Online Advertising and Hidden Hazards to Consumer Security and Data Privacy


Book Description

Online advertising and hidden hazards to consumer security and data privacy : hearing before the Permanent Subcommittee on Investigations of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, May 15, 2014.




Online Advertising and Hidden Hazards to Consumer Security and Data Privacy


Book Description

With the emergence of the Internet and e-commerce, more and more commonplace activities are taking place on the Internet, which has led to major advances in convenience, consumer choice, and economic growth. These advances have also presented novel questions concerning whether consumer security and privacy can be maintained in the new technology-based world. We will examine these issues today specifically in the context of online advertising, where vast data is collected and cyber criminals exploit vulnerabilities in the system and use malware to harm consumers. Consumers who venture into the online world should not have to know more than cyber criminals about technology and the Internet in order to stay safe. Instead, sophisticated online advertising companies like Google and Yahoo! have a responsibility to help protect consumers from the potentially harmful effects of the advertisements they deliver.




Hidden Hazards of Online Advertising


Book Description

In this book, the Permanent Subcommittee on Investigations of the U.S. Senate Homeland Security and Governmental Affairs Committee examine issues of consumer privacy and security on the Internet and in the broader online economy. Central to this segment of the economy is the online advertising industry, which continues to grow in importance. In 2013, U.S. online advertising revenue for the first time surpassed that of broadcast television advertising as companies spent nearly $43 billion to reach consumers. The online advertising ecosystem is highly complex. Online advertisers do far more than merely disseminate text, graphic, or video advertisements. Underlying the work of online advertisers are sophisticated systems that are able to identify and target specific consumer groups with relevant advertising, as well as state-of-the art security practices to monitor the integrity of these ad delivery systems. The ability to target advertising is a key function of online ad delivery systems, and advertisers are willing to pay a premium of between 60 and 200 percent for these services. With the continuing boom in mobile devices, the importance, and complexity, of digital advertising is likely to continue increasing in years to come. The Subcommittee's investigation focused on the features and vulnerabilities in the online advertising industry that invite malware attacks. The Subcommittee also sought to highlight the potential hazards to private consumer information which result from consumer visits to even mainstream websites. The Subcommittee surveyed Internet participants and interviewed representatives from major ad networks, ad exchanges, data brokers, self-regulatory bodies, the Federal Trade Commission, consumer protection groups, and other participants in the online advertising industry to identify the vulnerabilities that have led to significant hazards to consumer safety and loss of consumer privacy online.




Managing Security Issues and the Hidden Dangers of Wearable Technologies


Book Description

Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices.




Cybersecurity in Our Digital Lives


Book Description

Did you know your car can be hacked? Your medical device? Your employer’s HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of how and why they happen, or if they have been professionally or personally compromised. In Cybersecurity in Our Digital Lives, twelve experts provide much-needed clarification on the technology behind our daily digital interactions. They explain such things as supply chain, Internet of Things, social media, cloud computing, mobile devices, the C-Suite, social engineering, and legal confidentially. Then, they discuss very real threats, make suggestions about what can be done to enhance security, and offer recommendations for best practices. An ideal resource for students, practitioners, employers, and anyone who uses digital products and services.




Between Truth and Power


Book Description

This work explores the relationships between legal institutions and political and economic transformation. It argues that as law is enlisted to help produce the profound economic and sociotechnical shifts that have accompanied the emergence of the informational economy, it is changing in fundamental ways.




Identity Theft: Breakthroughs in Research and Practice


Book Description

The preservation of private data is a main concern of governments, organizations, and individuals alike. For individuals, a breach in personal information can mean dire consequences for an individual’s finances, medical information, and personal property. Identity Theft: Breakthroughs in Research and Practice highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one’s identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future. This publication is an essential resource for information security professionals, researchers, and graduate-level students in the fields of criminal science, business, and computer science.




Online Advertising and Hidden Hazards to Consumer Security and Data Privacy


Book Description

Congressional report of an investigation of issues central to consumer privacy and security on the Internet. Central to this segment of the economy is the online advertising industry, which continues to grow in importance. In 2013, U.S. online advertising revenue surpassed that of broadcast TV advertising as companies spent $42.8 billion to reach consumers. Although consumers are increasingly vigilant about safeguarding the information they share on the Internet, many are less informed about the plethora of information created about them by online companies. Furthermore, many consumers are unaware that mainstream websites are becoming frequent avenues for cybercriminals seeking to infect a consumer's computer with advertisement-based malware, or "malvertising." This report highlights this specific aspect of online security, malware attacks. Figures. This is a print on demand report.




Terrorism: Commentary on Security Documents Volume 140


Book Description

Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 140, The Cyber Threat considers U.S. policy in relation to cybersecurity and cyberterrorism, and examines opposing views on cybersecurity and international law by nations such as Russia and China. The documents in this volume include testimony of FBI officials before Congressional committees, as well as detailed reports from the Strategic Studies Institute/U.S. Army War College Press and from the Congressional Research Service. The detailed studies in this volume tackling the core issues of cybersecurity and cyberterrorism include: Legality in Cyberspace; An Adversary View and Distinguishing Acts of War in Cyberspace; and Assessment Criteria, Policy Considerations, and Response Implications.




Financial Exposure


Book Description

At a time when Congressional investigations have taken on added importance and urgency in American politics, this book offers readers a rare, insider’s portrait of the world of US Congressional oversight. It examines specific oversight investigations into multiple financial and offshore tax scandals over fifteen years, from 1999 to 2014, when Senator Levin served in a leadership role on the US Senate Permanent Subcommittee on Investigations (PSI), the Senate’s premier investigative body. Despite mounting levels of partisanship, dysfunction, and cynicism swirling through Congress during those years, this book describes how Congressional oversight investigations can be a powerful tool for uncovering facts, building bipartisan consensus, and fostering change, offering detailed case histories as proof. Grounded in fact, and written as only an insider could tell it, this book will be of interest to financial and tax practitioners, policymakers, academics, students, and the general public.