Defending Secrets, Sharing Data


Book Description

Examines Federal policies directed at protecting information, particularly in electronic communications systems. Examines the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these systems. Addresses important trends taking place in the private sector. Charts and tables.







Global Corporate Intelligence


Book Description

In this volume, noted experts in a variety of information, business, and management fields offer a comprehensive overview of the role information plays in global business and its impact on competition and competitiveness. At the core of the collection is a common belief in the essential value of information to the modern business and a recognition that the corporate intelligence function must today cope with changing realities produced by both new technology and the globalization of markets. Taking these as their points of departure, the contributors discuss a broad spectrum of corporate intelligence issues ranging from the uses of artificial intelligence and the structure of the corporate intelligence system to the nature of security threats, financial warfare, and corporate risk assessment. The chapters are divided into five sections and begin with two essays on the emerging interrelated global world order. George Roukis discusses the corporate intelligence process as it embodies the global view, while Hugh Conway shows how modern technology has changed the corporate intelligence function. Three chapters explore the information applications of new technologies, including the use of the computer to further all aspects of corporate intelligence gathering and the emergence of an information industry to serve the needs of intelligence gatherers. The following section contains chapters that address,in turn, the use of intelligence in strategic decisionmaking, coping with bad news, the process of intelligence gathering, and field-marketing intelligence. Turning to a discussion of outside threats to corporate intelligence data security, the contributors examine computer security in general, defense related computer security, and the terrorist threat to corporations. In the final section, the contributors look at a number of strategic challenges. A particularly interesting chapter examines corporate intelligence in Japan; others look at geography and corporate risk assessment, the Soviet foreign intelligence service, and corporate responses to financial warfare. Competitive intelligence and marketing executives, as well as students in international business programs, will find this volume enlightening and provocative reading.







Informatica e diritto


Book Description




Privacy in the Age of Big Data


Book Description

Digital devices have made our busy lives a little easier and they do great things for us, too – we get just-in-time coupons, directions, and connection with loved ones while stuck on an airplane runway. Yet, these devices, though we love them, can invade our privacy in ways we are not even aware of. The digital devices send and collect data about us whenever we use them, but that data is not always safeguarded the way we assume it should be to protect our privacy. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Payton and Claypoole skillfully introduce readers to the many ways we are “watched” and how to change behaviors and activities to recapture and regain more of our privacy. The authors suggest remedies from tools, to behavior changes, to speaking out to politicians to request their privacy back. Anyone who uses digital devices for any reason will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.







Infosystems


Book Description







Silencing Science


Book Description

. . . Relyea's book provides good source material and discussion for an important juncture in American and world history, and also a point of departure for future studies of scientific communication in relation to national security concerns in the so-called Post-Cold War Setting. -Journal of Information Ethics