Engaging Privacy and Information Technology in a Digital Age


Book Description

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.




Safety and Security Science and Technology


Book Description

Global security threats have created a complex risk landscape that is challenging and transforming society. These global security issues intersect and influence the political, economic, social, technological, ecological and legal dimensions of the complex risk landscape and are now transborder thereby becoming national security issues. Accessing the innovation space to support safety, security and defence capabilities is critical in order to mitigate new and evolving threats. Through real-world examples of innovation, this book provides a detailed examination of the innovation space as it pertains to the application of S&T to safety and security threats and challenges. This book is of most interest to public and private sector innovators as well as academician and graduate students working in the safety and security domain.







High-priority Information Technology Needs for Law Enforcement


Book Description

This study reports on strategic planning activities supporting the National Institute of Justice (NIJ) in the area of information technology, collecting and analyzing data on law enforcement needs and identifying potential solutions through technology assessment studies, extensive outreach and liaison activities, and subject matter expert panels.




ECKM2015-16th European Conference on Knowledge Management


Book Description

These proceedings represent the work of researchers presenting at the 16th European Conference on Knowledge Management (ECKM 2015). We are delighted to be hosting ECKM at the University of Udine, Italy on the 3-4 September 2015. The conference will be opened with a keynote from Dr Madelyn Blair from Pelerei Inc., USA on the topic “The Role of KM in Building Resilience”. On the afternoon of the first day Dr Daniela Santarelli, from Lundbeck, Italy will deliver a second keynote speech. The second day will be opened by Dr John Dumay from Macquarie University, Sydney, Australia. ECKM is an established platform for academics concerned with current research and for those from the wider community involved in Knowledge Management to present their findings and ideas to peers from the KM and associated fields. ECKM is also a valuable opportunity for face to face interaction with colleagues from similar areas of interests. The conference has a well-established history of helping attendees advance their understanding of how people, organisations, regions and even countries generate and exploit knowledge to achieve a competitive advantage, and drive their innovations forward. The range of issues and mix of approaches followed will ensure an interesting two days. 260 abstracts were initially received for this conference. However, the academic rigor of ECKM means that, after the double blind peer review process there are 102 academic papers, 15 PhD research papers, 1 Masters research papers and 7 Work in Progress papers published in these Conference Proceedings. These papers reflect the continuing interest and diversity in the field of Knowledge Management, and they represent truly global research from many different countries, including Algeria, Austria, Bosnia and Herzegovina, Brazil, Canada, Chile, Colombia, Cuba, Cyprus, Czech Republic, Estonia, Finland, France, France, Germany, Hungary, India, Indonesia, Iran, Ireland, Italy, Japan, Jordan, Kenya, Lithuania, Mexico, Nigeria, Norway, Pakistan, Poland, Portugal, Romania, Russia, Slovakia, Slovenia, South Africa, Spain, Sri Lanka, Sultanate of Oman, Sweden, Switzerland, Thailand, The Netherlands, UK, United Arab Emirates, USA and Venezuela.




Protecting Homeland Security


Book Description




Successful Response Starts with a Map


Book Description

In the past few years the United States has experienced a series of disasters, such as Hurricane Katrina in 2005, which have severely taxed and in many cases overwhelmed responding agencies. In all aspects of emergency management, geospatial data and tools have the potential to help save lives, limit damage, and reduce the costs of dealing with emergencies. Great strides have been made in the past four decades in the development of geospatial data and tools that describe locations of objects on the Earth's surface and make it possible for anyone with access to the Internet to witness the magnitude of a disaster. However, the effectiveness of any technology is as much about the human systems in which it is embedded as about the technology itself. Successful Response Starts with a Map assesses the status of the use of geospatial data, tools, and infrastructure in disaster management, and recommends ways to increase and improve their use. This book explores emergency planning and response; how geospatial data and tools are currently being used in this field; the current policies that govern their use; various issues related to data accessibility and security; training; and funding. Successful Response Starts with a Map recommends significant investments be made in training of personnel, coordination among agencies, sharing of data and tools, planning and preparedness, and the tools themselves.




Computers at Risk


Book Description

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.




Information Management Capabilities in Public Safety and Security


Book Description

This book provides thoughtful and extensively researched perspectives, to improve understanding of risks and rewards, and to outline strategies for developing and implementing mature information management capabilities focused on core public safety and security outcomes. Decision makers in Canadian public safety and security organizations – law enforcement, fire and paramedic services, emergency management and national security, from local to national scopes and scales – are faced with an onslaught of rapidly changing technologies with uncertain application in an increasingly complex safety and security. How do these technologies fit into a strategic information management capability for public safety and security organizations? How do these technologies impact other areas of the organization? How can we harness these technologies to improve safety and security outcomes for Canadians? How would information governance strategy, governance and resourcing need to be structured and how would this function in the current operating environment and how would ethics, standards, privacy and information sharing and protection mechanisms need to be addressed in the face of compliance with legislation, regulation or policy? This volume makes the case for adopting strategic IM mindsets and practices intended to address a range of persistent IM challenges in public safety and security such as: building mature analytics and information sharing capabilities; building ethics, privacy, security and standards into IM governance aligned with public safety and security outcomes. The book is intended for senior decision makers in organizations that have responsibilities to delivery on core public safety and security outcomes and rely on information management to do so. These decision-makers face rapidly changing technologies in an increasingly complex business environment, face pressures for talent management and face risk-laden practices that impede or constrain the optimal use of information to achieve these outcomes for their organizations.