care of doctors, lawyers, and financial advisers. The challenges of operating in a digital ecosystem aren't going away. Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly. Acad NonFict
Cyber Privacy2020Cyber Privacy: Who Has Your Data and Why You Should CareApril Falcon Doss$19Book/AudioPolitics & Social Sciences > Politics & GovernmentxYou’re being tracked. Google, Facebook, and Amazon—not to mention the federal government—keep incredible amounts of information about your online and real-world behaviors. Understand why it’s a problem. We live in an era of unprecedented data aggregation, and the trade-offs between individual privacy, personal convenience, and national security and cybersecurity have never been more challenging to negotiate. Technology is evolving quickly, while laws and policies are changing slowly. April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, has seen this imbalance in action. She wants to see policy catch up, for the protection of individuals and our private data. That starts with spreading awareness. In Cyber Privacy, Doss explores the most common types of data being collected about individuals today and delve into how it is being used—sometimes against us—by the private sector, the government, and even our employers and schools. She reveals the trends in technology, data science, and law that directly impact our privacy, based on the digital footprints we leave in our daily lives. Most important, Doss also offers new approaches that can help law, policy, and ethics keep pace with technological change. Acad NonFict Cannon7091948836920 (ISBN13: 9781948836920)4.19 · Rating details · 16 ratings · 7 reviewsHardcover : 300 pagesBenBella BooksBenBella Books3-Nov-20204.813
Cyberbullying Law2020Cyberbullying LawThomas JacobsBookTextbook: Law > Constitutional Law Acad NonFict,978-1641056878CoverEnglish814BEST
Cybersecurity2015Cybersecurity: A Practical Guide to the Law of Cyber RiskEdward McNicholas & Vivek K. Mohan (editors)BookTextbook Acad NonFict
Cyberspies2016Cyberspies: The Secret History of Surveillance, Hacking, and Digital EspionageGordon CoreraBookHistoryx Acad NonFict
Cybertraps for the Young2011Cybertraps for the YoungFrederick LaneBookScience & Math > TechnologyBenjamin Franklin Award Finalist for Parenting & Family Issues Acad NonFict
Dark Knight2008The Dark KnightChristopher NolanMovieAction, Suspense, DramaxYou can sum up "The Dark Knight" as simply "the movie where Batman fights the Joker," but that would be a massive disservice to the best comic book movie of all-time. One recurring plotline in the film involves Bruce Wayne, played by Christian Bale, turning all the cellphones in Gotham City into sonar devices in order to track the Joker, played by Heath Ledger in his Oscar-winning tour de force performance. The ethics of this decision are brought up by Morgan Freeman's Lucius Fox and while Batman's decisions around the technology are "somewhat" virtuous, it's not hard to envision a world where a billionaire would not be so benevolent with a massive surveillance system.
Dark Mirror2020Dark Mirror: Edward Snowden and the American Surveillance StateBarton GellmanBookxxEdward Snowden touched off a global debate in 2013 when he gave Barton Gellman, Laura Poitras and Glenn Greenwald each a vast and explosive archive of highly classified files revealing the extent of the American government’s access to our every communication. They shared the Pulitzer Prize that year for public service. For Gellman, who never stopped reporting, that was only the beginning. He jumped off from what Snowden gave him to track the reach and methodology of the U.S. surveillance state and bring it to light with astonishing new clarity. Along the way, he interrogated Snowden’s own history and found important ways in which myth and reality do not line up. Gellman treats Snowden with respect, but this is no hagiographic account, and Dark Mirror sets the record straight in ways that are both fascinating and important. / Dark Mirror is the story that Gellman could not tell before, a gripping inside narrative of investigative reporting as it happened and a deep dive into the machinery of the surveillance state. Gellman recounts the puzzles, dilemmas and tumultuous events behind the scenes of his work – in top secret intelligence facilities, in Moscow hotel rooms, in huddles with Post lawyers and editors, in Silicon Valley executive suites, and in encrypted messages from anonymous accounts. Within the book is a compelling portrait of national security journalism under pressure from legal threats, government investigations, and foreign intelligence agencies intent on stealing Gellman’s files. Throughout Dark Mirror, Gellman wages an escalating battle against unknown adversaries who force him to mimic their tradecraft in self-defense. / With the vivid and insightful style that is the author’s trademark, Dark Mirror is a true-life spy tale about the surveillance-industrial revolution and its discontents. Along the way, with the benefit of fresh reporting, it tells the full story of a government leak unrivaled in drama since All the President’s Men. Acad NonFict : 448 pagesPenguin Press (May 19, 2020)Penguin Press19-May-2020BEST
Dark Net2015The Dark Net: Inside the Digital Underworld HardcoverJamie Bartlett BookBusiness & Money > Processes & InfrastructureAn Independent and New Statesman Book of the Year Acad NonFict
Dark Patterns and the Legal Requirements of Consent Banners2021Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism PerspectiveGray, Santos, Bielova, CliffordPDFResearch/ReportDark PatternsUser engagement with data privacy and security through consent banners has become a ubiquitous part of interacting with internet services. While previous work has addressed consent banners from either interaction design, legal, and ethics-focused perspectives, little research addresses the connections among multiple disciplinary approaches, including tensions and opportunities that transcend disciplinary boundaries. In this paper, we draw together perspectives and commentary from HCI, design, privacy and data protection, and legal research communities, using the language and strategies of “dark patterns” to perform an interaction criticism reading of three different types of consent banners. Our analysis builds upon designer, interface, user, and social context lenses to raise tensions and synergies that arise together in complex, contingent, and conflicting ways in the act of designing consent banners. We conclude with opportunities for transdisciplinary dialogue across legal, ethical, computer science, and interactive systems scholarship to translate matters of ethical concern into public policyLINK1LINK2LINK3 Alberto Montezuma
Data & Analytics 4.02019Data & Analytics 4.0: The Future of Work, Privacy and Trust in the Age of Artificial IntelligenceJournel JosephBookBusiness & Money > SkillsBetter Together: Humans + Machines Contrary to the past when numerous companies failed due to the delay in adopting technology, the future's disruption might come from undervaluing humans, overusing robots and failing to build a symbiotic workforce (humans + machines) for the future. In this book, Journel Joseph addresses the complexities surrounding artificial intelligence (AI) and the future of work--information warfare, social media and data misuse, digital trust and privacy by reflecting on "How to future-proof your career with the rise of AI. How are companies going to face the future in this tumultuous and uncertain time? Stan
Data and Goliath2015Data and Goliath: The Hidden Battles to Collect Your Data and Control Your WorldBruce SchneierBookPolitics & Social Sciences > Politics & GovernmentxxYour cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. / The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. / Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again. Acad NonFict (ISBN13: 9780393352177)4.01 · Rating details · 3,285 ratings · 362 reviewsPaperback, 448 pagesPublished February 8th 2016 by W. W. Norton CompanyW. W. Norton Company8-Feb-20164.5319
Data Brokers - FTC Report2014Data Brokers: A Call for Transparency and AccountabilityFederal Trade Commission $18PDFPolitics & Social Sciences > Politics & GovernmentData BrokersIn this report from May 2014, the Federal Trade Commission discusses the results of an in-depth study of nine data brokers including the characteristics of the industry, benefits and risks and consumer choice, and offers legislative and best practices recommendations based on its findings. Stan
Data for the People2017Data for the People: How to Make Our Post-Privacy Economy Work for YouAndreas WeigendBook/AudioBusiness & Money > Processes & InfrastructureA long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer. In Data for the People, Andreas Weigend draws on his years as a consultant for commerce, education, healthcare, travel and finance companies to outline how Big Data can work better for all of us. As of today, how much we benefit from Big Data depends on how closely the interests of big companies align with our own. Too often, outdated standards of control and privacy force us into unfair contracts with data companies, but it doesn't have to be this way. Weigend makes a powerful argument that we need to take control of how our data is used to actually make it work for us. Only then can we the people get back more from Big Data than we give it. Big Data is here to stay. Now is the time to find out how we can be empowered by it. Acad NonFict Abrams6274.5
Data Privacy Law2019Data Privacy Law: A Practical Guide to GDPRG.E. Kennedy$48BookTextbookA detailed look at the General Data Protection Regulation (GDPR). Understand how to comply. Learn Quick Tips providing answers to your data privacy questions. Learn how to engage a data privacy officer, conduct direct marketing campaigns, create compliance documentation, choose a legal basis for collecting personal information, respond to data subject requests. Avoid costly fines and penalties by ensuring your company's activities comply. Learn about Data Privacy Impact Assessments, data mapping and data subject requests. Answers questions about obtaining consent, processing and retaining personal information. Do your company's direct marketing campaigns conflict with the GDPR? Learn how to create a data privacy compliance program. Included is a survey of all EU member states data privacy laws. IAPP Auth Resources 23 May 2019.Bowker1-May-2019BEST
Data Privacy Law2014Data Privacy Law: An International PerspectiveLee A. BygraveBookLaw > Intellectual Property Acad NonFict,978-01996755555CoverEnglish272BEST
Data Profiling and Insurance Law2020Data Profiling and Insurance LawBrendan McGurkBookLaw > InsuranceBig DataThe winner of the 2020 British Insurance Law Association Book Prize, this timely, expertly written book looks at the legal impact that the use of 'Big Data' will have on the provision - and substantive law - of insurance. Insurance companies are set to become some of the biggest consumers of big data which will enable them to profile prospective individual insureds at an increasingly granular level. / More particularly, the book explores how: (i) insurers gain access to information relevant to assessing risk and/or the pricing of premiums; (ii) the impact which that increased information will have on substantive insurance law (and in particular duties of good faith disclosure and fair presentation of risk); and (iii) the impact that insurers' new knowledge may have on individual and group access to insurance. / This raises several consequential legal questions: (i) To what extent is the use of big data analytics to profile risk compatible (at least in the EU) with the General Data Protection Regulation? (ii) Does insurers' ability to parse vast quantities of individual data about insureds invert the information asymmetry that has historically existed between insured and insurer such as to breathe life into insurers' duty of good faith disclosure? And (iii) by what means might legal challenges be brought against insurers both in relation to the use of big data and the consequences it may have on access to cover? Stan
Data Protection Law2002Data Protection Law: Approaching Its Rationale, Logic and LimitsLee A. BygraveBook Acad NonFict
Data Protection Law - CRS Report2019Data Protection Law: An OverviewStephen Mulligan, Wilson Freeman, Chris LinebaughPDFResearch/ReportRecent high-profile data breaches and other concerns about how third parties protect the privacy of individuals in the digital age have raised national concerns over legal protections of Americans' electronic data. Intentional intrusions into government and private computer networks and inadequate corporate privacy and cybersecurity practices have exposed the personal information of millions of Americans to unwanted recipients. At the same time, internet connectivity has increased and varied in form in recent years. Americans now transmit their personal data on the internet at an exponentially higher rate than in the past, and their data are collected, cultivated, and maintained by a growing number of both 'consumer facing' and 'behind the scenes' actors such as data brokers. As a consequence, the privacy, cybersecurity and protection of personal data have emerged as a major issue for congressional considerationLINK1LINK2LINK3 Stan of Congress. Congressional Research Service, R45631Library of Congress. Congressional Research ServiceR45631BEST
Data Protection Laws of The World2021Data Protection Laws of The WorldDLA PiperWeb ResourceLawsInternational LawLINK1 Stan
Data Protection: Rules for the Protection of Personal Data Inside and Outside the EU2021Data Protection: Rules for the Protection of Personal Data Inside and Outside the EUEuropean CommissionWeb ResourceLINK1 IAPP Auth Resources
Data Selves2019Data Selves: More-than-Human PerspectivesDeborah LuptonBook Acad NonFict
Database Nation2001Database Nation : The Death of Privacy in the 21st CenturySimson GarfinkelBookTextbooks > Social Sciences Acad NonFict
Death of Expertise2017The Death of Expertise: The Campaign Against Established Knowledge and Why It MattersTom NicholsBook/AudioPolitics & Social Sciences > PhilosophyDisinformationThe rise of the internet and other technology has made information more easily-accessible than ever before. While this has had the positive effect of equalizing access to knowledge, it also has lowered the bar on what depth of knowledge is required to consider oneself an "expert." A cult of anti-expertise sentiment has coincided with anti-intellectualism, resulting in massively viral yet poorly informed debates ranging from the anti-vaccination movement to attacks on GMOs. This surge in intellectual egalitarianism has altered the landscape of debates-all voices are equal, and "fact" is a subjective term. Browsing WebMD puts one on equal footing with doctors, and Wikipedia allows all to be foreign policy experts, scientists, and more. / As Tom Nichols shows in The Death of Expertise, there are a number of reasons why this has occurred-ranging from easy access to Internet search engines to a customer satisfaction model within higher education. The product of these interrelated trends, Nichols argues, is a pervasive distrust of expertise among the public coinciding with an unfounded belief among non-experts that their opinions should have equal standing with those of the experts. The experts are not always right, of course, and Nichols discusses expert failure. The crucial point is that bad decisions by experts can and have been effectively challenged by other well-informed experts. The issue now is that the democratization of information dissemination has created an army of ill-informed citizens who denounce expertise. / When challenged, non-experts resort to the false argument that the experts are often wrong. Though it may be true, but the solution is not to jettison expertise as an ideal; it is to improve our expertise. Nichols is certainly not opposed to information democratization, but rather the enlightenment people believe they achieve after superficial internet research. He shows in vivid detail the ways in which this impulse is coursing through our culture and body politic, but the larger goal is to explain the benefits that expertise and rigorous learning regimes bestow upon all societies Stan Pratt5200190469412 (ISBN13: 9780190469412)3.83 · Rating details · 5,348 ratings · 840 reviewsHardcover, 272 pagesPublished March 1st 2017 by Oxford University Press, USA (first published January 1st 2017)Oxford University Press1-Mar-2017(first published January 1st 20174.51161
Delete2009Delete: The Virtue of Forgetting in the Digital AgeViktor Mayer-SchonbergerBookComputers & Technology > History & Culture Acad NonFict
Democracy disrupted?2018Democracy disrupted? Personal information and political influenceInformation Commissioner’s OfficePDFResearch/ReportPoliticsThis report intends to ‘draw back the curtain’ on how personal information is used in modern political campaigns. It summarises the policy findings from our data analytics investigation, making recommendations in respectof the transparent and lawful use of data analytics in political campaigns in the future. // One of the most concerning findings from the investigation was a significant shortfall in transparency and provision of fair processing information. // Our investigation found a number of areas where we believe action is required to improve each of the political parties’ compliance with data protection law. Some of the issues raised included a lack of fair processing: ** in relation to use of personal data from the Electoral Register; ** when micro-targeting on social media; and ** when using software to screen people’s names for likely ethnicity and ageLINK1LINK2LINK3 Stan
Dentons' Privacy and Cybersecurity Law Blog2020Dentons' Privacy and Cybersecurity Law BlogDentonsWeb ResourceBlogProduced by Dentons Global Privacy and Security group, Privacy and Data Security Law provides information on creating, collecting, using, destructing, and securing data for compliance, to minimize litigation risk, and to maintain usability. The blog posts provide very detailed information and advice for data protection and other related topics.LINK1 Stan
Determann's Field Guide to Data Privacy Law2020Determann's Field Guide to Data Privacy Law: International Corporate Compliance (4th Ed)Lothar Determann$70BookTextbook: Computers & Technology > History & CultureCompanies, lawyers, privacy officers, compliance managers, as well as human resources, marketing and IT professionals are increasingly facing privacy issues. While information on privacy topics is freely available, it can be diffcult to grasp a problem quickly, without getting lost in details and advocacy. This is where Determann's Field Guide to Data Privacy Law comes into its own - identifying key issues and providing concise practical guidance for an increasingly complex field shaped by rapid change in international laws, technology and society. / This fourth revised edition reflects significant changes to data privacy law since 2017 such as the entering into force of the EU General Data Protection Regulation, as well as the challenges companies face with respect to data monetization, cloud adoption and the Internet of Things. With data privacy law enforcement at an all time high, readers will benefit from this introduction to key data privacy concepts and the useful practical guidance on starting, maintaining and auditing compliance programs. Step-by-step direction on drafting privacy documentation is provided, with 'how-to' suggestions for tackling other tasks and projects. Finally, the book offers an A-Z list of hot topics, organized by commonly used words and terms. This should be on the desk and in the briefcase of every compliance officer and corporate counsel. CIPP/E IAPP Auth Resources , CIPP/US IAPP Auth Resources, CIPP/M IAPP Auth Resources, 978-178990618Cheltenham. Edward Elgar,CheltenhamEdward Elgar4.5
Digital Hit Man2012The Digital Hit Man: His Weapons for Combating the Digital WorldFrank AhearnBookComputers & Technology > History & CultureThe Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites that violate your on-line privacy, be it scandalous information, negative information or the long-lost skeleton that digitally stepped out of the closet, now making your life miserable. Use Of
Digital Identity2011Digital IdentityClare Sullivan$36BookLaw Acad NonFict
Digital Person2004The Digital Person: Technology And Privacy In The Information AgeDaniel J. SoloveBookPolitics & Social Sciences > Politics & Government Acad NonFict
Digital Services Act EAVA2020Digital Services Act - European added value assessmentEuropean Parliamentary Research ServicePDFResearch/ReportDSALINK1 Stan
Domestic Surveillance Project2021EPIC Domestic Surveillance ProjectElectronic Privacy Information CenterWeb ResourcexLINK1 Stan
Dragnet Nation2014Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless SurveillanceJulia AngwinBookPolitics & Social Sciences > Politics & Government Acad NonFict
DSA (Proposed)2020Proposal for a Regulation of the European Parliament and of the Council on a Single Market For Digital Services (Digital Services Act) and amending Directive 2000/31/ECEuropean CommissionPDFProposalDSALINK1LINK2 Stan
DWT Privacy & Security Law Blog2020DWT Privacy & Security Law BlogDavis Wright Tremaine LLPWeb ResourceBlogIn today’s world, where companies are collecting, using, and sharing personal information on an unprecedented scale, honoring consumers’ choices about how data is used and disclosed and securing personal data from unauthorized disclosure is critical. We have been pioneers in the dynamic area of privacy and security law, serving highly regulated industries, such as communications, healthcare and financial services, for decades. As privacy and information security requirements have evolved to extend beyond these historically regulated industries to apply to virtually every business organization, we have expanded our counseling to advise companies in other industry sectors, such as technology, media, entertainment, retail, advertising, and more. / Our core Privacy and Security team counsels clients regarding internal employee information, consumer-facing requirements associated with marketing and payments, protecting companies from cyber-attacks, cross-border data transfers, vendor management, due diligence in the context of mergers and acquisitions, and more.LINK1
Economics of Privacy2016The Economics of PrivacyAlessandro Acquisti, Curtis Taylor, Liad WagmanPDFResearch/ReportEconomicsThis article summarizes and draws connections among diverse streams of theoretical and empirical research on the economics of privacy. We focus on the economic value and consequences of protecting and disclosing personal information, and on consumers’ understanding and decisions regarding the trade-offs associated with the privacy and the sharing of personal data. We highlight how the economic analysis of privacy evolved over time, as advancements in information technology raised increasingly nuanced and complex issues. We find and highlight three themes that connect diverse insights from the literature. First, characterizing a single unifying economic theory of privacy is hard, because privacy issues of economic relevance arise in widely diverse contexts. Second, there are theoretical and empirical situations where the protection of privacy can both enhance and detract from individual and societal welfare. Third, in digital economies, consumers’ ability to make informed decisions about their privacy is severely hindered because consumers are often in a position of imperfect or asymmetric information regarding when their data is collected, for what purposes, and with what consequences. We conclude the article by highlighting some of the ongoing issues in the privacy debate of interest to economists. (JEL D82, D83, G20, I10, L13, M31, M37)LINK1LINK2LINK3 Stan of Economic LiteratureJournal of Economic LiteratureAcquisti, Alessandro, Curtis Taylor, and Liad Wagman. 2016. "The Economics of Privacy." Journal of Economic Literature, 54 (2): 442-92. DOI: 10.1257/jel.54.2.442BEST
Efficiency Paradox2018Efficiency Paradox: What Big Data Can’t DoEdward Tenner$10BookBusiness & Money > Management & LeadershipA bold challenge to our obsession with efficiency--and a new understanding of how to benefit from the powerful potential of serendipity. / Algorithms, multitasking, sharing economy, life hacks: our culture can't get enough of efficiency. One of the great promises of the Internet and big data revolutions is the idea that we can improve the processes and routines of our work and personal lives to get more done in less time than ever before. There is no doubt that we're performing at higher scales and going faster than ever, but what if we're headed in the wrong direction? / The Efficiency Paradox questions our ingrained assumptions about efficiency, persuasively showing how relying on the algorithms of platforms can in fact lead to wasted efforts, missed opportunities, and above all an inability to break out of established patterns. Edward Tenner offers a smarter way to think about efficiency, showing how we can combine artificial intelligence and our own intuition, leaving ourselves and our institutions open to learning from the random and unexpected. Acad NonFict (ISBN13: 9781400041398)3.31 · Rating details · 211 ratings · 36 reviewsHardcover, 320 pagesPublished April 17th 2018 by Knopf Publishing Group (first published 2018)Knopf Publishing Group17-Apr-2018first published 20184.121
Enemy of the State1998Enemy of the StateTony Scott (Director)MovieFictionxxThis action-packed Will Smith and Gene Hackman-starrer is a classic example of movies tackling cybersecurity and data breach in relation to the government. Although accidentally running across a videotape that serves as crucial evidence to an assassination case and being chased down by abusive National Security Agents isn’t something that can happen to anyone, it portrays a concern many of us have—our digital footprint under intense government surveillance.
EPIC AI Policy Sourcebook2020EPIC AI Policy SourcebookMarc RotenbergBookEngineering & TransportationThe EPIC AI Policy Sourcebook is the first compendium of AI policy, providing essential information to policy makers, researchers, journalists, and the public. The EPIC AI Policy Sourcebook includes global AI frameworks such as the OECD AI Principles and the Universal Guidelines for AI, materials from the European Union and the Council of Europe, corporate and civil society AI frameworks, as well as recommendations from professional societies, including the ACM and the IEEE. The 2020 edition was also updated to include the Beijing Guidelines, the Defense Innovation Board Principles, AI policy surveys, and national AI strategies. The EPIC AI Policy Sourcebook also includes an extensive resources section on AI, including reports, articles, and books from around the world. Stan
EPIC Privacy News Feed2021EPIC Privacy News FeedElectronic Privacy Information CenterWeb ResourceNewsLINK1 Stan
Escaping the Rabbit Hole2018Escaping the Rabbit HoleMick WestBook/AudioPolitics & Social SciencesDisinformationThe Earth is flat, the World Trade Center collapse was a controlled demolition, planes are spraying poison to control the weather, and actors faked the Sandy Hook massacre…. / All these claims are bunk: falsehoods, mistakes, and in some cases, outright lies. But many people passionately believe one or more of these conspiracy theories. They consume countless books and videos, join like-minded online communities, try to convert those around them, and even, on occasion, alienate their own friends and family. Why is this, and how can you help people, especially those closest to you, break free from the downward spiral of conspiracy thinking? / In Escaping the Rabbit Hole, author Mick West shares over a decade’s worth of knowledge and experience investigating and debunking false conspiracy theories through his forum,, and sets forth a practical guide to helping friends and loved ones recognize these theories for what they really are. / Perhaps counter-intuitively, the most successful approaches to helping individuals escape a rabbit hole aren’t comprised of simply explaining why they are wrong; rather, West’s tried-and-tested approach emphasizes clear communication based on mutual respect, honesty, openness, and patience. / West puts his debunking techniques and best practices to the test with four of the most popular false conspiracy theories today (Chemtrails, 9/11 Controlled Demolition, False Flags, and Flat Earth) — providing road maps to help you to understand your friend and help them escape the rabbit hole. These are accompanied by real-life case studies of individuals who, with help, were able to break free from conspiracism. Stan Lister6771510735801 (ISBN13: 9781510735804)3.83 · Rating details · 252 ratings · 45 reviewsHardcover, 304 pagesPublished September 18th 2018 by Skyhorse (first published 2018)Skyhorse18-Sep-2018first published 20180116
Eternal Criminal Record2015The Eternal Criminal RecordJames B. Jacobs$44BookPolitics & Social Sciences > Politics & Government Acad NonFict
EU Data Protection and the GDPR2020EU Data Protection and the GDPRDaniel Solove, Paul Schwartz$103BookDeveloped from the casebook Information Privacy Law, this short paperback contains key cases and materials focusing on privacy issues related to the GDPR and data protection in the European Union. Topics covered include the GDPR, Schrems cases, the right to be forgotten, and international data transfers. Acad NonFict, 978-1543832631200Wolters Kluwer (November 23, 2020)Wolters Kluwer23-Nov-2020BEST
European Data Protection2019European Data Protection, Second EditionUstaran, Eduardo et al. $75BookTextbookLINK1 IAPP Auth Resources PublicationsIAPPBEST
European Data Protection Supervisor2021European Data Protection SupervisorEDPSWeb ResourceLINK1 IAPP Auth Resources
Everybody Lies2017Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really AreSeth Stephens-DavidowitzBookBusiness & Money > Management & LeadershipBlending the informed analysis of The Signal and the Noise with the instructive iconoclasm of Think Like a Freak, a fascinating, illuminating, and witty look at what the vast amounts of information now instantly available to us reveals about ourselves and our world—provided we ask the right questions. / By the end of an average day in the early twenty-first century, human beings searching the internet will amass eight trillion gigabytes of data. This staggering amount of information—unprecedented in history—can tell us a great deal about who we are—the fears, desires, and behaviors that drive us, and the conscious and unconscious decisions we make. From the profound to the mundane, we can gain astonishing knowledge about the human psyche that less than twenty years ago, seemed unfathomable. / Everybody Lies offers fascinating, surprising, and sometimes laugh-out-loud insights into everything from economics to ethics to sports to race to sex, gender and more, all drawn from the world of big data. What percentage of white voters didn’t vote for Barack Obama because he’s black? Does where you go to school effect how successful you are in life? Do parents secretly favor boy children over girls? Do violent films affect the crime rate? Can you beat the stock market? How regularly do we lie about our sex lives and who’s more self-conscious about sex, men or women? Stan
Everyday Surveillance2013Everyday Surveillance: Vigilance and Visibility in Postmodern LifeWilliam G. StaplesBookPolitics & Social Sciences > Politics & Governmentx Acad NonFict
Evolution of European Data Law2020The Evolution of European Data LawThomas StreinzPDFDraftGDPRDraft from forthcoming in Paul Craig and Gráinne de Búrca (eds), The Evolution of EU Law (Oxford University Press, 3rd edn 2021) chapter 29. Please cite to the published version.LINK1LINK2 Stan, Thomas, The Evolution of European Data Law (January 9, 2021). Paul Craig and Gráinne de Búrca (eds), The Evolution of EU Law (OUP, 3rd edn 2021), Available at SSRN: editionBEST
Evolution of Privacy Tech2020The Evolution of Privacy TechMichael TefulaWeb ResourceBlog PostLINK1LINK2*NUdqdoUyjgy2s7RPt_YNrA.png Stan
Ex Machina2014Ex MachinaAlex GarlandMovieScience Fiction, Drama, SuspensexCaleb Smith is a programmer who works for Blue Book, a fictionalized search engine giant. He wins an office contest to go to the home of the CEO of Blue Book to conduct a Turing test on a humanoid robot. Smith soon learns the robot is powered by an artificial intelligence that learned everything about humanity through inquiries that ran through the search engine. The less you know about the rest of the plot, the better. If you are looking for a slow-burning, twisty, mature sci-fi film that also takes a darker look at big data and AI, look no further.
Exploding Data2018Exploding Data: Reclaiming Our Cybersecurity in the Digital AgeMichael ChertoffBookPolitics & Social Sciences > Politics & Government
Exposed2015Exposed: Desire and Disobedience in the Digital AgeBernard E. HarcourtBookEngineering & Transportation > Engineering Acad NonFict
EyeMonger2020The EyeMongerDaniel Solove$26BookFiction: Children's Growing Up & Facts of LifeChidren'sIn a faraway land, a stranger arrives with promises of greater security in exchange for sacrificing privacy. His name is The Eyemonger, and he has 103 eyes. With the help of flying eye creatures, he spies on everybody. But his plan soon starts to go wrong . . . The Eyemonger is an illustrated children’s book by the internationally renowned privacy expert, Daniel J. Solove. The book discusses the importance of privacy in a way that children can understand. It is one of the few (if only) books for children on the topic of privacy. Stan (ISBN13: 9780578802688)Hardcover, 48 pagesPublished November 21st 2020 by Griffin PressGriffin Press21-Nov-20204.88
Eyes and Spies2017Eyes and Spies: How You're Tracked and Why You Should KnowTanya Lloyd KyiBookFiction: Teen & Young Adult
Facebook Effect2010The Facebook Effect: The Inside Story of the Company That Is Connecting the WorldDavid KirkpatrickBookBusiness & Money > Biography & History Acad NonFict
Failure of Fair Information Practice Principles2006The Failure of Fair Information Practice PrinciplesFred CatePDFResearch/ReportFIPPsModern data protection law is built on "fair information practice principles." .... FIPPS have increasingly been reduced to narrow, legalistic principles (e.g., notice, choice, access, security, and enforcement). These principles reflect a procedural approach to maximizing individual control over data rather than individual or societal welfare....As theoretically appealing as this approach may be, it has proven unsuccessful in practice. Businesses and other data users are burdened with legal obligations while individuals endure an onslaught of notices and opportunities for often limited choice. ...Moreover, choice is often an annoyance or even a disservice to individuals. In addition, many services cannot be offered subject to individual choice...In short, the control-based system of data protection, with its reliance on narrow, procedural FIPPS, is not working. The available evidence suggests that privacy is not better protected. ...This paper reflects a modest first step at articulating an approach to privacy laws that does not reject notice and choice, but does not seek to rely on it for all purposes. Drawing on other forms of consumer protection, in which standards of protection are not negotiable between providers and consumers, I propose that national governments stop subjecting vast flows of personal data to restraints based on individual preferences or otherwise imposing the considerable transaction costs of the current approach. Instead, the paper proposes that lawmakers reclaim the original broader concept of FIPPS by adhering to Consumer Privacy Protection Principles (CPPPS) that include substantive restrictions on data processing designed to prevent specific harms. The CPPPS framework is only a first step. It is neither complete nor perfect, but it is an effort to return to a more meaningful dialogue about the legal regulation of privacy and the value of information flows in the face of explosive growth in technological capabilities in an increasingly interconnected, global society.LINK1LINK2 Stan Protection in the Age of the Information Economy, 2006Consumer Protection in the Age of the Information Economy28-Jun-1905BEST
Family Secrets2017Family Secrets: Shame and Privacy in Modern BritainDeborah CohenBookTextbooks > Humanities Acad NonFict
Fatal System Error2010Fatal System ErrorJoseph MennBookComputers & Technology > Networking & Cloud Computing Use Of
Federal Trade Commission Privacy Law and Policy2016Federal Trade Commission Privacy Law and PolicyChris Jay HoofnagleBookLaw > Business Acad NonFict
Fiduciary Boilerplate2020Fiduciary Boilerplate: Locating Fiduciary Relationships in Information Age Consumer TransactionsLauren Henry ScholzPDFLaw JournalData FiduciariesThe result of applying general contract principles to consumer boilerplate has been a mass transfer of unrestricted rights to use and sell personal information from consumers to companies. This has enriched companies and enhanced their ability to manipulate consumers. It has also contributed to the modern data insecurity crisis. Consumer transactions should create fiduciary relationships between firm and consumer as a matter of law. Recognizing this fiduciary relationship at law honors the existence of consumer agreements while also putting adaptable, context-sensitive limits on opportunistic behavior by firms. In a world of ubiquitous, interconnected, and mutable contracts, consumers must trust the companies with which they transact not to expose them to economic exploitation and undue security risks: the very essence of a fiduciary relationship. Firms owe fiduciary duties of loyalty and care to their customers that cannot be displaced by assent to boilerplate. History, doctrine, and pragmatism all support this position.LINK1LINK2LINK3 Privacy Papers Award of Corporation Law, Vol. 46, 2020Journal of Corporation Law12-Jul-1905Vol. 46BEST
Fiduciary Model of Privacy2020The Fiduciary Model of PrivacyJack BalkinPDFLaw JournalData FiduciariesIn the digital age people are increasingly dependent on and vulnerable to digital businesses that collect data from them and use data about them. These companies use data to predict and control what end users do, and to sell advertisers access to those end users. Digital companies invite people to trust them with their data. When people accept that offer of trust, they become vulnerable: to how the companies use their data, to companies’ data security (or lack thereof), and to companies’ choice to share or sell the data to others. Because of the vulnerability and dependence created by information capitalism, I have argued that the law should treat digital companies that collect and use end user data according to fiduciary principles. The law should regard them as information fiduciaries.LINK1LINK2 Stan LawHarvard LawBEST
Fieldfisher: Privacy, Security and Information Law2020Fieldfisher: Privacy, Security and Information Law BlogfieldfisherWeb ResourceBlogFieldfisher is a European law firm with market leading practices in many of the world's most dynamic sectors.LINK1 IAPP Auth Resources
Filter Bubble2011The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We ThinkEli PariserBook Acad NonFict
First Amendment Bubble2015The First Amendment Bubble: How Privacy and Paparazzi Threaten a Free PressAmy GajdaBook Acad NonFict
Fourth Amendment2008The Fourth Amendment: Origins and Original Meaning 602-1791William CuddihyBook Acad NonFict
Fourth Amendment in an Age of Surveillance2017The Fourth Amendment in an Age of SurveillanceDavid GrayBookLaw > Criminal Lawx Acad NonFict
FTC Enforcement Actions2014What FTC Enforcement Actions Teach Us About the Features of Reasonable Privacy and Data Security PracticesPatricia BailinPDFLaw JournalFTC EnforcementIn at least 47 cases since 2002, the FTC has cited companies for failing either to design or to implement an appropriately comprehensive privacy or data security program. Almost all of these cases have been settled.... by pointing out what companies did not have in their [privacy & security] programs, the FTC provides a peek at what, in its opinion, these companies should have done. The guidelines below are drawn from the 47 cases, loosely organized into seven categories that are not mutually exclusive: Privacy, Security, Software/Product Review, Service Providers, Risk Assessment, Unauthorized Access/Disclosure and Employee Training.LINK1LINK2 Stan
Future of Foreign Intelligence2016The Future of Foreign Intelligence: Privacy and Surveillance in a Digital AgeLaura K. DonohueBookPolitics & Social Sciences > Politics & Governmentx Acad NonFict
Future of Reputation2007The Future of Reputation: Gossip, Rumor, and Privacy on the InternetDaniel J. SoloveBook Acad NonFict
Gattaca1997GattacaAndrew NiccolMovieScience Fiction, Suspense, DramaIn Gattaca, the protagonist (Ethan Hawke) is a natural-born person in a world where most people are genetically-engineered. He wants to be an astronaut, but genetic markers for a potential heart condition preclude him from pursuing this dream. So he takes on the identity of another person with “superior” DNA. The movie demonstrates the importance of genetic privacy. People would be profoundly unfree if their future possibilities were severely restricted based on their genetics. Films
GDPR Genius2020GDPR GeniusIAPPWeb ResourceThis interactive tool provides IAPP members ready access to critical EU General Data Protection Regulation resources — enforcement precedent, interpretive guidance, expert analysis and more — all in one location. Users can click on any GDPR article to access the following content relevant to that particular GDPR provisionLINK1 Stan
Genetic Privacy2002Genetic Privacy: A Challenge to Medico-Legal NormsGraeme LaurieBook Acad NonFict
Genetic Secrets1997Genetic Secrets: Protecting Privacy and Confidentiality in the Genetic EraMark A. Rothstein (editor)Book Acad NonFict
Ghost Fleet2015Ghost FleetPeter Singer, August ColeBookFiction: Mystery, Thriller & Suspense > Thrillers & Suspense Fiction
Ghost in the wires2011Ghost in the Wires: My Adventures as the World's Most Wanted HackerKevin MitnickBook Acad NonFict
Girl with the Dragon Tattoo2011Girl with the Dragon TattooDavid FincherMovieCrime, Drama, MysteryBased on the first of Stieg Larsson's Millennium trilogy of crime novels, this movie has everything: sex, violence, interesting hacks, betrayal, and even a great car/motorcycle chase. While it's essentially a crime drama, the hacker and antisocial personality Lisbeth Salander, played by Rooney Mara, offers up some interesting questions about the ethics of hacking. Is hacking OK if we're looking to solve a murder? Do large, greedy corporations deserve what they get if they're hacked? From a hacking perspective, one of the funnier and more ironic moments in the movie is when Mara's character is confronted by journalist Mikael Blomkvist, played by Daniel Craig, who says, "You can't access those files – they're encrypted." Lisbeth smugly responds, "Please." Reading
Global Privacy & Security Compliance Law Blog2021Global Privacy & Security Compliance Law BlogLatham & Watkins LLPWeb ResourceBlogCommentary on Global Privacy and Security Issues of TodayLINK1
Global Privacy & Security Law2009Global Privacy & Security LawFrancoise Gilbert$1,721BookTextbookxLINK1 Acad NonFict
Glossary of Privacy Terms2020IAPP Glossary of Privacy TermsIAPPWeb ResourceLINK1 Stan
Good Night, And Good Luck2005Good Night, And Good LuckGeorge ClooneyMovieBiography, Drama, History Broadcast journalist Edward R. Murrow looks to bring down Senator Joseph McCarthy.,_and_Good_Luck Stan
Googlization of Everything2011The Googlization of Everything: (And Why We Should Worry)Siva VaidhyanathanBookBusiness & Money > Biography & History Acad NonFict
Gossip2011Gossip: The Untrivial PursuitJoseph EpsteinBookHealth, Fitness & Dieting > Psychology & Counseling Acad NonFict
Governance of Privacy2006The Governance of Privacy: Policy Instruments in Global Perspective Colin Bennett & Charles RaabBookTextbooks > Social Sciences Acad NonFict
Great Hack2019The Great HackKarim Amer, Jehane Noujaim (Director)MovieDocumentarySocial MediaIn 2018, social media was shaken after a data breach scandal involving Facebook and Cambridge Analytica, who gathered personal data from millions of the social networking site’s users to use for political advertising. Aside from sparking the online movement #DeleteFacebook, this incident was also tackled by the documentary produced and directed by Academy Award-nominated personalities Jehane Noujaim and Karim Amer. “The Great Hack” exposed the data mining work of the United Kingdom-based firm Cambridge Analytica not just in the United States, but also in its homeland and other countries. LINK1LINK2LINK3
Guarding Life’s Dark Secrets2007Guarding Life’s Dark SecretsLawrence M. FriedmanBook Acad NonFict
Habeas Data2018Habeas Data: Privacy vs. the Rise of Surveillance TechCyrus FarivarBook/AudioxA book about what the Cambridge Analytica scandal shows: That surveillance and data privacy is every citizens’ concern. An important look at how 50 years of American privacy law is inadequate for the today's surveillance technology, from acclaimed Ars Technica senior business editor Cyrus Farivar. In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy. Acad NonFict Jay Cohen699BEST
Hacking Democracy2006Hacking DemocracyRussell Michaels, Simon Ardizzone (Directors)MovieDocumentaryxThis Emmy-nominated documentary took about three years to film, featuring eye-opening coverage of citizen-led investigations on electronic election anomalies in the United States. Exposing the electronic voting system’s vulnerability, a nonprofit election watchdog group tests the ways of tampering and altering results on electronic voting machines—making you question how technology can affect our democracy.
Harboring Data2009Harboring Data: Information Security, Law, and the CorporationAndrea Matwyshyn (editor)Bookx Acad NonFict
Hate Crimes in Cyberspace2014Hate Crimes in CyberspaceDanielle CitronBookComputers & Technology > History & Culture Acad NonFict
Health Data Privacy under the GDPR2020Health Data Privacy under the GDPR: Big Data Challenges and Regulatory Responses (Routledge Research in the Law of Emerging Technologies)Maria Tzanou (Editor)BookGDPRThe growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. / This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children’s health and academic research? Stan
Hello World2018Hello World: Being Human in the Age of AlgorithmsHannah FryBook/AudioAIWhen it comes to artificial intelligence, we either hear of a paradise on earth or of our imminent extinction. It’s time we stand face-to-digital-face with the true powers and limitations of the algorithms that already automate important decisions in healthcare, transportation, crime, and commerce. Hello World is indispensable preparation for the moral quandaries of a world run by code, and with the unfailingly entertaining Hannah Fry as our guide, we’ll be discussing these issues long after the last page is turned. Leone CIPP/E CIPM
HIPAA Privacy & Security Resources2020HIPAA Privacy & Security ResourcesAMAWeb ResourceHIPPAxLINK1 IAPP Auth Resources
History of Private Life1997History of Private Life: Vols. 1-5Philippe Aries, editorBook Acad NonFict
Homeland2014HomelandCory Doctorow BookFiction Stan
Hype Machine2020The Hype Machine: How Social Media Disrupts Our Elections, Our Economy, and Our Health--and How We Must AdaptSinan AralBook/AudioAI, Social MediaA landmark insider’s tour of how social media affects our decision-making and shapes our world in ways both useful and dangerous, with critical insights into the social media trends of the 2020 election and beyond Leone CIPP/E CIPM
I Hope I Don’t Intrude2015I Hope I Don’t Intrude: Privacy and its Dilemmas in Nineteenth-Century BritainDavid VincentBookHistory Acad NonFict
IAPP Daily Dashboard2021IAPP Daily DashboardIAPPWeb ResourceNewsYour daily source for the most important privacy and data protection news from around the world.LINK1 Stan
IAPP Privacy Job Board2020IAPP Privacy Job BoardIAPPWeb ResourceJobsLINK1!#career!#careerPrivacy Stan
IAPP Privacy List2020IAPP Privacy List (email listserv)IAPPWeb ResourceConnectThe IAPP Privacy List is an email list that connects you to thousands of members with the click of a button. Send your questions or comments via your personal email or your Topicbox portal and receive feedback straight to your inbox. - Ranking system based on subjective judgement of: data privacy focus, value, longevity - Comments and reviews. Selecting Top Three Podcasts each weekLINK1 Stan
IAPP Privacy Tech2021IAPP Privacy TechIAPPWeb ResourceNewsOriginal reporting and thought pieces on the technology of privacy and data protection.LINK1 Stan
IBM Cost of a Data Breach2020IBM Cost of a Data Breach Report [Yearly]IBMPDFResearch/ReportData Breachxexplores financial impacts and security measures that can help your organization mitigate costsLINK1LINK2LINK3 Stan
IBM X-Force Threat Index2020IBM X-Force Threat Intelligence Index [Yearly]IBMPDFResearch/ReportData BreachxActionable threat intelligence can help your organization allocate resources, understand relevant threats, and bolster your security strategy. The annual IBM X-Force® Threat Intelligence Index sheds light on the biggest cyber risks that organizations face today, with data collected over the past year. Gain fresh insights on the trends shaping the threat landscapeLINK1LINK2LINK3 Stan
ICO Blog2020Blog of the UK's Information Commisioner (DPA)ICOWeb ResourceBlogThe Information Commissioner's Office (ICO) upholds information rights that are in the public interest and promotes openness by public bodies but strives for individuals" data privacy. The ICO Blog focuses on those information rights issues, and especially data protection.LINK1LINK2 Stan
Identity Reboot2020Identity Reboot: Reimagining Data Privacy for the 21st CenturyArwen SmitBookDigital IdentityHuman behaviour is being devalued to an optimisation problem, and we are providing the data that is optimised for. Controversies such as the Cambridge Analytica scandal and the explosion of dis-information surrounding the US 2016 presidential election and Brexit put data privacy in the global spotlight. Illuminating the true stakes behind the news stories, Smit urgently calls for a reimagination of data privacy for the 21st century. Seamlessly taking the reader on a journey spanning philosophy to politics, East to West, and blockchain to artificial intelligence, the author contributes new creative thinking, answering the many questions raised with equal realism and hope. For politicians, technologists and all who think we could do better, the tools to reboot identity can be found in this bold, wide-ranging book. Stan
Identity Trade2019Identity Trade: Selling Privacy and Reputation OnlineNora A. Draper, ThBook Acad NonFict
If Then2020If Then: How the Simulmatics Corporation Invented the FutureJill LeporeBook/AudioA revelatory account of the Cold War origins of the data-mad, algorithmic twenty-first century, from the author of the acclaimed international bestseller These Truths. / The Simulmatics Corporation, launched during the Cold War, mined data, targeted voters, manipulated consumers, destabilized politics, and disordered knowledge―decades before Facebook, Google, and Cambridge Analytica. Jill Lepore, best-selling author of These Truths, came across the company’s papers in MIT’s archives and set out to tell this forgotten history, the long-lost backstory to the methods, and the arrogance, of Silicon Valley. / Founded in 1959 by some of the nation’s leading social scientists―“the best and the brightest, fatally brilliant, Icaruses with wings of feathers and wax, flying to the sun”―Simulmatics proposed to predict and manipulate the future by way of the computer simulation of human behavior. In summers, with their wives and children in tow, the company’s scientists met on the beach in Long Island under a geodesic, honeycombed dome, where they built a “People Machine” that aimed to model everything from buying a dishwasher to counterinsurgency to casting a vote. Deploying their “People Machine” from New York, Washington, Cambridge, and even Saigon, Simulmatics’ clients included the John F. Kennedy presidential campaign, the New York Times, the Department of Defense, and dozens of major manufacturers: Simulmatics had a hand in everything from political races to the Vietnam War to the Johnson administration’s ill-fated attempt to predict race riots. The company’s collapse was almost as rapid as its ascent, a collapse that involved failed marriages, a suspicious death, and bankruptcy. Exposed for false claims, and even accused of war crimes, it closed its doors in 1970 and all but vanished. Until Lepore came across the records of its remains. / The scientists of Simulmatics believed they had invented “the A-bomb of the social sciences.” They did not predict that it would take decades to detonate, like a long-buried grenade. But, in the early years of the twenty-first century, that bomb did detonate, creating a world in which corporations collect data and model behavior and target messages about the most ordinary of decisions, leaving people all over the world, long before the global pandemic, crushed by feelings of helplessness. This history has a past; If Then is its cautionary tale. Acad NonFict Lepore6391631496107, 978-1631496103Hardcover : 432 pagesLiveright; Illustrated edition (September 15, 2020)Liveright15-Sep-2020Illustrated editionBEST
Imitation Game2014The Imitation GameMorten TyldumMovieBiography, Drama, ThrillerWhile this movie was criticized in some circles for underplaying cryptographer Alan Turing's homosexuality, the 2014 movie gets it right on Turing's work with British intelligence to crack the Enigma codes sent out daily by the Germans during World War II. The core of the movie revolves around the primitive tools (by today's standards) Turing and his team used to build Christopher, the machine that cracked the Nazi codes. The movie also covers Turing's troubled personal life and suicide in 1954 after being hounded by British authorities for several years. Turing's contributions to cryptography and the war effort are undeniable and should be a part of any security pro's general knowledge. Reading
Impacts of AdTech on Privacy Rights and the Rule of Law2021The Impacts of AdTech on Privacy Rights and the Rule of LawRóisín Áine CostelloPDFResearch/ReportAdTechThis article argues that the AdTech market has undermined the fundamental right to privacy in the European Union and that current legislative and fundamental rights protections in the EU have been unsuccessful in restraining these privacy harms. The article further argues that these privacy consequences have imported additional reductions in individual autonomy and have the capacity to harm the Rule of LawLINK1LINK2 Stan and RegulationTechnology and RegulationBEST
In Pursuit of Privacy1997In Pursuit of Privacy: Law, Ethics, and the Rise of TechnologyJudith Wagner DeCewBook Acad NonFict
Inception2010InceptionChristopher NolanMovieAction, Adventure, Sci-FiThis 2010 film stars Leonardo DiCaprio as Dom Cobb, a thief who steals information by hacking into a person's subconscious. While not strictly a computer hacker movie, Inception offers some interesting insights into our experiences with the real world and dream world, how the two mesh, and the role of technology as we head into a world dominated by artificial intelligence, machine learning, and virtual reality. Reading
Information Fiduciaries and the First Amendment2016Information Fiduciaries and the First AmendmentJack BalkinPDFLaw JournalData FiduciariesCollection, analysis, and use of personal data increasingly affect everything we do in the information age, from our personal privacy to our opportunities for jobs, housing, travel, and health care. As algorithms for making decisions based on this data become more powerful, so too will the people and organizations who collect and use the data. Reformers will press for government regulation in the name of protecting personal privacy and preventing abuse and discrimination. In response, businesses that collect, analyze, use, distribute, and sell personal data will likely raise First Amendment defenses. It will only be natural for them to try to prevent what they regard as meddlesome and invasive government regulation by invoking the First Amendment - one of the most central of our constitutional libertiesLINK1LINK2 Stan Davis LawUC Davis LawBEST
Information Privacy Engineering and Privacy by Design2019Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best PracticesWilliam Stallings $63BookTextbook IAPP Auth Resources
Information Security and Privacy2019Information Security and Privacy: A Guide to Federal and State Law and Compliance (2020-2021 ed)Andrew B Serwin$586BookTextbookx IAPP Auth Resources
Information Wars2019Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do about ItRichard StengelBook/AudioDisinformationDisinformation is as old as humanity. When Satan told Eve nothing would happen if she bit the apple, that was disinformation. But the rise of social media has made disinformation even more pervasive and pernicious in our current era. In a disturbing turn of events, governments are increasingly using disinformation to create their own false narratives, and democracies are proving not to be very good at fighting it. / During the final three years of the Obama administration, Richard Stengel, the former editor of Time and an Under Secretary of State, was on the front lines of this new global information war. At the time, he was the single person in government tasked with unpacking, disproving, and combating both ISIS's messaging and Russian disinformation. Then, in 2016, as the presidential election unfolded, Stengel watched as Donald Trump used disinformation himself, weaponizing the grievances of Americans who felt left out by modernism. In fact, Stengel quickly came to see how all three players had used the same playbook: ISIS sought to make Islam great again; Putin tried to make Russia great again; and we all know about Trump. / In a narrative that is by turns dramatic and eye-opening, Information Wars walks readers through of this often frustrating battle. Stengel moves through Russia and Ukraine, Saudi Arabia and Iraq, and introduces characters from Putin to Hillary Clinton, John Kerry and Mohamed bin Salman to show how disinformation is impacting our global society. He illustrates how ISIS terrorized the world using social media, and how the Russians launched a tsunami of disinformation around the annexation of Crimea - a scheme that became the model for their interference with the 2016 presidential election. An urgent book for our times, Information Wars stresses that we must find a way to combat this ever growing threat to democracy. Stan Grove6770802147984 (ISBN13: 9780802147981)3.82 · Rating details · 282 ratings · 65 reviewsHardcover, 368 pagesPublished October 8th 2019 by Atlantic Monthly PressAtlantic Monthly Press8-Oct-2019BEST
Insecurity2017InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less SafeJane FranklandBookx Acad NonFict
Intellectual Privacy2015Intellectual Privacy, Rethinking Civil Liberties in the Digital AgeNeil RichardsBookLaw > Intellectual Property Acad NonFict
Intelligent Marketer2019The Intelligent Marketer’s Guide to Data Privacy: The Impact of Big Data on Customer TrustRobert W. Palmatier, Kelly D. MartinBookxFirms are collecting and analyzing customer data at an ever increasing rate in response to evidence that data analytics (precision targeting, improved selling) generates a positive return. Yet efforts often ignore customers’ privacy concerns and feelings of vulnerability with long-term effects on customers’ trust, relationships, and ultimately financial performance. Big data, privacy, and cybersecurity often is relegated to IT and legal teams with minimal regard for customer relationships / This book fills the void by taking a customer-centric approach to privacy. / It offers both defensive and offensive marketing-based privacy strategies that strongly position firms in today’s data-intensive landscape. The book also helps managers anticipate future consumer and legislative trends. Drawing from the authors’ own work and extant research, this book offers a compelling guide for building and implementing big data- and privacy-informed business strategies / Specifically, the book: ** Describes the consumer psychology of privacy ** Deconstructs relevant legal and regulatory issues ** Offers defensive privacy strategies ** Describes offensive privacy strategies ** Provides an executive summary with the Six Tenets for Effective Privacy Marketing Stan
Internet in Everything2020The Internet in Everything: Freedom and Security in a World with No Off SwitchLaura DeNardisBookxA compelling argument that the Internet of things threatens human rights and security and that suggests policy prescriptions to protect our future / The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of Things—connecting everything from cars to cardiac monitors to home appliances—there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. / The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in a loss of communication but also potentially a loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach across borders to disrupt real-world systems. Laura DeNardis argues that this diffusion of the Internet into the physical world radically escalates governance concerns around privacy, discrimination, human safety, democracy, and national security, and she offers new cyber-policy solutions. In her discussion, she makes visible the sinews of power already embedded in our technology and explores how hidden technical governance arrangements will become the constitution of our future Stan
Intimate Lies and the Law2019Intimate Lies and the LawJill Elaine HasdayBookLaw > Family Law Acad NonFict
Intruders2004The Intruders: Unreasonable Searches and Seizures from King John to John AshcroftSamuel DashBook Acad NonFict
Invisible Women2019Invisible Women: Data Bias in a World Designed for MenCaroline Criado PerezBook/AudioData is fundamental to the modern world. From economic development, to healthcare, to education and public policy, we rely on numbers to allocate resources and make crucial decisions. But because so much data fails to take into account gender, because it treats men as the default and women as atypical, bias and discrimination are baked into our systems. And women pay tremendous costs for this bias, in time, money, and often with their lives. / Celebrated feminist advocate Caroline Criado Perez investigates the shocking root cause of gender inequality and research in Invisible Women​, diving into women’s lives at home, the workplace, the public square, the doctor’s office, and more. Built on hundreds of studies in the US, the UK, and around the world, and written with energy, wit, and sparkling intelligence, this is a groundbreaking, unforgettable exposé that will change the way you look at the world. Leone CIPP/E CIPM
IoT Architect's Guide to Attainable Security and Privacy2019The IoT Architect's Guide to Attainable Security and PrivacyDavid M. Wheeler et al.$47BookComputers & Technology > Networking & Cloud ComputingxThis book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. We wrote this book not only to be a valuable security and IoT architectural resource for you but also to be an enjoyable read. With that in mind, we've added personal experiences, scenarios, and examples designed to draw you in and keep you engaged. IAPP Auth Resources PublicationsAuerbach Publications11-Jul-19055
Islands in the Net1988Islands in the NetBruce SterlingBookFictionCyberPunk Fiction
Islands of Privacy2010Islands of PrivacyChristena Nippert-EngBook Acad NonFict
IT Governance UK2020IT Governance UK BlogIT GovernanceWeb ResourceBlogIT Governance is a leading global provider of IT governance, risk management and compliance solutions, with a special focus on cyber resilience, data protection, PCI DSS, ISO 27001 and cyber security.LINK1
It’s Complicated2014It’s Complicated: The Social Lives of Networked TeensDanah BoydBook Acad NonFict
Johnny Mneumonic1995Johnny MneumonicRobert LongoMovieAction, Drama, Sci-FiConsider this our tribute to the great cyberpunk literary hero William Gibson, who also wrote the screenplay for Johnny Mnemonic. The movie draws its inspiration from Gibson's eponymous short story. A young Keanu Reeves plays Johnny, a mercenary data courier in the year 2021. Johnny is carrying the cure for nerve attenuation syndrome (NAS), an ailment infecting half the planet caused by an over dependence on technology – and everyone wants to kill him. The movie takes the viewer into Gibson's world of Loteks, the edge of the Sprawl, and the dystopian future we all seem to be headed toward. Gibson gets a lot of it right, but, of course, today Johnny would be carrying terabytes or petabytes in his head. In the 1995 movie, Johnny's overloaded by carrying 320 gigabytes. Reading
Justia Privacy Law Blawgs2020Justia Privacy Law BlawgsJustiaWeb ResourceBlogCollection of the most popular Privacy Law blogs.LINK1
Killswitch2014KillswitchAli Akbarzadeh (Director)MovieDocumentaryxx“The Internet is under attack. Free speech, innovation and democracy are all up for grabs.” That is the tagline of this documentary film. Drawing a call-to-action for viewers to fight for their internet freedom, the film follows the story of young hacktivists Aaron Swartz and Edward Snowden. / Swartz is Reddit’s co-founder who was also indicted with criminal charges for breaking into digital library JSTOR’s subscription database with the aim of making academic journals free for all. Meanwhile, former Central Intelligence Agency (CIA) employee Edward Snowden is a name controversial for leaking highly classified information from the National Security Agency (NSA) in 2013.
Kim Cameron's Identity Blog2021Kim Cameron's Identity BlogKim CameronWeb ResourceBlogA blog based on the goal to build a multi-centered system of digital identity that is at the user’s control.LINK1
Kingdom of Lies2019Kingdom of Lies: Unnerving Adventures in the World of CybercrimeKate FazziniBook Acad NonFict
Kingpin2012KingpinKevin PoulsonBook Use Of
Known Citizen2018The Known Citizen: A History of Privacy in Modern AmericaSarah E. IgoBookPolitics & Social Sciences > Politics & GovernmentHistorySarah Igo explain how the explosion of new technologies in the late nineteenth and early twentieth centuries—and continuing to the present—has driven the continuing evolution of what is considered “private” life Acad NonFict
Law of Artificial Intelligence and Smart Machines2018Law of Artificial Intelligence and Smart Machines: Understanding A.I. and the Legal ImpactTheodore Franklin ClaypooleBook Acad NonFict
Lawnmower Man1992The Lawnmower ManBrett LeonardMovieHorror, Sci-Fi This movie serves as a warning of what could happen when ambitious scientists and the military industrial complex run amok. Some of the movie's portrayals of the military industrial complex are laughable; in fact, for most of the movie, it feels like a 1950s sci-fi thriller. The plot revolves around Dr. Lawrence Angelo, played by a young Pierce Brosnan, who befriends Jobe Smith, a local handyman with cognitive disabilities played by a young Jeff Fahey who fixes machines and cuts lawns. Through the use of the virtual reality technology he worked on for the military at nearby Virtual Space Industries, Dr. Angelo transforms Jobe into a highly intelligent superman who surpasses Dr. Angelo's brainpower and winds up able to levitate physical objects and set lawnmowers to cut autonomously. Things go horribly wrong, though, and Jobe becomes a monster, insisting his destiny is to become a new form of energy. He slides into the virtual world and, at the end, takes over a mainframe and enters the international telephone network. The movie ends with every telephone across the world ringing simultaneously. Reading
Laws of Image2015Laws of Image: Privacy and Publicity in AmericaSamantha BarbasBookTextbooks > Humanities Acad NonFict
Legislating Privacy1995Legislating Privacy: Technology, Social Values, and Public PolicyPriscilla M. ReganBookWhile technological threats to personal privacy have proliferated rapidly, legislation designed to protect privacy has been slow and incremental. In this study of legislative attempts to reconcile privacy and technology, Priscilla Regan examines congressional policy making in three key areas: computerized databases, wiretapping, and polygraph testing. In each case, she argues, legislation has represented an unbalanced compromise benefiting those with a vested interest in new technology over those advocating privacy protection. Legislating Privacy explores the dynamics of congressional policy formulation and traces the limited response of legislators to the concept of privacy as a fundamental individual right. According to Regan, we will need an expanded understanding of the social value of privacy if we are to achieve greater protection from emerging technologies such as Caller ID and genetic testing. Specifically, she argues that a recognition of the social importance of privacy will shift both the terms of the policy debate and the patterns of interest-group action in future congressional activity on privacy issues. Acad NonFict
Lessons from the Identity Trail2009Lessons from the Identity TrailIan Kerr, Carole Lucock, and Valerie Steeves (editors)Book Acad NonFict
Liars and Outliers2012Liars and Outliers: Enabling the Trust that Society Needs to ThriveBruce SchneierBook Acad NonFict
Life After Privacy2020Life After PrivacyFirmin Debrabander$22BookLaw > PhilosophyPrivacy is gravely endangered in the digital age, and we, the digital citizens, are its principal threat, willingly surrendering it to avail ourselves of new technology, and granting the government and corporations immense power over us. In this highly original work, Firmin DeBrabander begins with this premise and asks how we can ensure and protect our freedom in the absence of privacy. Can―and should―we rally anew to support this institution? Is privacy so important to political liberty after all? DeBrabander makes the case that privacy is a poor foundation for democracy, that it is a relatively new value that has been rarely enjoyed throughout history―but constantly persecuted―and politically and philosophically suspect. The vitality of the public realm, he argues, is far more significant to the health of our democracy, but is equally endangered―and often overlooked―in the digital age. Acad NonFict, 978-1108811910Paperback : 184 pagesCambridge University Press (August 9, 2020)Cambridge University Press9-Aug-20204.86
Limits of Privacy1999The Limits of PrivacyAmitai EtzioniBook Acad NonFict
Linklaters Data Protected2021Linklaters Data Protected: International Privacy LawLinklatersWeb ResourceLawsInternational LawLINK1 Stan
Liquid Surveillance2012Liquid Surveillance: A ConversationZygmunt Bauman and David LyonBookx Acad NonFict
Listening In2017Listening In: Cybersecurity in an Insecure AgeSusan LandauBookPolitics & Social Sciences > Politics & Governmentx Acad NonFict
Little Brother2008Little BrotherCory Doctorow BookFiction Stan
Lives of Others2006The Lives of OthersFlorian Henckel von DonnersmarckMovieFictionxThe Lives of Others is a German film that won the Academy Award for best foreign language film in 2006. It is a remarkable film, and my favorite film of the ones listed here. The film depicts a Stasi surveillance officer (played by Ulrich Mühe) who is assigned to monitor a famous playwright in East Germany in the year 1984. The playwright’s home is bugged, and the Stasi officer listens in on the playwright and his girlfriend’s intimate conversations. But as he listens, he starts to question his role in the Stasi and starts to feel for the people he is monitoring. The movie is riveting and moving, and it is truly a masterpiece. Fiction
lol . . . OMG!2011lol...OMG!: What Every Student Needs to Know About Online Reputation Management, Digital Citizenship and CyberbullyingMatt IvesterBook Acad NonFict
Lost Honor of Katharina Blum1975The Lost Honor of Katharina Blum : Or How Violence Develops and Where It Can LeadLeila VennewitzBookFiction: Literature & Fiction > World Literature Fiction
Managing Privacy1994Managing Privacy: Information Technology and Corporate AmericaH. Jeff SmithBook Acad NonFict
Manipulated2020Manipulated: Inside the Cyberwar to Hijack Elections and Distort the TruthTheresa PaytonBook/AudioCybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late. Stan (ISBN-13 : 978-1538133507)Rowman & Littlefield Publishers (April 22, 2020)Rowman & Littlefield Publishers22-Apr-2020
Messing with the Enemy2019Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake NewsClint WattsBook/AudioDisinformationxClint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences. / Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts. / Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world Stan Knezevich5740062796011 (ISBN13: 9780062796011)4.02 · Rating details · 598 ratings · 119 reviewsebook, 320 pagesPublished May 29th 2018 by HarperHarper29-May-2018BEST
Michael Geist's Blog2021Michael Geist's BlogMichael GeistWeb ResourceBlogA blog with numerous articles and government reports on the Internet and law. Geist is a former member of Canada's National Task Force on Spam.LINK1
Microtargeting As Information Warfare2021Microtargeting As Information WarfareJessica DawsonPDFResearch/ReportAdTech, DisinformationxForeign influence operations are an acknowledged threat to national security. Less understood is the data that enables that influence. This paper argues that governments must recognize microtargeting – data informed individualized targeted advertising – and the current advertising economy as enabling and profiting from foreign and domestic information warfare being waged on its citizens. The Department of Defense must place greater emphasis on defending servicemembers’ digital privacy as a national security risk. Without the ability to defend this vulnerable attack space, our adversaries will continue to target this for exploitatioLINK1LINK2LINK3 Stan
Mindf*ck2019Mindf*ck: Cambridge Analytica and the Plot to Break AmericaChristopher WylieBook/AudioFor the first time, the Cambridge Analytica whistleblower tells the inside story of the data mining and psychological manipulation behind the election of Donald Trump and the Brexit referendum, connecting Facebook, WikiLeaks, Russian intelligence, and international hackers. “Mindf*ck demonstrates how digital influence operations, when they converged with the nasty business of politics, managed to hollow out democracies.”—The Washington Post Mindf*ck goes deep inside Cambridge Analytica’s “American operations,” which were driven by Steve Bannon’s vision to remake America and fueled by mysterious billionaire Robert Mercer’s money, as it weaponized and wielded the massive store of data it had harvested on individuals—in excess of 87 million—to disunite the United States and set Americans against each other. Bannon had long sensed that deep within America’s soul lurked an explosive tension. Cambridge Analytica had the data to prove it, and in 2016 Bannon had a presidential campaign to use as his proving ground. Christopher Wylie might have seemed an unlikely figure to be at the center of such an operation. Canadian and liberal in his politics, he was only twenty-four when he got a job with a London firm that worked with the U.K. Ministry of Defense and was charged putatively with helping to build a team of data scientists to create new tools to identify and combat radical extremism online. In short order, those same military tools were turned to political purposes, and Cambridge Analytica was born. Wylie’s decision to become a whistleblower prompted the largest data-crime investigation in history. His story is both exposé and dire warning about a sudden problem born of very new and powerful capabilities. It has not only laid bare the profound vulnerabilities—and profound carelessness—in the enormous companies that drive the attention economy, it has also exposed the profound vulnerabilities of democracy itself. What happened in 2016 was just a trial run. Ruthless actors are coming for your data, and they want to control what you think. Stan (ISBN-13 : 978-1984854636)Random House (October 8, 2019)Random House8-Oct-2019
Minority Report2002Minority ReportSteven SpielbergMovieAction, Adventure, Drama, Science Fiction, SuspensexBased on a story by Philip K. Dick, Minority Report, directed by Stephen Spielberg and starring Tom Cruise, chronicles the life of an officer in year 2054 who works in a special law enforcement unit that uses psychics — called “precogs” — to predict future crimes. People are arrested before the crime occurs. The movie is clever and fast-paced, but my favorite parts of the movie involve some of the less central parts or smaller diversions. The movie depicts a future surveillance society that is not cold and drab like Orwell’s world of Big Brother. This world is filled with flashing screens and and endless barrage of stimulation. The surveillance isn’t just by the government but also by businesses. Iris scanners are everywhere, and when the protagonist walks by a TV monitor, he is addressed by his name and a targeted ad is delivered to him. The movie depicts the dangers of biometric identification. If our biometric data fell into the wrong hands, would we need to resort to rather extreme means of replacing our biometric identifiers? Films
MoFo Privacy Library2021MoFo Privacy Library: International Privacy LawMorrison FosterWeb ResourceLawsInternational LawLINK1 Stan
More Essential than Ever2012More Essential than Ever: The Fourth Amendment in the Twenty First CenturyStephen J. SchulhoferBook Acad NonFict
Morrison Forrester 2020 Privacy Litigation Review2020Morrison Forrester 2020 Privacy Litigation ReviewMorrison ForresterWeb ResourceResearch/ReportLINK1
Morrison Forrester Privacy Library2020Morrison Forrester Privacy LibraryMorrison ForresterWeb ResourceLegislation LibraryLINK1
Mr Robot2015Mr RobotSam EsmailTV SeriesCrime, Drama, Thriller Elliot, a brilliant but highly unstable young cyber-security engineer and vigilante hacker, becomes a key figure in a complex game of global dominance when he and his shadowy allies try to take down the corrupt corporation he works for. Stan
Myth of the Privacy Paradox2020The Myth of the Privacy ParadoxDaniel J. SolovePDFLaw JournalPrivacy ParadoxThe behavior in the privacy paradox studies doesn’t lead to a conclusion for less regulation. On the other hand, minimizing behavioral distortion will not cure people’s failure to protect their own privacy....Professor Solove argues that giving individuals more tasks for managing their privacy will not provide effective privacy protection. Instead, regulation should employ a different strategy – focus on regulating the architecture that structures the way information is used, maintained, and transferred.LINK1LINK2LINK3 Stan LawGW LawBEST
Naked Crowd2004The Naked Crowd: Reclaiming Security and Freedom in an Anxious AgeJeffrey RosenBookx Acad NonFict
Naked Employee2003The Naked Employee: How Technology Is Compromising Workplace PrivacyFrederick LaneBook Acad NonFict
National Conference of State Legislatures2021National Conference of State LegislaturesNCSLWeb ResourceResearch/ReportState LawLINK1 Stan
Neuromancer1984NeuromancerWilliam GibsonBookFictionCyberPunk Fiction
New Directions in Surveillance and Privacy2013New Directions in Surveillance and PrivacyBenjamin J. Goold and Daniel NeylandBookTextbooks > Social SciencesxThe challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. / In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. / Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." / The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit--at the expense of democracy, freedom, and our human future. / With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future--if we let it. Acad NonFict (ISBN13: 9781610395694)4.08 · Rating details · 4,962 ratings · 857 reviewsHardcover, 691 pagesPublished January 15th 2019 by PublicAffairs (first published May 22nd 2018)PublicAffairs15-Jan-2019first published May 22nd 2018CoverEnglish240BEST
New Laws of Robotics2020New Laws of RoboticsFrank PasqualeBookBusiness & Money > IndustriesAI is poised to disrupt our work and our lives. We can harness these technologies rather than fall captive to them--but only through wise regulation. / Too many CEOs tell a simple story about the future of work: if a machine can do what you do, your job will be automated. They envision everyone from doctors to soldiers rendered superfluous by ever-more-powerful AI. They offer stark alternatives: make robots or be replaced by them. / Another story is possible. In virtually every walk of life, robotic systems can make labor more valuable, not less. Frank Pasquale tells the story of nurses, teachers, designers, and others who partner with technologists, rather than meekly serving as data sources for their computerized replacements. This cooperation reveals the kind of technological advance that could bring us all better health care, education, and more, while maintaining meaningful work. These partnerships also show how law and regulation can promote prosperity for all, rather than a zero-sum race of humans against machines. / How far should AI be entrusted to assume tasks once performed by humans? What is gained and lost when it does? What is the optimal mix of robotic and human interaction? New Laws of Robotics makes the case that policymakers must not allow corporations or engineers to answer these questions alone. The kind of automation we get--and who it benefits--will depend on myriad small decisions about how to develop AI. Pasquale proposes ways to democratize that decision making, rather than centralize it in unaccountable firms. Sober yet optimistic, New Laws of Robotics offers an inspiring vision of technological progress, in which human capacities and expertise are the irreplaceable center of an inclusive economy. Acad NonFict (ISBN13: 9780674975224)3.50 · Rating details · 4 ratings · 2 reviewsHardcover, 352 pagesPublished October 27th 2020 by Belknap PressBelknap Press27-Oct-20204.16
NISTIR 8062: Introduction to Privacy Engineering and Risk Management in Federal Systems2017NISTIR 8062: An Introduction to Privacy Engineering and Risk Management in Federal SystemsSean Brooks, Michael Garcia, Naomi Lefkovitz, Suzanne Lightman, Ellen NadeauPDFComputers & Technology > Security & EncryptionNISTxThis document provides an introduction to the concepts of privacy engineering and risk management for federal systems. These concepts establish the basis for a common vocabulary to facilitate better understanding and communication of privacy risk within federal systems, and the effective implementation of privacy principles. This publication introduces two key components to support the application of privacy engineering and risk management: privacy engineering objectives and a privacy risk model. Stan Institute of StandardsNational Institute of StandardsBEST
No Place to Hide2014No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance StateGlenn GreenwaldBookx Acad NonFict
No Place to Hide2005No Place to HideRobert O’HarrowBook Acad NonFict
Nobody’s Victim2019Nobody’s Victim: Fighting Psychos, Stalkers, Pervs and TrollsCarrie Goldberg$19BookHistory > AmericasNobody's Victim is an unflinching look at a hidden world most people don’t know exists—one of stalking, blackmail, and sexual violence, online and off—and the incredible story of how one lawyer, determined to fight back, turned her own hell into a revolution. / “We are all a moment away from having our life overtaken by somebody hell-bent on our destruction.” That grim reality—gleaned from personal experience and twenty years of trauma work—is a fundamental principle of Carrie Goldberg’s cutting-edge victims’ rights law firm. / Riveting and an essential timely conversation-starter, Nobody's Victim invites readers to join Carrie on the front lines of the war against sexual violence and privacy violations as she fights for revenge porn and sextortion laws, uncovers major Title IX violations, and sues the hell out of tech companies, schools, and powerful sexual predators. Her battleground is the courtroom; her crusade is to transform clients from victims into warriors. / In gripping detail, Carrie shares the diabolical ways her clients are attacked and how she, through her unique combination of advocacy, badass relentlessness, risk-taking, and client-empowerment, pursues justice for them all. There are stories about a woman whose ex-boyfriend made fake bomb threats in her name and caused a national panic; a fifteen-year-old girl who was sexually assaulted on school grounds and then suspended when she reported the attack; and a man whose ex-boyfriend used a dating app to send more than 1,200 men to ex's home and work for sex. With breathtaking honesty, Carrie also shares her own shattering story about why she began her work and the uphill battle of building a business. / While her clients are a diverse group—from every gender, sexual orientation, age, class, race, religion, occupation, and background—the offenders are not. They are highly predictable. In this book, Carrie offers a taxonomy of the four types of offenders she encounters most often at her firm: assholes, psychos, pervs, and trolls. “If we recognize the patterns of these perpetrators,” she explains, “we know how to fight back.” / Deeply personal yet achingly universal, Nobody's Victim is a bold and much-needed analysis of victim protection in the era of the Internet. This book is an urgent warning of a coming crisis, a predictor of imminent danger, and a weapon to take back control and protect ourselves—both online and off. Acad NonFict ISBN-13 : 978-0525533771Hardcover : 304 pagesPlume (August 13, 2019)Plume13-Aug-20194.5116
None of Your Damn Business2019None of Your Damn Business: Privacy in the United States from the Gilded Age to the Digital AgeLawrence CappelloBookTextbooks > Humanities Acad NonFict
Not a Suicide Pact2006Not a Suicide Pact: The Constitution in a Time of National Emergency (Inalienable Rights)Richard PosnerBook Acad NonFict
Nothing to Hide2011Nothing to Hide: The False Tradeoff Between Privacy and SecurityDaniel J. SoloveBookxx“If you’ve got nothing to hide,” many people say, “you shouldn’t worry about government surveillance.” Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. / In addition to attacking the “Nothing-to Hide Argument,” Solove exposes the fallacies of pro-security arguments that have often been used to justify government surveillance and data mining. These arguments – such as the “Luddite Argument,”the “War-Powers Argument,” the “All-or-Nothing Argument,” the “Suspicionless-Searches Argument,” the “Deference Argument,” and the “Pendulum Argument” – have skewed law and policy to favor security at the expense of privacy. / The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. But protecting privacy isn’t fatal to security measures; it merely involves adequate oversight and regulation. / The primary focus of the book is on common pro-security arguments, but Solove also discusses concrete issues of law and technology, such as the Fourth Amendment Third Party Doctrine, the First Amendment, electronic surveillance statutes, the USA-Patriot Act, the NSA surveillance program, and government data mining. Acad NonFict
NRF Data Protection Report2021NRF Data Protection ReportNorton Rose Fulbright LLPWeb ResourceBlogData protection legal insight at the speed of technologyLINK1 Stan
Obfuscation2015Obfuscation: A User's Guide to Privacy and ProtestFinn BruntonBook
Obscurity and Privacy2014Obscurity and PrivacyWoodrow Hartzog, Evan SelingerPDFResearch/ReportAnonyminity‘Obscurity’ is a distinctive concept in the privacy literature that has recently been gaining attention due to increasing frustration with the theoretical and practical limits of traditional privacy theory. Obscurity identifies some of the fundamental ways information can be obtained or kept out of reach, correctly interpreted or misunderstood. Appeals to obscurity can generate explanatory power, clarifying how advances in the sciences of data collection and analysis, innovation in domains related to information and communication technology, and changes to social norms can alter the privacy landscape and give rise to three core problems: 1) new breaches of etiquette, 2) new privacy interests, and 3) new privacy harms.LINK1LINK2 Stan
Of Privacy and Power2019Of Privacy and Power: The Transatlantic Struggle over Freedom and SecurityHenry Farrell, Abraham L. NewmanBook/AudioxHow disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future / We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. / This means that states’ jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? / Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship / The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitionsâ€"one favoring security, the other libertyâ€"whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden’s revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate. The first serious study of how the politics of surveillance has been transformed, Of Privacy and Power offers a fresh view of the role of information and power in a world of economic interdependence Acad NonFict Grove532BEST
Offensive Internet2012The Offensive Internet: Speech, Privacy, and ReputationSaul Levmore & Martha C. Nussbaum, editorsBook Acad NonFict
Official Secrets2019Official SecretsGavin HoodMovieBiography, Crime, DramaThe true story of a British whistleblower who leaked information to the press about an illegal NSA spy operation designed to push the UN Security Council into sanctioning the 2003 invasion of Iraq. Stan
On Rumors2009On RumorsCass SunsteinBook/Audio Acad NonFict
On The End of Privacy2019On the End of Privacy: Dissolving Boundaries in a Screen-Centric WorldRichard E. MillerBookReference > Words, Language & Grammar Acad NonFict
Online Guide to Practical Privacy Tools2021EPIC Online Guide to Practical Privacy ToolsElectronic Privacy Information CenterWeb ResourceToolsLINK1 Stan
Outrageous Invasions2010Outrageous Invasions: Celebrites’ Private Lives, Media, and the LawRobin D. BarnesBook Acad NonFict
Overseers of the Poor2001Overseers of the Poor : Surveillance, Resistance, and the Limits of PrivacyJohn GilliomBookx Acad NonFict
Peep Diaries2009The Peep Diaries: How We’re Learning to Love Watching Ourselves and Our NeighborsHal NiedzvieckiBook Acad NonFict
Permanent Record2019Permanent RecordEdward SnowdenBook Acad NonFict
Philosophical Dimensions of Privacy1984Philosophical Dimensions of Privacy: An AnthologyFerdinand SchoemanBook Acad NonFict
Politics of Privacy1981The Politics of Privacy: Planning for Personal Data Systems as Powerful TechnologiesJames B. RuleBook Acad NonFict
Politics of Privacy in Contemporary Native2020The Politics of Privacy in Contemporary Native, Latinx and Asian American MetafictionsColleen Eils$70BookFiction: Literature & Fiction > History & CriticismThe Politics of Privacy in Contemporary Native, Latinx, and Asian American Metafictions is the first book-length study to approach contemporary issues of racialized visibility and privacy through narrative form. Using a formal maneuver, narrative privacy, Colleen G. Eils analyzes how writers of contemporary metafictions explicitly withhold stories from readers to illuminate and theorize the politics of privacy in a post–9/11 US context. As a formal device and reading strategy, narrative privacy has two primary critical interests: affirming the historically political nature of visibility, particularly for people of color and indigenous people, and theorizing privacy as a political assertion of power over representation and material vulnerability. Acad NonFict State University Press; 1st edition (September 11, 2020)Ohio State University Press11-Sep-20201st edition
Poverty of Privacy Rights2017Poverty of Privacy RightsKhiara M. Bridges, ThBook Acad NonFict
Practical Guide to Data Privacy Laws by Country2021A Practical Guide to Data Privacy Laws by Countryi-sight.comWeb ResourceLawsInternational LawLINK1 Stan
Practical Guide to HIPAA Privacy and Security Compliance2014The Practical Guide to HIPAA Privacy and Security ComplianceRebecca Herold and Kevin BeaverBookx Acad NonFict
Practical Synthetic Data Generation2020Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of DataKhaled El Emam, Lucy Mosquera, Richard HoptroffBookSynthetic DataBuilding and testing machine learning models requires access to large and diverse data. But where can you find usable datasets without running into privacy issues? This practical book introduces techniques for generating synthetic data—fake data generated from real data—so you can perform secondary analysis to do research, understand customer behaviors, develop new products, or generate new revenue. Data scientists will learn how synthetic data generation provides a way to make such data broadly available for secondary purposes while addressing many privacy concerns. Analysts will learn the principles and steps for generating synthetic data from real datasets. And business leaders will see how synthetic data can help accelerate time to a product or solution. Stan
Predict and Surveil2020Predict and Surveil: Data, Discretion and the Future of PolicingSarah Brayne$20BookComputers & Technology > History & CulturexThe scope of criminal justice surveillance has expanded rapidly in recent decades. At the same time, the use of big data has spread across a range of fields, including finance, politics, healthcare, and marketing. While law enforcement's use of big data is hotly contested, very little is known about how the police actually use it in daily operations and with what consequences. / In Predict and Surveil, Sarah Brayne offers an unprecedented, inside look at how police use big data and new surveillance technologies, leveraging on-the-ground fieldwork with one of the most technologically advanced law enforcement agencies in the world-the Los Angeles Police Department. Drawing on original interviews and ethnographic observations, Brayne examines the causes and consequences of algorithmic control. She reveals how the police use predictive analytics to deploy resources, identify suspects, and conduct investigations; how the adoption of big data analytics transforms police organizational practices; and how the police themselves respond to these new data-intensive practices. Although big data analytics holds potential to reduce bias and increase efficiency, Brayne argues that it also reproduces and deepens existing patterns of social inequality, threatens privacy, and challenges civil liberties. / A groundbreaking examination of the growing role of the private sector in public policing, this book challenges the way we think about the data-heavy supervision law enforcement increasingly imposes upon civilians in the name of objectivity, efficiency, and public safety. Acad NonFict, 978-0190684099Hardcover : 224 pagesOxford University Press; 1st edition (November 2, 2020)Oxford University Press2-Nov-20201st edition4.4
Prediction Machines2018Prediction Machines: The Simple Economics of Artificial IntelligenceAjay Agrawal, Joshua Gans, and Avi GoldfarbBook Acad NonFict
Pride and Prejudice1813Pride and PrejudiceJane AustenBookFiction Fiction
Primer on Data Privacy Enforcement Options2020A Primer on Data Privacy Enforcement OptionsJennifer HuddlestonPDFResearch/ReportPrivacy EnforcementEnforcement options for a federal data privacy law often are presented as a binary choice—either give people the right to sue, or maintain the status quo—but in reality a wide range of options exist. There are five general categories of potential enforcement mechanisms that policymakers might consider in various data privacy proposalsLINK1LINK2 Stan Action ForumAmerican Action ForumBEST
Privacy2012PrivacyGarret KeizerBook Acad NonFict
Privacy 3.02018Privacy 3.0: Unlocking Our Data-Driven FutureRahul MatthanBook/AudioOur personal space is dear to us all. We live our lives in full public view on social media posting photos of the food we just ate or even expressing intimate feelings for our loved ones but there are still things we would rather not share with the world. Indeed, it is privacy that sets man apart from the animals who must stick together in the wild for their own safety. But mankind was not born private. Our primitive ancestors too lived in large groups, every member of which knew all there was to know about the others. Privacy evolved over time as man developed technologies to wall himself off, even as he remained part of the society at large. But just as some technologies enhanced privacy, others such as the printing press or the portable camera chipped away at it. Every time this happened, man opposed the technology at first but made his peace with it eventually to benefit from the obvious good it could do. We are at a similar crossroads today with data technologies. Aadhaar is one example of the many ways in which we have begun to use data in everything we do. While it has made it far easier to avail of services from the government and private enterprises than ever before, there are those who rightly worry about people s private data being put to ill use and, worse, without consent. But this anxiety is no different from that which we felt during the teething troubles of every previous technology we adopted. What we really need is a new framework that unlocks the full potential of a data-driven future while still safeguarding what we hold most dear our privacy. In this pioneering work, technology lawyer Rahul Matthan traces the changing notions of privacy from the earliest times to its evolution through landmark cases in the UK, US and India. In the process, he re-imagines the way we should be thinking about privacy today if we are to take full advantage of modern data technologies, cautioning against getting so obsessed with their potential harms that we design our laws to prevent us from benefiting from them at all. Stan India (July 5, 2018),204,203,200_QL40_FMwebp_.jpgBEST
Privacy Act Information2020Privacy Act InformationFCCWeb ResourcePrivacy ActLINK1 IAPP Auth Resources
Privacy Advocates2010The Privacy Advocates: Resisting the Spread of SurveillanceColin J. BennettBookx Acad NonFict
Privacy and Data Protection in Brazil2020Privacy and Data Protection in Brazil: A comprehensive and Practical Guide on the LGPDAline Fuke Fachinetti$35BookThe Brazilian Data Protection Law (Law No. 13.709 of 2018, Lei Geral de Proteção de Dados Pessoais), also known as “LGPD” was established in August 2018 to remedy the lack of comprehensive privacy and data protection regulation in Brazil, profoundly changing the landscape on such protection in the country. The new law creates data protection concepts and rules that apply to both public and private sector organizations, regardless of where they are located, if they fall within the scope of the law.The LGPD is viewed by many lawyers and privacy specialists as inspired and derived from the European Union (EU) General Data Protection Regulation (GDPR). This book is comprehensive and Practical Guide on the LGPD and includes, as a bonus, the translated version of the LGPD. Acad NonFict published (September 30, 2020)Independently published30-Sep-2020BEST
Privacy and Data Security2020Privacy and Data Security: State of California Department of JusticeOffice of the Attorney GeneralWeb ResourceCCPAxLINK1 IAPP Auth Resources
Privacy and digital ethics after the pandemic2021Privacy and digital ethics after the pandemicCarissa VélizPDFResearch/ReportAI, Ethics, CovidThe increasingly prominent — and inescapable — role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. / The coronavirus pandemic has permanently changed our relationship with technology, accelerating the drive towards digitization. While this change has brought advantages, such as increased opportunities to work from home and innovations in e-commerce, it has also been accompanied with steep drawbacks, which include an increase in inequality and undesirable power dynamics.LINK1LINK2 Stan
Privacy and Freedom1967Privacy and FreedomAlan WestinBookIn defining privacy as “the claim of individuals…to determine for themselves when, how and to what extent information about them is communicated,” Alan Westin’s 1967 classic Privacy and Freedom laid the philosophical groundwork for the current debates about technology and personal freedom, and is considered a foundational text in the field of privacy law. By arguing that citizens retained control over how their personal data was used, Westin redefined privacy as an individual freedom, taking Justice Louis Brandeis’ 19th century definition of privacy as a legal right and expanding it for use in modern times. Westin’s ideas transformed the meaning of privacy, leading to a spate of privacy laws in the 1970s, as well as prefiguring the arguments over privacy that have come to dominate the internet era. Acad NonFict
Privacy and Human Behavior2015Privacy and Human Behavior in the Age of InformationAlessandro Acquisti, Laura Brandimarte, George LoewensteinPDFResearch/ReportBehavioral EconomicsThis Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people’s uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people’s concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age.LINK1LINK2 Stan 30 Jan 2015: Vol. 347, Issue 6221, pp. 509-514 DOI: 10.1126/science.aaa1465Science 30-Jan-2015Vol. 347, Issue 6221, pp. 509-514 DOI: 10.1126/science.aaa1465BEST
Privacy and Human Rights2006Privacy and Human RightsElectronic Privacy Information Center & Privacy InternationalBook Acad NonFict
Privacy and Security Training Requirements2020Privacy and Security Training RequirementsDaniel SoloveWeb ResourceTrainingxMany laws, regulations, and industry codes require privacy awareness training and/or data security awareness training. This lists of a number of these requirements.LINK1 Stan
Privacy and Technology2014Privacy and Technology: Standards and Practices for Engineers and Security and IT ProfessionalsJ.C. CannonBookx Acad NonFict
Privacy and the Past2016Privacy and the Past: Research, Law, Archives, EthicsSusan C. LawrenceBookTextbooks > Medicine & Health Sciences Acad NonFict,978-0813574363CoverEnglish188BEST
Privacy and the Press1972Privacy and the Press; The Law, the Mass Media, and the First AmendmentDon R. PemberBook Acad NonFict
Privacy as Trust2018Privacy as Trust: Information Privacy for an Information AgeAri Ezra WaldmanBookPolitics & Social Sciences > Politics & Government Acad NonFict
Privacy at Risk2007Privacy at Risk: The New Government Surveillance and the Fourth AmendmentChristopher SloboginBookx Acad NonFict
Privacy at the Margins2020Privacy at the MarginsScott Skinner-Thompson$33BookTextbooks > Social SciencesminoritiesxLimited legal protections for privacy leave minority communities vulnerable to concrete injuries and violence when their information is exposed. In Privacy at the Margins, Scott Skinner-Thompson highlights why privacy is of acute importance for marginalized groups. He explains how privacy can serve as a form of expressive resistance to government and corporate surveillance regimes - furthering equality goals - and demonstrates why efforts undertaken by vulnerable groups (queer folks, women, and racial and religious minorities) to protect their privacy should be entitled to constitutional protection under the First Amendment and related equality provisions. By examining the ways even limited privacy can enrich and enhance our lives at the margins in material ways, this work shows how privacy can be transformed from a liberal affectation to a legal tool of liberation from oppression. Acad NonFict : 234 pagesCambridge University Press (November 5, 2020)Cambridge University Press5-Nov-20205
Privacy by Prosser1960Privacy, 48 Cal. L. Rev. 383William L. ProsserPDFLaw JournalLINK1LINK2LINK3 Stan Law ReviewCal Law ReviewBEST
Privacy Enforcement Casebook2020Privacy Enforcement Casebook: A Guide to Regulators’ Priorities and ExpectationsCaitlin Fennessy (Editor)BookTextbookxSince the IAPP last published a privacy casebook in 2011, new data protection laws have been adopted by countries around the world, resulting in a significant uptick in privacy enforcement actions globally. Although by no means exhaustive, this casebook presents noteworthy privacy cases from around the world. These cases offer organizations insights into regulators’ priorities and expectations, which can inform the development of privacy programs that align with them. / The casebook is organized by geographic region. Prior to presenting cases in a particular region or country, a brief overview of key laws and regulators is provided to assist the reader in understanding the legal landscape in which the cases were brought. While countries have adopted different legal frameworks and approaches to regulating the collection, use, storage and flow of personal information, all are largely based on the same overarching fair information practice principles: (1) collection limitation; (2) data quality; (3) purpose specification; (4) use limitation; (5) security safeguards; (6) openness; (7) individual participation; and, (8) accountability. / Each case presented is tagged with one or two FIPPs to serve as an organizing principle (see index) and highlight the commonalities that cross borders, laws, frameworks and regimes. As widely accepted principles, relevant FIPPs are identified to assist organizations in analyzing privacy risks across jurisdictions and identifying suitable mitigation strategies. / The cases and laws presented here are summarized to capture the important elements for a practicing privacy professional. This casebook does not offer legal advice and is intended to be used for informational purposes only. Given the rapidly evolving legal and technological environment, it is important to confirm the current status of the laws or case cited before relying on these materials.LINK1LINK2LINK3 CIPP/US IAPP Auth Resources & CIPP/E IAPP Auth Resources, 9781948771306The Westin Research Center. IAPP. 2020.The Westin Research Center. IAPP12-Jul-1905BEST
Privacy Engineer’s Companion2020The Privacy Engineer’s Companion: A Workbook of Guidance Tools, Methodologies, and TemplatesMichelle Finneran Dennedy et al. BookxEngineer privacy into software, systems, and applications. This book is a resource for developers, engineers, architects, and coders. It provides tools, methodologies, templates, worksheets, and guidance on engineering privacy into software―from ideation to release and beyond―for technologies, products, systems, solutions, and applications. / This book can be used in conjunction with the ApressOpen bestseller, The Privacy Engineer’s Manifesto. This book trains and equips users to engage in their own privacy scoping requirements workshops, write privacy use cases or “stories” for agile development, document UI privacy patterns, conduct assessments, and align with product and information security teams. And, perhaps most importantly, the book brings clarity to a vitally important need―the protection of personal information―that is often shrouded in mystery during the engineering process. Go from policy to code to QA to value, all within these pages IAPP Auth Resources, 1484237056276ApressOpenApressOpen12-Jul-1905BEST
Privacy Engineer’s Manifesto2014The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value (1st Ed)Michelle Finneran Dennedy, Jonathan Fox, and Thomas R. FinneranBook Acad NonFict
Privacy Engineering2015Privacy Engineering: A Dataflow and Ontological ApproachIan OliverBook Acad NonFict
Privacy Expert’s Guide to AI and Machine Learning2018The Privacy Expert’s Guide to AI and Machine LearningFuture of Privacy ForumPDFResearch/ReportAI, MLLINK1LINK2 Stan
Privacy Homo Economicus2014Alan Westin's Privacy Homo EconomicusChris Hoofnagle, Jennifer UrbanPDFLaw JournalNotice & ChoiceThis Article contributes to the ongoing debate about notice and choice in two main ways. First, we consider the legacy of Professor Alan F. Westin, whose survey work greatly influenced the development of the notice-and-choice regime, and engage in sustained textual analysis, empirical testing, and critique of that work. Second, we report on original survey research exploring Americans' knowledge, preferences, and attitudes about a wide variety of data practices in online and mobile markets. This work both calls into question long-standing assumptions used by Westin and lends new insight into consumers' privacy knowledge and preferences.LINK1LINK2LINK3 Stan LawBerkeley LawBEST
Privacy in Colonial New England1972Privacy in Colonial New England 1630-1776David H. FlahertyBook Acad NonFict
Privacy in Context2009Privacy in Context: Technology, Policy, and the Integrity of Social LifeHelen NissenbaumBook Acad NonFict
Privacy in Pandemic2020Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 CrisisTiffany C. LiPDFLaw JournalCovid-19The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. / This Article is the first comprehensive account of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both widescale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social salience, and with a critical awareness of digital and political inequities, crafting normative recommendations with these concepts in mind. / Understanding privacy in this time of pandemic is critical for law and policymaking in the near future and for the long-term goals of creating a future society that protects both civil liberties and public health. It is also important to create a contemporary scholarly understanding of privacy in pandemic at this moment in time, as a matter of historical record. By examining privacy in pandemic, in the midst of pandemic, this Article seeks to create a holistic scholarly foundation for future work on privacy, technology, public health, and legal responses to global crises.LINK1LINK2LINK3 Privacy Papers Award University Chicago Law Journal, Volume 52, Issue 3 (Mar. 2021 Forthcoming)Loyola University Chicago Law Journal1-Mar-2021Forthcoming Volume 52, Issue 3BEST
Privacy in Peril2007Privacy in Peril: How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (1st Ed)James B. RuleBook Acad NonFict
Privacy in the Age of Big Data2015Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your FamilyTheresa Payton, Ted ClaypooleBookDigital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to get just-in-time coupons, directions when we’re lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Stan
Privacy in the Modern Age2015Privacy in the Modern Age: The Search for SolutionsMarc Rotenberg, Julia Horwitz, and Jeramie Scott editorsBook Acad NonFict
Privacy in the New Media Age2015Privacy in the New Media AgeJon L. MillsBookTextbooks > Communication & Journalism Acad NonFict
Privacy International: News2020Privacy International: NewsPrivacy InternationalWeb ResourceBlog/NewsPrivacy International challenges overreaching state and corporate surveillance, so that people everywhere can have greater security and freedom through greater personal privacy.LINK1 Stan
Privacy Is Power2020Privacy is Power: Why and How You Should Take Back Control of Your DataCarissa VélizBook/Audio Stan Gregory461BEST
Privacy Law Fundamentals2019Privacy Law FundamentalsDaniel J. Solove, Paul M. Schwartz$75BookTextbookThe 2019 edition of the popular Privacy Law Fundamentals incorporates extensive new developments in privacy law. / Privacy Law Fundamentals delivers vital information in a concise and digestible manner. It includes key provisions of privacy statutes; leading cases; tables summarizing the statutes; summaries of key state privacy laws; and overviews of various agency enforcement actions.The fourth edition of the popular Privacy Law Fundamentals text incorporates extensive developments in privacy law and includes an introductory chapter summarizing key new laws, cases and enforcement actions. / Privacy Law Fundamentals is no treatise—its accessible, portable format delivers vital information in a concise and digestible manner. It includes key provisions of privacy statutes; leading cases; tables summarizing the statutes (private rights of action, preemption, liquidated damages, etc.); summaries of key state privacy laws; an overview of FTC enforcement actions; and answers to frequently asked questions Acad NonFict (ISBN13: 9780979590191)3.52 · Rating details · 23 ratings · 4 reviewsHardcover, 189 pagesPublished by International Association of Privacy Professi (first published January 1st 2013)IAPP11-Jul-1905first published January 1st 20133.66CoverBEST
Privacy Life and Privacy in Nazi Germany2020Privacy Life and Privacy in Nazi GermanyEdited by Elizabeth Harvey, Johannes Hürter, Maiken Umbach, Andreas Wirsching$33BookTextbooks > HumanitiesWas it possible to have a private life under the Nazi dictatorship? It has often been assumed that private life and the notion of privacy had no place under Nazi rule. Meanwhile, in recent years historians of Nazism have been emphasising the degree to which Germans enthusiastically embraced notions of community. This volume sheds fresh light on these issues by focusing on the different ways in which non-Jewish Germans sought to uphold their privacy. It highlights the degree to which the regime permitted or even fostered such aspirations, and it offers some surprising conclusions about how private roles and private self-expression could be served by, and in turn serve, an alignment with the community. Furthermore, contributions on occupied Poland offer insights into the efforts by 'ethnic Germans' to defend their aspirations to privacy and by Jews to salvage the remnants of private life in the ghetto. Acad NonFict, 978-1108719032Paperback : 410 pagesCambridge University Press (June 18, 2020)Cambridge University Press18-Jun-2020CoverBEST
Privacy Matters: DLA Piper Blog2020Privacy Matters: DLA Piper BlogDLA PiperWeb ResourceBlogPrivacy Matters is written and maintained by DLA Piper's Data Protection and Privacy practice. Posts update readers about legal matters and regulations regarding data protection, plus include analysis of data protection happenings around the world.LINK1 Stan
Privacy on the Ground2015Privacy on the Ground: Driving Corporate Behavior in the United States and EuropeKenneth A. Bamberger & Deirdre K. MulliganBookBusiness & Money > EconomicsBarely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on the ground” in changing corporate (or government) behavior—until now. / This paper is the Introduction from the book, Privacy on the Ground: Driving Corporate Behavior in the US and Europe, an intensive five-nation study that goes inside corporations to examine how the people charged with protecting privacy actually do their work, and what kinds of regulation effectively shape their behavior. / The research yields a surprising result. The countries with more ambiguous regulation—Germany and the United States—had the strongest corporate privacy management practices, despite very different cultural and legal environments. The more rule-bound countries—like France and Spain—trended instead toward compliance processes, not embedded privacy practices. At a crucial time, when Big Data and the Internet of Things are snowballing, Privacy on the Ground helpfully searches out the best practices by corporations, provides guidance to policymakers, and offers important lessons for everyone concerned with privacy, now and in the future. Acad NonFict
Privacy on the Line1999Privacy on the Line: The Politics of Wiretapping and EncryptionWhitfield Diffie & Susan LandauBook Acad NonFict
Privacy Podcast Database2021Privacy Podcast DatabaseJeff JockischWeb ResourcePodcastsCovers 54 Privacy-related Podcasts. It's a spreadsheet so it's sortable on any number of fields. - Links to the content on Apple Podcasts, Google Podcasts, Spotify/Stitcher, and the native website. - Info on the most recent episode and headers for other recent episodes - Podcast summaries, icons, topics tags, moreLINK1 Stan JockischJeff JockischBEST
Privacy Professor2020Data Security & Privacy TrainingRebecca HeroldWeb ResourceTrainingxLINK1 IAPP Auth Resources
Privacy Program Management2019Privacy Program Management: Tools for Managing Privacy Within Your OrganizationRussell R. Densmore$75BookTextbook: Computers & Technology > History & CulturePrivacy program management is here to stay, and the need for sophisticated leaders who understand the complexities of the global digital marketplace will only increase. / Privacy Program Management: Tools for Managing Privacy Within Your Organization provides the critical tools necessary for anyone responsible for managing privacy program governance and operations within their organization. / Reorganized with expanded topics relevant to privacy program leaders, the second edition takes a global view of privacy managers’ obligations and practices IAPP Auth Resources IAPP, 2019. (Digital and Print Copies available)Portsmouth: IAPP Publications11-Jul-1905Print & Digital copies4.5
Privacy Revisited2016Privacy Revisited: A Global Perspective on the Right to Be Left AloneRonald J. KrotoszynskiBookLaw > Constitutional Law Acad NonFict
Privacy Rights2010Privacy Rights: Moral and Legal FoundationsAdam D. MooreBook Acad NonFict
Privacy, Due Process and the Computational Turn2013Privacy, Due Process and the Computational TurnMireille Hildebrandt and Katja de Vries, editorsBook Acad NonFict
Privacy, Property, and Free Speech2012Privacy, Property, and Free Speech: Law and the ConstitutionJeffrey RosenBook/AudioOnline CoursexAlthough the courts have struggled to balance the interests of individuals, businesses, and law enforcement, the proliferation of intrusive new technologies puts many of our presumed freedoms in legal limbo. For instance, it's not hard to envision a day when websites such as Facebook or Google Maps introduce a feature that allows real-time tracking of anyone you want, based on face-recognition software and ubiquitous live video feeds. / Does this scenario sound like an unconstitutional invasion of privacy? These 24 eye-opening lectures immerse you in the Constitution, the courts, and the post-9/11 Internet era that the designers of our legal system could scarcely have imagined. Professor Rosen explains the most pressing legal issues of the modern day and asks how the framers of the U.S. Constitution and the Bill of Rights would have reacted to aspects of the modern life such as full-body scans, cell phone surveillance, and privacy in cloud servers. / Called "the nation's most widely read and influential legal commentator" by the Los Angeles Times, Professor Rosen is renowned for his ability to bring legal issues alive - to put real faces and human drama behind the technical issues that cloud many legal discussions. Here he asks how you would decide particular cases about liberty and privacy. You'll come away with a more informed opinion about whether modern life gives even the most innocent among us reason to worry Stan Rosen7201682763692 (ISBN13: 9781682763698)4.19 · Rating details · 143 ratings · 18 reviewsPublished December 18th 2012 by The Great Courses (first published January 1st 2012)The Great Courses 18-Dec-2012first published January 1st 2012BEST
Privacy, Security and Accountability2015Privacy, Security and Accountability: Ethics, Law and PolicyAdam D. Moore (editor)Bookx Acad NonFict
Privacy: A Personal Chronicle2019Privacy: A Personal ChronicleSimon DaviesBookPrivacy has become one of the most important public policy issues of our time, but how did we get here? What events and campaigns inspired this crucial issue? In Privacy: A Personal Chronicle, author Simon Davies, one of the pioneers of the privacy movement, recounts his personal experience from the 1980's in establishing the global privacy advocacy movement and tells the inside story of some of the campaigns that ended up changing the world. From the pre-Internet analogue era to the time of mass digital surveillance, this is the narrative of one person's journey through the maze of one of the modern world's most important and controversial rights.The book takes you on a journey from the remote deserts of Africa to the board rooms of the world's most influential corporations. It recounts campaigns that held the most powerful entities on earth to account. And, perhaps more important, it describes how an ordinary person – with the guidance of astute campaigning tactics – can help shift the perceptions of entire nations.It also offers a digestible primer for anyone interested in this field and who wants to understand the basis of law and technology. Stan
Privacy: Past, Present and Future2020Privacy: Past, Present, And FutureLeslie N. Gruis$30BookxxTop analyst Leslie Gruis’s timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them. Acad NonFict, 978-1680531862Hardcover : 280 pagesAcademica Press (February 20, 2020)Academica Press20-Feb-2020BEST
Privacy: Studies in Social and Cultural History1984Privacy: Studies in Social and Cultural HistoryBarrington Moore, Jr.Book Acad NonFict
Privacy: The Frontier of Social Evolution2013Privacy: The Frontier of Social EvolutionTimothy M Jurgensen, PrivacyBook Acad NonFict
Privacy: The Lost Right2008Privacy: The Lost RightJon MillsBook Acad NonFict
Privacy's Constitutional Moment and the Limits of Data Protection2020Privacy's Constitutional Moment and the Limits of Data ProtectionWoodrow Hartzog, Neil M. RichardsPDFLaw JournalPolicyAmerica’s privacy bill has come due. Since the dawn of the Internet, Congress has repeatedly failed to build a robust identity for American privacy law. But now both California and the European Union have forced Congress’s hand by passing the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR). These data protection frameworks, structured around principles for Fair Information Processing called the “FIPs,” have industry and privacy advocates alike clamoring for a “U.S. GDPR.” States seemed poised to blanket the country with FIP-based laws if Congress fails to act. The United States is thus in the midst of a “constitutional moment” for privacy, in which intense public deliberation and action may bring about constitutive and structural change. And the European data protection model of the GDPR is ascendant. / In this article we highlight the risks of U.S. lawmakers embracing a watered-down version of the European model as American privacy law enters its constitutional moment. European-style data protection rules have undeniable virtues, but they won’t be enough. The FIPs assume data processing is always a worthy goal, but even fairly processed data can lead to oppression and abuse. Data protection is also myopic because it ignores how industry’s appetite for data is wrecking our environment, our democracy, our attention spans, and our emotional health. Even if E.U.-style data protection were sufficient, the United States is too different from Europe to implement and enforce such a framework effectively on its European law terms. Any U.S. GDPR would in practice be what we call a “GDPR-Lite.” / Our argument is simple: In the United States, a data protection model cannot do it all for privacy, though if current trends continue, we will likely entrench it as though it can. Drawing from constitutional theory and the traditions of privacy regulation in the United States, we propose instead a “comprehensive approach” to privacy that is better focused on power asymmetries, corporate structures, and a broader vision of human well-being. Settling for an American GDPR-lite would be a tragic ending to a real opportunity to tackle the critical problems of the information age. In this constitutional moment for privacy, we can and should demand more. This article offers a path forward to do just that.LINK1LINK2LINK3 Stan College Law ReviewBoston College Law Review12-Jul-1905BEST
Privacy’s Blueprint2018Privacy’s Blueprint: The Battle to Control the Design of New TechnologiesWoodrow HartzogBookComputers & Technology > Computer Science Acad NonFict
Privacy’s Perfect Storm2020Privacy’s Perfect Storm: Digital Policy for the Post-Pandemic TimesStuart N. Brotman$8BookThe COVID-19 pandemic has expanded our online world at work and home to record levels. Our most personal and confidential data is being collected from multiple digital devices and stored, disseminated, and sold to government and commercial organizations, often without our knowledge, consent, or control. We are all now in Privacy’s Perfect Storm, which includes recent efforts by the European Union and the United States to set new legal boundaries. / Stuart N. Brotman offers a thoughtful guide to achieving better digital privacy protection in these turbulent times. He provides a consistently thoughtful, transparent, and inclusive approach to tech regulation, always considering what policies might best serve the public and our digital society. / Stuart Brotman brings a constructive new perspective to the digital privacy dialogue. Drawing on his extensive background as policy adviser, legal analyst, and business consultant, Stuart brings his unique brand of visionary thinking to bear, synthesizing a fresh multi-stakeholder approach to digital privacy policy. His insights on how the COVID-19 pandemic will continue to affect digital privacy in the post-pandemic world are especially prescient. Stuart moves far beyond conventional wisdom in this fascinating and thought-provoking collection of essays. A “must read” for anyone who cares about digital privacy in all its facets—and wants to be ready for what lies ahead. -- Richard T. Kaplar Acad NonFict, 978-1939282484Paperback : 171 pagesMiniver Press (August 4, 2020)Miniver Press4-Aug-2020BEST
Private Eye2014The Private EyeBrian K. Vaughan, Marcos Martin, Muntsa VicenteGraphic NovelFiction Fiction
PrivSec Report2020PrivSec ReportPrivSec ReportWeb ResourceBlogxPrivSec.Report provides the latest news, information and advice on cybercrime and data protection from thought leaders and sector experts, creating and curating engaged GRC market places. PrivSec.Report is produced by Data Protection World Forum, producers of leading content for the privacy and security sector.LINK1 Stan
Propaganda2004PropagandaEdward Bernays, Mark Crispin Miller - introductionBook/AudioDisinformationA seminal and controversial figure in the history of political thought and public relations, Edward Bernays (1891–1995), pioneered the scientific technique of shaping and manipulating public opinion, which he famously dubbed “engineering of consent.” During World War I, he was an integral part of the U.S. Committee on Public Information (CPI), a powerful propaganda apparatus that was mobilized to package, advertise and sell the war to the American people as one that would “Make the World Safe for Democracy.” The CPI would become the blueprint in which marketing strategies for future wars would be based upon. Bernays applied the techniques he had learned in the CPI and, incorporating some of the ideas of Walter Lipmann, became an outspoken proponent of propaganda as a tool for democratic and corporate manipulation of the population. His 1928 bombshell Propaganda lays out his eerily prescient vision for using propaganda to regiment the collective mind in a variety of areas, including government, politics, art, science and education. To read this book today is to frightfully comprehend what our contemporary institutions of government and business have become in regards to organized manipulation of the masses. This is the first reprint of Propaganda in over 30 years and features an introduction by Mark Crispin Miller, author of The Bush Dyslexicon: Observations on a National Disorder. Stan Gardner2820970312598 (ISBN13: 9780970312594)3.83 · Rating details · 4,304 ratings · 497 reviewsPaperback, 168 pagesPublished September 1st 2004 by Ig Publishing (first published 1928)Ig Publishing1-Sep-2004first published 1928BEST
Proskauer on Privacy2006Proskauer on Privacy: A Guide to Privacy and Data Security Law in the Information AgeChristopher Wolf (editor)Book Acad NonFict
Proskauer Privacy Law Blog2020Proskauer Privacy Law BlogProskauer Rose LLPWeb ResourceBlogThe Privacy Law Blog is written by the Proskauer Rose Privacy & Data Security Group and gives updates on privacy legal issues.LINK1 Stan
Prosser's Privacy Law: A Mix acy Law: A Mixed Legacy2010Prosser's Privacy Law: A Mix acy Law: A Mixed LegacyDaniel J. Solove, Neil M. Richards PDFLaw JournalNotice & ConsentThis Article examines the complex ways in which William Prosser shaped the development of the American law of tort privacy. Although Prosser certainly gave tort privacy an order and legitimacy that it had previously lacked, he also stunted its development in ways that limited its ability to adapt to the problems of the Information Age. His skepticism about privacy, as well as his view that tort privacy lacked conceptual coherence, led him to categorize the law into a set of four narrow categories and strip it of any guiding concept to shape its future development. Prosser’s legacy for tort privacy law is thus a mixed one: He greatly increased the law’s stature at the cost of giving it no guidance and making it less able to adapt to new circumstances in the future. If tort privacy is to remain vital in a digital age, it must move beyond Prosser’s conception.LINK1LINK2LINK3 Stan Washington University Law School,George Washington University Law SchoolBEST
Protecting Personal Information2019Protecting Personal Information: The Right to Privacy ReconsideredAndrea Monti and Raymond WacksBook Acad NonFict
Protecting Privacy in Surveillance Societies1992Protecting Privacy in Surveillance SocietiesDavid H. FlahertyBookx Acad NonFict
Protecting Student Data Privacy2019Protecting Student Data Privacy: Classroom FundamentalsLinnette AttaiBook Acad NonFict
Public Parts2011Public Parts: How Sharing in the Digital Age Improves the Way We Work and LiveJeff JarvisBook Acad NonFict
Qualityland2017QualitylandMarc-Uwe KlingBook/AudioFiction Stan Rodriguez642BEST
Quantum Thief2010Quantum ThiefHannu RajaniemiBookFiction: Science Fiction & Fantasy > Science Fiction Fiction
Re-Engineering Humanity2018Re-Engineering HumanityBrett Frischmann and Evan SelingerBookPolitics & Social Sciences > Social SciencesEvery day, new warnings emerge about artificial intelligence rebelling against us. All the while, a more immediate dilemma flies under the radar. Have forces been unleashed that are thrusting humanity down an ill-advised path, one that's increasingly making us behave like simple machines? In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart environments. They explain how the goal of designing programmable worlds goes hand in hand with engineering predictable and programmable people. Detailing new frameworks, provocative case studies, and mind-blowing thought experiments, Frischmann and Selinger reveal hidden connections between fitness trackers, electronic contracts, social media platforms, robotic companions, fake news, autonomous cars, and more. This powerful analysis should be read by anyone interested in understanding exactly how technology threatens the future of our society, and what we can do now to build something better. Acad NonFict,978-11071470964.650
Rear Window1954Rear WindowAlfred HitchcockMovieHorror, SuspensexLong before voice assistants or smart appliances were raising privacy concerns, Alfred Hitchcock’s “Rear Window” prompted the question of how much privacy we can expect in our own homes. Released in 1954, the suspense stars James Stewart, a magazine war photographer who is confined to a wheelchair with a broken leg. Unable to leave his two-room apartment, Stewart’s character is fascinated with watching his neighbors through their windows – becoming convinced one of them has committed murder. This film, and the lack of privacy Jeffries’ neighbors have, unbeknownst to them, has intrigued me from the first time I watched it in high school film class. I hope it’s one you can enjoy, too, during this down time – and remember to close your blinds.
Reconstructing the Fourth Amendment2006Reconstructing the Fourth Amendment: A History of Search and Seizure, 1789-1868Andrew E. TaslitzBookHistory Acad NonFict
Regulating Privacy1992Regulating Privacy: Data Protection and Public Policy in Europe and the United States (1st Ed)Colin J. BennettBook Acad NonFict
Reimagining Reality2020Reimagining Reality: Human Rights and Immersive TechnologyBrittan HellerPDFHarvard Kennedy Schoo;VR, BiometricsLINK1LINK2LINK3 Privacy Papers Award
Reinventing Capitalism in the Age of Big Data2018Reinventing Capitalism in the Age of Big DataViktor Mayer-Schönberger$9BookBusiness & Money > Biography & HistoryFrom the New York Times bestselling author of Big Data, a prediction for how data will revolutionize the market economy and make cash, banks, and big companies obsolete Acad NonFict
Right of Publicity2018Right of Publicity: Privacy Reimagined for a Public WorldJennifer Rothman, Th$42BookLaw > Constitutional Law Acad NonFict
Right to Erasure in EU Data Protection Law2020The Right to Erasure in EU Data Protection LawJef Ausloos$90BookComputers & Technology > History & CultureThis book critically investigates the role of data subject rights in countering information and power asymmetries online. It aims at dissecting 'data subject empowerment' in the information society through the lens of the right to erasure ("right to be forgotten") in Article 17 of the General Data Protection Regulation (GDPR). In doing so, it provides an extensive analysis of the interaction between the GDPR and the fundamental right to data protection in Art.8 of the Charter of Fundamental Rights of the EU (Charter), how data subject rights affect fair balancing of fundamental rights, and what the practical challenges are to effective data subject rights. / The book starts with exploring the data-driven asymmetries that characterise individuals' relationship with tech giants. These commercial entities increasingly anticipate and govern how people interact with each other and the world around them, affecting core values such as individual autonomy, dignity and freedom. The book explores how data protection law, and data subject rights in particular, enable resisting, breaking down or at the very least critically engaging with these asymmetric relationships. It concludes that despite substantial legal and practical hurdles, the GDPR's right to erasure does play a meaningful role in furthering the fundamental right to data protection (Art. 8 Charter) in the face of power asymmetries online. Acad NonFict, 978-0198847977560Oxford University Press (June 23, 2020)Oxford University Press23-Jun-202042CoverBEST
Right to Life2008The Right to Life, Security, Privacy and Ownership in IslamMohammad Hashim KamaliBookx Acad NonFict
Right to Privacy (1890)1890The Right to Privacy, Harvard Law Review 193Warren & BrandeisPDFLaw JournalPrivacy RightsSamuel D. Warren & Louis D. Brandeis,The Right to Privacy, 4 Harv. L. Rev. 193 (1890). This article inspires the recognition during the twentieth century of privacy torts in the majority of the states. // "The Right to Privacy" (4 Harvard L.R. 193 (Dec. 15, 1890)) is a law review article written by Samuel Warren and Louis Brandeis, and published in the 1890 Harvard Law Review. It is "one of the most influential essays in the history of American law" and is widely regarded as the first publication in the United States to advocate a right to privacy, articulating that right primarily as a "right to be let alone". / Warren and Brandeis then discuss the origin of what they called a "right to be let alone". They explain that the right of property provides the foundation for the right to prevent publication. But at the time the right of property only protected the right of the creator to any profits derived from the publication. The law did not yet recognize the idea that there was value in preventing publication. As a result, the ability to prevent publication did not clearly exist as a right of property. The authors proceed to examine case law regarding a person's ability to prevent publication. Warren and Brandeis observed that, although the court in Prince Albert v. Strange asserted that its decision was based on the protection of property, a close examination of the reasoning reveals the existence of other unspecified rights—that is, the right to be let alone. If this conclusion is correct, then existing law does afford "a principle which may be invoked to protect the privacy of the individual from invasion either by the too enterprising press, the photographer, or the possessor of any other modern device for recording or reproducing scenes or sounds." / Furthermore, Warren and Brandeis suggest the existence of a right to privacy based on the jurisdictional justifications used by the courts to protect material from publication. The article states, "where protection has been afforded against wrongful publication, the jurisdiction has been asserted, not on the ground of property, or at least not wholly on that ground, but upon the ground of an alleged breach of an implied contract or of a trust or confidence." Warren and Brandeis proceed to point out that: "This protection of implying a term in a contract, or of implying a trust, is nothing more nor less than a judicial declaration that public morality, private justice, and general convenience demand the recognition of such a rule." In other words, the courts created a legal fiction that contracts implied a provision against publication or that a relationship of trust mandated nondisclosure. Yet, the article raises a problematic scenario where a casual recipient of a letter, who did not solicit the correspondence, opens and reads the letter. Simply by receiving, opening, and reading a letter the recipient does not create any contract or accept any trust. Warren and Brandeis argue that courts have no justification to prohibit the publication of such a letter, under existing theories or property rights. Rather, they argue, "the principle which protects personal writings and any other productions of the intellect or the emotions, is the right to privacy."LINK1LINK2LINK3 Stan LawHarvard LawBEST
Right to Privacy (1997)1997The Right to PrivacyEllen Alderman & Caroline KennedyBook Acad NonFict
Right to Privacy (2020)2020The Right to Privacy: Origins and Influence of a Nineteenth-Century IdeaMegan RichardsonBookLaw > Constitutional LawUsing original and archival material, The Right to Privacy traces the origins and influence of the right to privacy as a social, cultural and legal idea. Richardson argues that this right had emerged as an important legal concept across a number of jurisdictions by the end of the nineteenth century, providing a basis for its recognition as a universal human right in later centuries. This book is a unique contribution to the history of the modern right to privacy. It covers the transition from Georgian to Victorian England, developments in Second Empire France, insights in the lead up to the Bürgerliches Gesetzbuch (BGB) of 1896, and the experience of a rapidly modernising America around the turn of the twentieth century. It will appeal to an audience of academic and postgraduate researchers, as well as to the judiciary and legal practice. Acad NonFict, 978-1108411684Paperback : 185 pagesCambridge University Press (January 23, 2020)Cambridge University Press23-Jan-2020CoverBEST
Rise of Big Data Policing2019The Rise of Big Data Policing: Surveillance, Race, and the Future of Law EnforcementAndrew Guthrie FergusonBookxIn a high-tech command center in downtown Los Angeles, a digital map lights up with 911 calls, television monitors track breaking news stories, surveillance cameras sweep the streets, and rows of networked computers link analysts and police officers to a wealth of law enforcement intelligence. / This is just a glimpse into a future where software predicts future crimes, algorithms generate virtual “most-wanted” lists, and databanks collect personal and biometric information. The Rise of Big Data Policing introduces the cutting-edge technology that is changing how the police do their jobs and shows why it is more important than ever that citizens understand the far-reaching consequences of big data surveillance as a law enforcement tool. / Andrew Guthrie Ferguson reveals how these new technologies ―viewed as race-neutral and objective―have been eagerly adopted by police departments hoping to distance themselves from claims of racial bias and unconstitutional practices. After a series of high-profile police shootings and federal investigations into systemic police misconduct, and in an era of law enforcement budget cutbacks, data-driven policing has been billed as a way to “turn the page” on racial bias. Acad NonFict
Rise of the Right to Know2015The Rise of the Right to Know: Politics and the Culture of Transparency, 1945-1975Michael SchudsonBook Acad NonFict
Risk2016RiskLaura PoitrasMovieDocumentaryRisk, the follow-up to Citzenfour by filmmaker Laura Poitras, is also worth catching. This time Poitras describes the transition of Julian Assange and WikiLeaks from widely being considered public advocates for releasing important details about US operations in Afghanistan and Iraq, to the controversial hacking of the Democratic National Committee during the presidential election of 2016. Not all security pros have to deal with presidential election security, but all organizations must deal with the reality of insider threats. Risk and Citizenfour are much-watch films for people serious about information security. Reading
Risk Management2020Risk ManagementRM MagazineWeb ResourceLINK1 IAPP Auth Resources
Risky Business2013Risky Business: Sharing Health Data While Protecting PrivacyKhaled El Emam, editorBook Acad NonFict
Rule 342011Rule 34Charles StrossBookFiction Stan
Schneier on Security2021Schneier on SecurityBruce SchneierWeb ResourceBlogLINK1 Stan
Secrets and Lies2004Secrets and Lies: Digital Security in a Networked WorldBruce SchneierBookx Acad NonFict
Securing Privacy in the Internet Age2008Securing Privacy in the Internet AgeAnupam Chander, Lauren Gelman, and Margaret Jane Radin (editors)Book Acad NonFict
Sexting Panic2015Sexting Panic: Rethinking Criminalization, Privacy, and ConsentAmy Adele HasinoffBookHealth, Fitness & Dieting > Psychology & Counseling Acad NonFict
Shockwave Rider1975The Shockwave RiderJohn BrunnerBookFiction: Literature & Fiction > Action & AdventureCyberPunkHe was the most dangerous fugitive alive, but he didn'™t exist! Fiction
Simple Proactive2019Simple Proactive Privacy and SecurityAlex SummersBookxThis is the book Silicon Valley does not want you reading. From phone calls to channel surfing, and from web browsing to social media, everything we do gets tracked and our data gets collected and sold. Military Veteran Alex Summers got fed up and worked to reduce the digital tracking of his family. In doing so, he realized the information he needed to enjoy both technology and privacy was scattered all over the web. This book brings his research together in a way anyone and everyone can easily use. In Simple Proactive Privacy and Security, Alex Summers shows you easy ways to:* Avoid the bait of phishing attacks. / * Remove yourself from 27 people locator websites that share our names, addresses & other private info.* Use a password manager and password generator.* Adjust your home router's settings to better protect your entire home network.* Get your browser to help block tracking and script hacking.* Change your Windows or Mac PC settings to better protect you.* Improve your privacy on Android and iPhone.* Protect your phone calls and text messages with encryption.* Reduce the tracking on common smarthome devices like speakers, TV's, and other IoT gadgets.* Stop your free email and cloud providers from being able to read your emails and cloud files.* Setup the best settings and practices for more private social media usage.And more Stan
Skating on Stilts2010Skating on Stilts: Why We Aren’t Stopping Tomorrow’s TerrorismStewart BakerBook Acad NonFict
Smart Surveillance2019Smart Surveillance: How to Interpret the Fourth Amendment in the Twenty-First CenturyRic SimmonsBookTextbooks > Lawx Acad NonFict
Snoop: What Your Stuff Says About You2009Snoop: What Your Stuff Says About YouSam GoslingBook Acad NonFict
Snow Crash1992Snow CrashNeal StephensonBookFiction: Humor & Entertainment > HumorCyberPunk Fiction
Snowden2016SnowdenOliver Stone (Director)MovieDramaxAs mentioned, Snowden is known for disclosing numerous global surveillance programs ran by the NSA in cooperation with entities such as telecommunication companies and European governments. This sparked a global discussion about national security and personal privacy. It was also the inspiration for the 2017 Cinema for Peace Award for Justice-winning biographical thriller movie starring Joseph Gordon-Levitt as the CIA whistleblower.
So You’ve Been Publicly Shamed2015So You’ve Been Publicly ShamedJon RonsonBook Acad NonFict
Social Dilemma2020The Social DilemmaJeff OrlowskiMovieDocudramaSocial MediaExplores the dangerous human impact of social networking, with tech experts sounding the alarm on their own creations.LINK1LINK2LINK3 Stan
Social Dimensions of Privacy2015Social Dimensions of PrivacyBeate Roessler & Dorota Mokrosinska (editors)BookTextbooks > Humanities Acad NonFict
Spam Nation2014Spam NationBrian KrebsBook Use Of
Strategic Privacy by Design2018Strategic Privacy by DesignJason Cronk$50BookTextbookStrategic Privacy by Design is a new handy guide to implementing privacy by design, written from a practitioner's perspective. Authored by R. Jason Cronk, CIPP/US, CIPM, CIPT, FIP, this is the first IAPP book to get into the details of how privacy by design works, with dozens of sample scenarios, workflows, charts, and tables. Use it as a standalone text to inform your work, or pair it with our CIPM and CIPT textbooks to create a fuller picture of how managing a global privacy program today requires mix of legal knowledge, management skills, and technical acumen. / While this book is not written specifically for the EU's General Data Protection Regulation, it can certainly be used as a process for data protection by design and default (Article 25), and use of the proffered privacy-by-design process herein will help organizations comply with many global regulations. This book is about how to build better processes, products, and services that consider privacy as a design requirement. It is about how to build things that people can trust.GR IAPP Auth Resources IAPP Publication, 2018. (Print & Digital copiesPortsmouth: IAPP Publications10-Jul-1905Print & Digital copiesBEST
Student Data Privacy2020Student Data Privacy: Managing Vendor RelationshipsLinnette Attai$30BookHow do education institutions protect student data privacy while working with technology providers? Often times, the work is clouded by a good deal of fear and uncertainty. In Student Data Privacy: Managing Vendor Relationships, Linnette Attai leverages her decades of experience working with technology providers and education institutions to provide the guidance education technology providers can use to manage their privacy responsibilities from a position of strength. Acad NonFict, 978-1475845259Paperback : 126 pagesRowman & Littlefield Publishers; Illustrated edition (August 1, 2020)Rowman & Littlefield Publishers1-Aug-2020Illustrated editionBEST
Super Sad True Love Story2011Super Sad True Love Story: A NovelGary Shteyngart BookFiction: Literature & Fiction > Humor & SatireIn the near future, America is crushed by a financial crisis and our patient Chinese creditors may just be ready to foreclose on the whole mess. Then Lenny Abramov, son of an Russian immigrant janitor and ardent fan of “printed, bound media artifacts” (aka books), meets Eunice Park, an impossibly cute Korean American woman with a major in Images and a minor in Assertiveness. Could falling in love redeem a planet falling apart? Fiction
Supervision2012SuperVision: An Introduction to the Surveillance SocietyJohn Gilliom and Torin MonahanBookx Acad NonFict
Surveillance and Film2016Surveillance and FilmJ. Macgregor WiseBookTextbooks > Humanitiesx Acad NonFict
Surveillance and the Law2020Surveillance and the LawMaria Helen Murphy$23BookLaw > Criminal LawxSurveillance of citizens is a clear manifestation of government power. The act of surveillance is generally deemed acceptable in a democratic society where it is necessary to protect the interests of the nation and where the power is exercised non-arbitrarily and in accordance with the law. / Surveillance and the Law analyses the core features of surveillance that create stark challenges for transparency and accountability by examining the relationship between language, power, and surveillance. It identifies a number of features of surveillance law, surveillance language, and the distribution of power that perpetuate the existing surveillance paradigm. Using case studies from the US, the UK, and Ireland, it assesses the techniques used to maintain the status quo of continued surveillance expansion. These jurisdictions are selected for their similarities, but also for their key constitutional distinctions, which influence how power is distributed and restrained in the different systems. Though the book maintains that the classic principles of transparency and accountability remain the best means available to limit the arbitrary exercise of government power, it evaluates how these principles could be better realised in order to restore power to the people and to maintain an appropriate balance between government intrusion and the right to privacy. / By identifying the common tactics used in the expansion of surveillance around the globe, this book will appeal to students and scholars interested in privacy law, human rights, information technology law, and surveillance studies. Acad NonFict, 978-0367606725Paperback : 108 pagesRoutledge; 1st edition (June 30, 2020)Routledge30-Jun-20201st edition5CoverBEST
Surveillance as Loss of Obscurity2016Surveillance as Loss of ObscurityEvan Selinger, Woodrow HartzogPDFResearch/ReportAnonyminityEveryone seems concerned about government surveillance, yet we have a hard time agreeing when and why it is a problem and what we should do about it. When is surveillance in public unjustified? Does metadata raise privacy concerns? Should encrypted devices have a backdoor for law enforcement officials? Despite increased attention, surveillance jurisprudence and theory still struggle for coherence. A common thread for modern surveillance problems has been difficult to find. / In this article we argue that the concept of ‘obscurity,’ which deals with the transaction costs involved in finding or understanding information, is the key to understanding and uniting modern debates about government surveillance. Obscurity can illuminate different areas where transactions costs for surveillance are operative and explain why making surveillance hard but possible is the central issue in the government-surveillance debates. Obscurity can also explain why the solutions to the government-surveillance problem should revolve around introducing friction and inefficiency into process, whether it be legally through procedural requirements like warrants or technologies like robust encryption. / Ultimately, obscurity can provide a clearer picture of why and when government surveillance is troubling. It provides a common thread for disparate surveillance theories and can be used to direct surveillance reform.LINK1LINK2LINK3 Stan Washington and Lee Law Review 1343 (2015)Washington and Lee Law Review7-Jul-1905BEST
Surveillance or Security2013Surveillance or Security?: The Risks Posed by New WiretappingSusan LandauBookxx Acad NonFict
Surveillance State2015The Surveillance State: Big Data, Freedom, and YouPaul RosenzweigBook/AudioOnline CoursexxThe news is full of stories like these, in which new technologies lead to dilemmas that could not have been imagined just a few decades ago. The 21st century has seen remarkable technological advances, with many wonderful benefits. But with these advances come new questions about privacy, security, civil liberties, and more. Big Data is here, which means that government and private industries are collecting massive amounts of information about each of us—information that may be used in marketing, to help solve criminal investigations, and to promote the interests of national security. Pandora’s Box has been opened, but in many ways the government is behind the times, relying on legislation from the 1970s to inform its stance on regulating the collection and use of this information. Our society now faces a host of critical questions, including: / Where is the line between promoting national security and defending personal liberty? What information may the government collect about you from your Internet service provider? When it comes to search and seizure, is a cell phone any different from a diary? How will we respond to future technologies such as quantum computers and artificial intelligence? / Explore these questions and more in The Surveillance State: Big Data, Freedom, and You. Taught by Paul Rosenzweig, J.D., esteemed legal expert and professorial lecturer at The George Washington University School of Law, these 24 revealing lectures tackle the tough questions about surveillance and data in the 21st century. Get an insider’s look at how technology from search engines to your car’s toll road transponder gathers information about American citizens. With Professor Rosenzweig’s guidance, you’ll scrutinize our system of oversight for intelligence agencies, and you’ll consider the ways in which the information that is collected impacts (or potentially impacts) our civil liberties. He presents the facts objectively, giving you the information you need to draw your own conclusions. Stan Rosenzweig728150193824X (ISBN13: 9781501938245)3.93 · Rating details · 82 ratings · 17 reviewsPublished 2016 by The Great CoursesThe Great Courses8-Jul-1905BEST
Surveillance, Privacy and Public Space2020Surveillance, Privacy and Public SpaceEdited by Bryce Clayton Newell, Tjerk Timan, Bert-Jaap Koops$50BookTextbooks > Social SciencesxToday, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. / Surveillance, Privacy, and Public Space problematizes our traditional understanding of ‘public space’. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. / / Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology. Acad NonFict, 978-0367486648Paperback : 261 pagesRoutledge; 1st edition (February 25, 2020)Routledge25-Feb-20201st editionCoverBEST
Swiped2015Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity ThievesAdam LevinBook Acad NonFict
Synthetic Data2020Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of DataKhaled El Emam, Lucy Mosquera, Richard HoptroffBookBuilding and testing machine learning models requires access to large and diverse data. But where can you find usable datasets without running into privacy issues? This practical book introduces techniques for generating synthetic data—fake data generated from real data—so you can perform secondary analysis to do research, understand customer behaviors, develop new products, or generate new revenue. / Data scientists will learn how synthetic data generation provides a way to make such data broadly available for secondary purposes while addressing many privacy concerns. Analysts will learn the principles and steps for generating synthetic data from real datasets. And business leaders will see how synthetic data can help accelerate time to a product or solution. / This book describes: ** Steps for generating synthetic data using multivariate normal distributions ** Methods for distribution fitting covering different goodness-of-fit metrics ** How to replicate the simple structure of original data ** An approach for modeling data structure to consider complex relationships ** Multiple approaches and metrics you can use to assess data utility ** How analysis performed on real data can be replicated with synthetic data ** Privacy implications of synthetic data and methods to assess identity disclosure Stan
Taking Trust Seriously in Privacy Law2015Taking Trust Seriously in Privacy LawNeil M. Richards, Woodrow HartzogPDFResearch/ReportTrustTrust is beautiful. The willingness to accept vulnerability to the actions of others is the essential ingredient for friendship, commerce, transportation, and virtually every other activity that involves other people. It allows us to build things, and it allows us to grow. Trust is everywhere, but particularly at the core of the information relationships that have come to characterize our modern, digital lives. Relationships between people and their ISPs, social networks, and hired professionals are typically understood in terms of privacy. But the way we have talked about privacy has a pessimism problem – privacy is conceptualized in negative terms, which leads us to mistakenly look for “creepy” new practices, focus excessively on harms from invasions of privacy, and place too much weight on the ability of individuals to opt out of harmful or offensive data practices. / But there is another way to think about privacy and shape our laws. Instead of trying to protect us against bad things, privacy rules can also be used to create good things, like trust. In this paper, we argue that privacy can and should be thought of as enabling trust in our essential information relationships. This vision of privacy creates value for all parties to an information transaction and enables the kind of sustainable information relationships on which our digital economy must depend. / Drawing by analogy on the law of fiduciary duties, we argue that privacy laws and practices centered on trust would enrich our understanding of the existing privacy principles of confidentiality, transparency, and data protection. Re-considering these principles in terms of trust would move them from procedural means of compliance for data extraction towards substantive principles to build trusted, sustainable information relationships. Thinking about privacy in terms of trust also reveals a principle that we argue should become a new bedrock tenet of privacy law: the Loyalty that data holders must give to data subjects. Rejuvenating privacy law by getting past Privacy Pessimism is essential if we are to build the kind of digital society that is sustainable and ultimately beneficial to all – users, governments, and companies. There is a better way forward for privacy. Trust us.LINK1LINK2 Stan
Targeted2019Targeted: My Inside Story of Cambridge Analytica and How Trump and Facebook Broke DemocracyBrittany KaiserBook/AudioIn this explosive memoir, a political consultant and technology whistleblower reveals the disturbing truth about the multi-billion-dollar data industry, revealing to the public how companies are getting richer using our personal information and exposing how Cambridge Analytica exploited weaknesses in privacy laws to help elect Donald Trump--and how this could easily happen again in the 2020 presidential election. / When Brittany Kaiser joined Cambridge Analytica--the UK-based political consulting firm funded by conservative billionaire and Donald Trump patron Robert Mercer--she was an idealistic young professional working on her fourth degree in human rights law and international relations. A veteran of Barack Obama's 2008 campaign, Kaiser's goal was to utilize data for humanitarian purposes, most notably to prevent genocide and human rights abuses. But her experience inside Cambridge Analytica opened her eyes to the tremendous risks that this unregulated industry poses to privacy and democracy. / Targeted is Kaiser's eyewitness chronicle of the dramatic and disturbing story of the rise and fall of Cambridge Analytica. She reveals to the public how Facebook's lax policies and lack of sufficient national laws allowed voters to be manipulated in both Britain and the United States, where personal data was weaponized to spread fake news and racist messaging during the Brexit vote and the 2016 election. But the damage isn't done Kaiser warns; the 2020 election can be compromised as well if we continue to do nothing. / In the aftermath of the U.S. election, as she became aware of the horrifying reality of what Cambridge Analytica had done in support of Donald Trump, Kaiser made the difficult choice to expose the truth. Risking her career, relationships, and personal safety, she told authorities about the data industry's unethical business practices, eventually testifying before Parliament about the company's Brexit efforts and helping Special Counsel Robert Mueller's investigation into Russian interference in the 2016 election, alongside at least 10 other international investigations. / Packed with never-before-publicly-told stories and insights, Targeted goes inside the secretive meetings with Trump campaign personnel and details the promises Cambridge Analytica made to win. Throughout, Kaiser makes the case for regulation, arguing that legal oversight of the data industry is not only justifiable but essential to ensuring the long-term safety of our democracy Stan Kaiser7821094028193 (ISBN13: 9781094028194)3.61 · Rating details · 599 ratings · 112 reviewsPublished October 22nd 2019 by HarperCollinsHarperCollins22-Oct-2019BEST
TeachPrivacy2020Privacy & Security TrainingDaniel SoloveWeb ResourceTrainingxLINK1 IAPP Auth Resources
Technology & Marketing Law Blog2021Technology & Marketing Law BlogEric GoldmanWeb ResourceBlogLINK1
Technology and Privacy1998Technology and Privacy: The New LandscapePhilip Agre & Marc Rotenberg, editorsBook Acad NonFict
Technology and Regulation2020Technology and RegulationRonald Leenes (Editor)Web ResourceMagazineTechnology and Regulation (TechReg) is a new interdisciplinary journal of law, technology and society. TechReg provides an open-access platform for disseminating original research on the legal and regulatory challenges posed by existing and emerging technologies. / The Editor-in-Chief is Professor Ronald Leenes of the Tilburg Law School. Our Editorial Board Committee comprises a distinguished panel of international experts in law, regulation, technology and society across different disciplines and domains. / TechReg aspires to become the leading outlet for scholarly research on technology and regulation topics, and has been conceived to be as accessible as possible for both authors and readers.LINK1 Stan and Regulation • DOI: 10.26116/techreg • ISSN: 2666-139XTechnology and RegulationDOI: 10.26116/techreg • ISSN: 2666-139XBEST
Ten Arguments for Deleting Your Social Media Accounts Right Now2018Ten Arguments for Deleting Your Social Media Accounts Right NowJaron LanierBookPolitics & Social SciencesYou might have trouble imagining life without your social media accounts, but virtual reality pioneer Jaron Lanier insists that we’re better off without them. In Ten Arguments for Deleting Your Social Media Accounts Right Now, Lanier, who participates in no social media, offers powerful and personal reasons for all of us to leave these dangerous online platforms. Lanier’s reasons for freeing ourselves from social media’s poisonous grip include its tendency to bring out the worst in us, to make politics terrifying, to trick us with illusions of popularity and success, to twist our relationship with the truth, to disconnect us from other people even as we are more “connected” than ever, to rob us of our free will with relentless targeted ads. How can we remain autonomous in a world where we are under continual surveillance and are constantly being prodded by algorithms run by some of the richest corporations in history that have no way of making money other than being paid to manipulate our behavior? How could the benefits of social media possibly outweigh the catastrophic losses to our personal dignity, happiness, and freedom? Lanier remains a tech optimist, so while demonstrating the evil that rules social media business models today, he also envisions a humanistic setting for social networking that can direct us toward a richer and fuller way of living and connecting with our world. Stan
Terms and Conditions May Apply2013Terms and Conditions May ApplyCullen Hoback (Director)MovieDocumentaryLet’s be honest: You don’t really read all the terms and conditions on a website before clicking “I agree,” do you? This documentary by award-winning investigative filmmaker Cullen Hoback uses this as a starting point in tackling anonymity—or lack thereof—in the Internet. You may not have realized how agreeing to the terms and conditions of a website basically equates to handing your information to them on a silver platter. Let corporate bigwigs like Google’s former CEO Eric Schmidt and Facebook’s Mark Zuckerberg—who are featured in the film—change your mind.
Terror in the Balance2006Terror in the Balance: Security, Liberty, and the Courts (1st Ed)Eric A. Posner & Adrian VermeuleBook Acad NonFict
Testaments2019The Testaments: The Sequel to The Handmaid’s TaleMargaret AtwoodBookFiction: Literature & Fiction > History & CriticismThe Testaments is a modern masterpiece, a powerful novel that can be read on its own or as a companion to Margaret Atwood’s classic, The Handmaid’s Tale. / More than fifteen years after the events of The Handmaid's Tale, the theocratic regime of the Republic of Gilead maintains its grip on power, but there are signs it is beginning to rot from within. At this crucial moment, the lives of three radically different women converge, with potentially explosive results. / Two have grown up as part of the first generation to come of age in the new order. The testimonies of these two young women are joined by a third: Aunt Lydia. Her complex past and uncertain future unfold in surprising and pivotal ways. Acad NonFict, 978-0385543781Hardcover : 432 pagesNan A. Talese; First Ed edition (September 10, 2019)Nan A. Talese10-Sep-20191st edition4.618172
The Circle2017The CircleJames PonsoldtMovieDramaSocial MediaThis dramatic 2017 story has Emma Watson landing her dream job of being an IT professional at a social media company called Circle. Soon she was forced by the founder and owner into an experiment that took transparency and privacy to a whole new level. The movie is an ideal representation of artificial intelligence, social media and mass surveillance. Mag
The Circle2013The CircleDave EggersBookFiction: Humor & Entertainment > HumorA bestselling dystopian novel that tackles surveillance, privacy and the frightening intrusions of technology in our livesa compulsively readable parable for the 21st century' (Vanity Fair). Fiction
The Conversation1974The ConversationFrancis Ford CoppolaMovieDramaxDirected by Francis Ford Coppola, The Conversation is one of the classic movies about surveillance. Starring Gene Hackman, the movie begins when a surveillance expert on a job of recording a couple in part begins to explore a mystery that arises out of this job. The movie depicts a long-range audio recording device as well as other bugging and wiretapping technology which seem quaint by today’s standards. The movie captures the creepiness of it all exceedingly well. There is one scene that by today’s standards wouldn’t be very violent or shocking, but that in this movie really achieves a remarkable intensity. This scene demonstrates that special effects and over-the-top gore are not necessary to create a thrilling and frightening scene. Great direction and storytelling are all that’s needed. Films
The Guardian2020Data Protection coverage by The GuardianThe GuardianWeb ResourceNewspaperArticles tagged with data protection on The GuardianLINK1 Stan
The Secret Ballot at Risk2016The Secret Ballot at Risk: Recommendations for Protecting DemocracyEPIC, Verified Voting, Common CausePDFResearch/ReportVotingThe right to cast a secret ballot in a public election is a core value in the United States’ system of self-governance. Secrecy and privacy in elections guard against coercion and are essential to integrity in the electoral process. Secrecy of the ballot is guaranteed in state constitutions and statutes nationwide. However, as states permit the marking and transmitting of marked ballots over the Internet, the right to a secret ballot is eroded and the integrity of our elections is put at risk.LINK1LINK2LINK3 Stan
The Trial1914The TrialFranz Kafka$12BookFiction: Literature & Fiction > History & Criticism Fiction
There Will be Cyberwar2015There Will be CyberwarRichard StiennonBookHistory > Military Acad NonFict
They Know Everything About You2015They Know Everything About YouRobert ScheerBook Acad NonFict
Threat Modeling2014Threat Modeling: Designing for SecurityAdam ShostackBookx Acad NonFict
THX 11381971THX 1138George LucasMovieDrama, Sci-Fi, ThrillerIn the twenty-fifth century, a time when people have designations instead of names, a man, THX 1138, and a woman, LUH 3417, rebel against their rigidly controlled society. Stan
Tinker-ing with Machine Learning2020Tinker-ing with Machine Learning: The Legality and Consequences of Online Surveillance of StudentsAmy B. CyphertPDFLaw JournalML, AIAll across the nation, high schools and middle schools are quietly entering into contracts with software companies to monitor the online activity of their students, attempting to predict the next school shooter or to intervene with a student who might be contemplating suicide. Systems using algorithms powered by machine learning trawl the Facebook posts of fifteen–year–olds and weed through the Twitter feeds of seventeen–year–olds. When certain keywords or features are flagged, the posts are forwarded to school administrators, who can decide whether the post requires an intervention and whether the student requires discipline. Who (or what) decides what these keywords are? What protections are given to the massive amounts of student data these third parties are collecting? Do parents and students even realize such online surveillance is happening? // Too often, the answers to these questions are unclear. This Article explores the legal and policy questions related to this new era of surveillance, which is fueled by machine learning. Although this technology is relatively new to schools, it has been used for decades now in the criminal justice system, which has embraced sentencing algorithms and predictive policing. As is true with so many things in the criminal justice system, there is evidence that these technologies have had a disproportionate impact on people of color. In much the same way, evidence is emerging that the online monitoring of students is having a disproportionate impact on students of color. Despite having an aura of neutrality, at each stage in the machine learning process, there is a possibility for bias to creep in.LINK1LINK2LINK3 Privacy Papers Award Law Journal Nevada Law Journal BEST
Too Smart2020Too Smart: How Digital Capitalism is Extracting Data, Controlling Our Lives, and Taking Ove r the WorldJathan SadowskiBookAIWho benefits from smart technology? Whose interests are served when we trade our personal data for convenience and connectivity? Smart technology is everywhere: smart umbrellas that light up when rain is in the forecast; smart cars that relieve drivers of the drudgery of driving; smart toothbrushes that send your dental hygiene details to the cloud. Nothing is safe from smartification. In Too Smart, Jathan Sadowski looks at the proliferation of smart stuff in our lives and asks whether the tradeoff—exchanging our personal data for convenience and connectivity—is worth it. Who benefits from smart technology? Sadowski explains how data, once the purview of researchers and policy wonks, has become a form of capital. Smart technology, he argues, is driven by the dual imperatives of digital capitalism: extracting data from, and expanding control over, everything and everybody. He looks at three domains colonized by smart technologies' collection and control systems: the smart self, the smart home, and the smart city. The smart self involves more than self-tracking of steps walked and calories burned; it raises questions about what others do with our data and how they direct our behavior—whether or not we want them to. The smart home collects data about our habits that offer business a window into our domestic spaces. And the smart city, where these systems have space to grow, offers military-grade surveillance capabilities to local authorities. Stan
Tools and Weapons2019Tools and Weapons: The Promise and the Peril of the Digital AgeBrad Smith, Carol Ann Browne, Bill Gates - forewordBook/AudioIn Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort. Acad NonFict Smith, Carol Ann Browne671BEST
Tort Law vs. Privacy2014Tort Law vs. PrivacyEugene VolokhPDFLaw JournalTortsTort law is often seen as a tool for protecting privacy. But tort law can also diminish privacy, by pressuring defendants to disclose sensitive information, to gather such information, and to install comprehensive surveillance. And such pressure is growing, as technology makes surveillance and other information gathering more cost-effective and thus more likely to be seen as part of defendants’ obligation of “reasonable care.” Moreover, these tort law rules can increase government surveillance power as well as demanding greater surveillance by private entities. Among other things, the NSA PRISM story shows how easily a surveillance database in private hands can become a surveillance database in government hands.LINK1LINK2LINK3 Stan Law ReviewColumbia Law ReviewBEST
Track Down2000Track DownJoe ChappelleMovieBiography, Crime, DramaThis 2000 movie is based on the nonfiction book Takedown by security expert Tsutomu Shimomura, who wrote it with journalist John Markoff. Both men were involved in the FBI's chase to catch hacker Kevin Mitnick in the 1990s. Watch the movie knowing that it's shrouded in controversy and is refuted by the book The Fugitive Game: Online with Kevin Mitnick, by Jonathan Littman. Draw your own conclusions, but the Mitnick case remains one of the more high-profile and controversial cases in the history of computing, and security pros should inform themselves of both sides. As a sequel, Mitnick has for several years been on the right side of the law, consulting for Fortune 500 companies and now working as chief hacking officer for the security awareness company KnowBe4. Reading
Transborder Data Flow Regulation and Data Privacy Law2013Transborder Data Flow Regulation and Data Privacy LawChristopher KunerBook Acad NonFict
Transferring Personal Data in Asia2020Transferring Personal Data in Asia: A path to legal certainty and regional convergenceClarisse GirotPDFLaw JournalDat Transfers, AsiaLINK1LINK2 Privacy Papers Award Academy of LawSingapore Academy of LawBEST
Transparent Society1988The Transparent SocietyDavid BrinBookxForecasts social transparency and some degree of erosion of privacy, as it is overtaken by low-cost surveillance, communication and database technology, and proposes new institutions and practices that he believes would provide benefits that would more than compensate for lost privacy Stan
True Enough2008True Enough: Learning to Live in a Post-Fact SocietyFarhad ManjooBook/AudioDisinformationWhy has punditry lately overtaken news? Why do lies seem to linger so long in the cultural subconscious even after they’ve been thoroughly discredited? And why, when more people than ever before are documenting the truth with laptops and digital cameras, does fact-free spin and propaganda seem to work so well? True Enough explores leading controversies of national politics, foreign affairs, science, and business, explaining how Americans have begun to organize themselves into echo chambers that harbor diametrically different facts—not merely opinions—from those of the larger culture Stan Porter4410470050101 (ISBN13: 9780470050101)3.75 · Rating details · 678 ratings · 138 reviewsHardcover, 250 pagesPublished March 1st 2008 by Wiley (first published January 1st 2008)Wiley1-Mar-2008first published January 1st 2008BEST
Truman Show1998The Truman ShowPeter WeirMovieFictionxIn The Truman Show, Jim Carrey stars as a man who grows up in a fictional world built to chronicle his life on a TV show. The movie cleverly shows scenes as they are caught on the various hidden cameras throughout the little town Truman inhabits. The movie shows how the producers manipulate so-called “real life,” and it demonstrates the consequences of reality TV run amok. As with Enemy of the State, the lessons from The Truman Show appear not to have been learned. The only flaw is that Truman’s life is built to be rather dull. These days, his show would be lesser-rated fare on the Bravo channel. Films PicturesParamount PicturesBEST
Turning Point2020Turning Point: Policymaking in the Era of Artificial IntelligenceDarrell M. West, John R. AllenBookAIArtificial Intelligence is here, today. How can society make the best use of it? Until recently, “artificial intelligence” sounded like something out of science fiction. But the technology of artificial intelligence, AI, is becoming increasingly common, from self-driving cars to e-commerce algorithms that seem to know what you want to buy before you do. Throughout the economy and many aspects of daily life, artificial intelligence has become the transformative technology of our time. Despite its current and potential benefits, AI is little understood by the larger public and widely feared. The rapid growth of artificial intelligence has given rise to concerns that hidden technology will create a dystopian world of increased income inequality, a total lack of privacy, and perhaps a broad threat to humanity itself. In their compelling and readable book, two experts at Brookings discuss both the opportunities and risks posed by artificial intelligence—and how near-term policy decisions could determine whether the technology leads to utopia or dystopia. Drawing on in-depth studies of major uses of AI, the authors detail how the technology actually works. They outline a policy and governance blueprint for gaining the benefits of artificial intelligence while minimizing its potential downsides. Stan
Twenty-Six Words That Created the Internet2019The Twenty-Six Words That Created the InternetJeff Kosseff$10Book/Audio"No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider." Did you know that these twenty-six words are responsible for much of America's multibillion-dollar online industry? What we can and cannot write, say, and do online is based on just one law―a law that protects online services from lawsuits based on user content. Jeff Kosseff exposes the workings of Section 230 of the Communications Decency Act, which has lived mostly in the shadows since its enshrinement in 1996. Because many segments of American society now exist largely online, Kosseff argues that we need to understand and pay attention to what Section 230 really means and how it affects what we like, share, and comment upon every day. The Twenty-Six Words That Created the Internet tells the story of the institutions that flourished as a result of this powerful statute. It introduces us to those who created the law, those who advocated for it, and those involved in some of the most prominent cases decided under the law. Kosseff assesses the law that has facilitated freedom of online speech, trolling, and much more. His keen eye for the law, combined with his background as an award-winning journalist, demystifies a statute that affects all our lives –for good and for ill. While Section 230 may be imperfect and in need of refinement, Kosseff maintains that it is necessary to foster free speech and innovation. For filings from many of the cases discussed in the book and updates about Section 230, visit jeffkosseff.com Acad NonFict R Pratt759BEST
U.S. Private-Sector Privacy2018U.S. Private-Sector Privacy, Third EditionPeter P. Swire, DeBrae Kennedy-MayoBookTextbookAn indispensable guidepost for those working in the constantly changing privacy landscape. Peter Swire and DeBrae Kennedy-Mayo provide thoughtful analysis of U.S. laws and regulations and the technological and social developments that influence them. Covering the medical, financial, educational, telecommunications and marketing sectors, as well as enforcement, data breach and incident management, online activities, and privacy issues in investigations and litigation, U.S. Private Sector Privacy is a comprehensive resource encompassing the essentials of privacy practice.GR IAPP Auth Resources (ISBN13: 9780998322360)· Rating details · 42 ratings · 6 reviewsPublished 2018 by IAPP (first published January 1st 2012)IAPP10-Jul-1905first published January 1st 2012BEST
Unauthorized Access2013Unauthorized Access: The Crisis in Online Privacy and SecurityRobert H. Sloan & Richard WarnerBookx Acad NonFict
Under Surveillance2017Under Surveillance: Being Watched in Modern AmericaRandolph LewisBookNever before has so much been known about so many. CCTV cameras, TSA scanners, NSA databases, big data marketers, predator drones, "stop and frisk" tactics, Facebook algorithms, hidden spyware, and even old-fashioned nosy neighbors--surveillance has become so ubiquitous that we take its presence for granted. While many types of surveillance are pitched as ways to make us safer, almost no one has examined the unintended consequences of living under constant scrutiny and how it changes the way we think and feel about the world. In Under Surveillance, Randolph Lewis offers a highly original look at the emotional, ethical, and aesthetic challenges of living with surveillance in America since 9/11. Taking a broad and humanistic approach, Lewis explores the growth of surveillance in surprising places, such as childhood and nature. He traces the rise of businesses designed to provide surveillance and security, including those that cater to the Bible Belt's houses of worship. And he peers into the dark side of playful surveillance, such as eBay's online guide to "Fun with Surveillance Gadgets." A worried but ultimately genial guide to this landscape, Lewis helps us see the hidden costs of living in a "control society" in which surveillance is deemed essential to governance and business alike. Written accessibly for a general audience, Under Surveillance prompts us to think deeply about what Lewis calls "the soft tissue damage" inflicted by the culture of surveillance.
Understanding Privacy2008Understanding PrivacyDaniel J. SoloveBook Acad NonFict
Uneasy Access1988Uneasy Access: Privacy for Women in a Free SocietyAnita AllenBook Acad NonFict
Unpopular privacy2011Unpopular Privacy: What Must We Hide?Anita AllenBook Acad NonFict
Unwanted Gaze2000The Unwanted Gaze: The Destruction of Privacy in AmericaJeffrey RosenBook Acad NonFict
V for Vendetta2005V for VendettaJames McTeigueMovieAction, Drama, Sci-Fi In a future British tyranny, a shadowy freedom fighter, known only by the alias of "V", plots to overthrow it with the help of a young woman. Stan
Verizon DBIR2019Verizon Data Breach Investigations Report [Yearly]VerizonPDFResearch/ReportData Breachxindustry-leading data, information and processesLINK1LINK2LINK3 Stan
Visions of Privacy2020Visions of PrivacyIAPPPDFResearch/ReportPredictionsThis 20th anniversary publication, “Visions of Privacy,” is a future-looking anthology of contributions from privacy thought-leaders from around the world. We asked these leading voices to take a moment for reflection on the last 20 years of privacy — to pause and think deeply about the future of privacy. We are excited to provide you with these incredible reflections on how far we have come as a profession over the past two decades and what the future might hold.LINK1LINK2 Stan
War on Privacy2006War on PrivacyJacqueline KlosekBook Acad NonFict
WarGames1983WarGamesJohn Badham (Director)MovieFictionxThe smash-hit deserves a day off to get a well-deserved appreciation when watched. The movie features Matthew Broderick hacking a military database that activates a nuclear arsenal of the USA that raises a few red flags for the nation. The movie is the first mass-consumed movie of that decade as a visual representation of the side effects of the internet. It takes the web as a framework and vehicle for the USA’s earliest emergence of technology. Media has focused on a real-life war games scenario after the wakeup call from the movie. The movie’s high tech hacking and military security concerns led the U.S. federal government to create an internet policy for the first time as the Computer Fraud and Abuse Act of 1984. As the movie pictures a scene showing a computer dialing system to lead a term as War Dialing, an advanced technique was introduced to scan a list of phone numbers and drive a broadcast call to every number as Demon Driving or Demon Dialing. Fiction Century Fox20th Century FoxBEST
Watchers2010The Watchers: The Rise of America’s Surveillance StateShane HarrisBookx Acad NonFict
Watchman in Pieces2013The Watchman in Pieces: Surveillance, Literature, and Liberal PersonhoodDavid Rosen and Aaron SantessoBookx Acad NonFict
We Are Data2017We Are Data: Algorithms and The Making of Our Digital SelvesJohn Cheney-LippoldBook Acad NonFict
We Are Legion2012We Are Legion: The Story of the HacktivistsBrian Knappenberger (Director)MovieDocumentaryxThose who are interested in the deep dark web—and conspiracy theories—may have heard of Anonymous, the decentralized international group of hackers known for their attacks against government and corporate institutions. This has led to their reputation as leading hacktivists (hacker activists) who randomly appear when they perceive threats to the cyber freedom or data privacy of regular citizens. “We Are Legion: The Story of the Hacktivists” introduces their operations, history, beliefs and motivations behind some of their movements. Fun fact: Anonymous was reported to have resurfaced recently to help seek retribution for George Floyd’s death.LINK1LINK2
We Have Been Harmonized2020We Have Been Harmonized: Life in China's Surveillance StateKai StrittmatterBook/Audio Leone CIPP/E CIPM
Weapons of Math Destruction2016Weapons of Math Destruction: How Big Data Increases Inequality and Threatens DemocracyCathy O'NeilBook Stan
Web Privacy in RTB Systems2019Web Privacy Measurement in Real-Time Bidding Systems. A Graph-Based Approach to RTB System ClassificationRob van EijkPDFResearch/ReportAdTechWeb Privacy Measurement (WPM) has been established as an academic research field since 2012. WPM scholars observe websites and services to detect, characterize, and quantify privacy impacting behaviors. The main goal of the research field is to increase transparency through measurement. In the doctoral thesis, Robbert J. van Eijk investigates the advertisements online that seem to follow you. The technology enabling the advertisements is called Real-Time Bidding (RTB). An RTB system is defined as a network of partners enabling big data applications within the organizational field of marketing. The system aims to improve sales by real-time data-driven marketing and personalized (behavioral) advertising. The author applies network science algorithms to arrive at measuring the privacy component of RTB. In the thesis, it is shown that cluster-edge betweenness and node betweenness support us in understanding the partnerships of the ad-technology companies. From our research it transpires that the interconnection between partners in an RTB network is caused by the data flows of the companies themselves due to their specializations in ad technology. Furthermore, the author provides that a Graph-Based Methodological Approach (GBMA) controls the situation of differences in consent implementations in European countries. The GBMA is tested on a dataset of national and regional European news websites.LINK1LINK2 Stan Law SchoolLeiden Law SchoolBEST
Who Am I2014Who Am I: No System Is SafeBaran bo OdarMovieCrime, Drama, Mystery The main lesson of German hacker movie Who Am I: No System is Safe has to be the most basic security lesson of all: Human beings are the weak link. A review in INQPOP! compares this movie to Mr. Robot in that it sheds light on the hacker's world and uses masks as props to incite terror and fear and create a palpable sense of the creepy. If you can hack the English subtitles, this one's a coming-of-age movie for the hacker generation.LINK1LINK2 Reading
Windows into the Soul2016Windows into the Soul: Surveillance and Society in an Age of High TechnologyGary T. MarxBookPolitics & Social Sciences > Politics & Governmentx Acad NonFict
Wool2011Wool SeriesHugh HoweyBookFiction Fiction
Your Evil Twin2004Your Evil Twin: Behind the Identity Theft EpidemicBob SullivanBook Acad NonFict