Compromised Data


Book Description

There has been a data rush in the past decade brought about by online communication and, in particular, social media (Facebook, Twitter, Youtube, among others), which promises a new age of digital enlightenment. But social data is compromised: it is being seized by specific economic interests, it leads to a fundamental shift in the relationship between research and the public good, and it fosters new forms of control and surveillance. Compromised Data: From Social Media to Big Data explores how we perform critical research within a compromised social data framework. The expert, international lineup of contributors explores the limits and challenges of social data research in order to invent and develop new modes of doing public research. At its core, this collection argues that we are witnessing a fundamental reshaping of the social through social data mining.




Compromised Data


Book Description

Explores the ethical and political issues surrounding big data, specifically obtained from social media.




Information is Beautiful


Book Description

Miscellaneous facts and ideas are interconnected and represented in a visual format, a "visual miscellaneum," which represents "a series of experiments in making information approachable and beautiful" -- from p.007




America, Compromised


Book Description

An analysis of “the Trump era, but not about Trump. . . . but on how incentives across a range of institutions have created corruption” (New York Times Book Review). “There is not a single American awake to the world who is comfortable with the way things are.” So begins Lawrence Lessig's sweeping indictment of modern-day American institutions and the corruption that besets them—from the selling of Congress to special interests to the corporate capture of the academy. And it’s our fault. What Lessig brilliantly shows is that we can’t blame the problems of contemporary American life on bad people, as our discourse all too often tends to do. Rather, he explains, “We have allowed core institutions of America’s economic, social, and political life to become corrupted. Not by evil souls, but by good souls. Not through crime, but through compromise.” Through case studies of Congress, finance, the academy, the media, and the law, Lessig shows how institutions are drawn away from higher purposes and toward money, power, quick rewards—the first steps to corruption. Lessig knows that a charge so broad should not be levied lightly, and that our instinct will be to resist it. So he brings copious detail gleaned from years of research, building a case that is all but incontrovertible: America is on the wrong path. If we don’t acknowledge our own part in that, and act now to change it, we will hand our children a less perfect union than we were given. It will be a long struggle. This book represents the first steps. “A devastating argument that America is racing for the cliff's edge of structural, possibly irreversible tyranny.” —Cory Doctorow




Harboring Data


Book Description

As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, which breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.




Data Breaches


Book Description

Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control. You’ll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches. Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. Read it before a breach happens! Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.




Managing Catastrophic Loss of Sensitive Data


Book Description

Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. - Addresses a very topical subject of great concern to security, general IT and business management - Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data - Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues




Handbook of Data Intensive Computing


Book Description

Data Intensive Computing refers to capturing, managing, analyzing, and understanding data at volumes and rates that push the frontiers of current technologies. The challenge of data intensive computing is to provide the hardware architectures and related software systems and techniques which are capable of transforming ultra-large data into valuable knowledge. Handbook of Data Intensive Computing is written by leading international experts in the field. Experts from academia, research laboratories and private industry address both theory and application. Data intensive computing demands a fundamentally different set of principles than mainstream computing. Data-intensive applications typically are well suited for large-scale parallelism over the data and also require an extremely high degree of fault-tolerance, reliability, and availability. Real-world examples are provided throughout the book. Handbook of Data Intensive Computing is designed as a reference for practitioners and researchers, including programmers, computer and system infrastructure designers, and developers. This book can also be beneficial for business managers, entrepreneurs, and investors.




Data Analytics and Management in Data Intensive Domains


Book Description

This book constitutes the post-conference proceedings of the 23rd International Conference on Data Analytics and Management in Data Intensive Domains, DAMDID/RCDL 2021, held in Moscow, Russia, in October 2021*. The 16 revised full papers were carefully reviewed and selected from 61 submissions. The papers are organized in the following topical sections: problem solving infrastructures, experiment organization, and machine learning applications; data analysis in astronomy; data analysis in material and earth sciences; information extraction from text * The conference was held virtually due to the COVID-19 pandemic.




Security Strategies in Linux Platforms and Applications


Book Description

"Incorporating real-world examples and exercises throughout, Security Strategies in Linux Platforms and Applications discusses every major aspect of security on a Linux system, including coverage of the latest Linux distributions and kernels. Written by industry experts, the text opens with a review of the risks, threats, and vulnerabilities associated with Linux as an operating system. Part 2 discusses how to take advantage of the layers of security available to Linux - user and group options, filesystems, and security options for important services. The text concludes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments"--