Understanding Information


Book Description

The motivation of this edited book is to generate an understanding about information, related concepts and the roles they play in the modern, technology permeated world. In order to achieve our goal, we observe how information is understood in domains, such as cosmology, physics, biology, neuroscience, computer science, artificial intelligence, the Internet, big data, information society, or philosophy. Together, these observations form an integrated view so that readers can better understand this exciting building-block of modern-day society. On the surface, information is a relatively straightforward and intuitive concept. Underneath, however, information is a relatively versatile and mysterious entity. For instance, the way a physicist looks at information is not necessarily the same way as that of a biologist, a neuroscientist, a computer scientist, or a philosopher. Actually, when it comes to information, it is common that each field has its domain specific views, motivations, interpretations, definitions, methods, technologies, and challenges. With contributions by authors from a wide range of backgrounds, Understanding Information: From the Big Bang to Big Data will appeal to readers interested in the impact of ‘information’ on modern-day life from a variety of perspectives.




Personal Information Management


Book Description

In an ideal world, everyone would always have the right information, in the right form, with the right context, right when they needed it. Unfortunately, we do not live in an ideal world. This book looks at how people in the real world currently manage to store and process the massive amounts of information that overload their senses and their systems, and discusses how tools can help bring these real information interactions closer to the ideal. Personal information management (PIM) is the study and practice of the activities people perform to acquire, organize, maintain, and retrieve information for everyday use. PIM is a growing area of interest as we all strive for better use of our limited personal resources of time, money, and energy, as well as greater workplace efficiency and productivity. Personal information is currently fragmented across electronic documents, email messages, paper documents, digital photographs, music, videos, instant messages, and so on. Each form of information is organized and used to complete different tasks and to fulfill disparate roles and responsibilities in an individual’s life. Existing PIM tools are partly responsible for this fragmentation. They can also be part of the solution that brings information together again. A major contribution of this book is its integrative treatment of PIM-related research. The book grows out of a workshop on PIM sponsored by the National Science Foundation, held in Seattle, Washington, in 2006. Scholars from major universities and researchers from companies such as Microsoft Research, Google, and IBM offer approaches to conceptual problems of information management. In doing so, they provide a framework for thinking about PIM as an area for future research and innovation.




Privacy in Context


Book Description

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.







Understanding Privacy


Book Description

Privacy is one of the most important concepts of our time, yet it is also one of the most elusive. As rapidly changing technology makes information increasingly available, scholars, activists, and policymakers have struggled to define privacy, with many conceding that the task is virtually impossible. In this concise and lucid book, Daniel J. Solove offers a comprehensive overview of the difficulties involved in discussions of privacy and ultimately provides a provocative resolution. He argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family resemblances. His theory bridges cultural differences and addresses historical changes in views on privacy. Drawing on a broad array of interdisciplinary sources, Solove sets forth a framework for understanding privacy that provides clear, practical guidance for engaging with relevant issues. Understanding Privacy will be an essential introduction to long-standing debates and an invaluable resource for crafting laws and policies about surveillance, data mining, identity theft, state involvement in reproductive and marital decisions, and other pressing contemporary matters concerning privacy.







Beyond the HIPAA Privacy Rule


Book Description

In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of federal standards now known as the HIPAA Privacy Rule. In its 2009 report, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research, the Institute of Medicine's Committee on Health Research and the Privacy of Health Information concludes that the HIPAA Privacy Rule does not protect privacy as well as it should, and that it impedes important health research.




Personal Information Management


Book Description

Electronic mail, personal organizers, voice mail, all were introduced as time-saving devices designed to promote an easier and more efficient workplace. Yet many professionals find that making effective use of these new forms of communication technology can become a time-consuming task. In this handbook written for the office of the 21st century, Barbara Etzel and Peter J. Thomas provide guidance for those struggling to manage the growing volume of mail, memos, e-mail messages, and electronic documents that arrives daily. Personal Information Management details the skills professionals need to process this information, save time, and work more effectively. Etzel and Thomas present common organizational difficulties and enumerate concrete techniques for overcoming them. They guide the reader through a variety of computer software and hardware products, paper-based information products, and personal time management techniques, helping the reader to develop and individually-tailored Personal Information Management Strategy. Technologies covered include accounting and business software, word processors, databases, personal organizers, e-mail programs, tracking and storage packages, personal digital assistants, CD-Roms, computer backup devices, scanning device, voice mail, cellular phones, beepers, and fax machines, to name only a few. including an appendix listing the names and addresses of companies that Produce information technologies, Personal Information Technologies is essential reading for anyone suffering from information overload. Designed to be adaptable to emerging technologies, the techniques they provide will be applicable regardless for what the information age brings next.




Understanding Personal Security and Risk


Book Description

Uniting broad, time-tested security principles and the author’s 35-plus years of experience with international security, intelligence, and foreign affairs, Understanding Personal Security: A Guide for Business Travelers offers a detailed yet practical framework on which to develop personal security awareness and training programs. As a critical resource for any travelers who may need to make fast, smart judgements in high-risk environments, this book helps readers analyze threats, threat actors, and the common adversarial characteristics, as well as the function of risk as a differentiating principle. This versatile text blends abstract organizing principles with street honed instincts, becoming equally valuable to security managers with previous experience and those corporate or non-profit organizations with employees in developing nations.