The seven veils of privacy


Book Description

Privacy is one of the most contested concepts of our time. This book sets out a rigorous and comprehensive framework for understanding debates about privacy and our rights to it. Much of the conflict around privacy comes from a failure to recognise divergent perspectives. Some people argue about human rights, some about social conventions, others about individual preferences and still others about information and data processing. As a result, ‘privacy’ has become the focus of competing definitions, leading some to denounce the ‘disarray’ in the field. But as this book shows, disagreements about the role and value of privacy obscure a large amount of agreement on the topic. Privacy is not a technical term of law, cybersecurity or sociology, but a word in common use that adequately expresses a few simple and related ideas.




Dictionary of Privacy, Data Protection and Information Security


Book Description

This is an open access title available under the terms of a CC BY-NC-ND 4.0 License. It is free to read, download and share on Elgaronline.com. The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy.




Handbook of Research on Big Data and the IoT


Book Description

The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.




The Handbook of Media Education Research


Book Description

Over the past forty years, media education research has emerged as a historical, epistemological and practical field of study. Shifts in the field—along with radical transformations in media technologies, aesthetic forms, ownership models, and audience participation practices—have driven the application of new concepts and theories across a range of both school and non-school settings. The Handbook on Media Education Research is a unique exploration of the complex set of practices, theories, and tools of media research. Featuring contributions from a diverse range of internationally recognized experts and practitioners, this timely volume discusses recent developments in the field in the context of related scholarship, public policy, formal and non-formal teaching and learning, and DIY and community practice. Offering a truly global perspective, the Handbook focuses on empirical work from Media and Information Literacy (MIL) practitioners from around the world. The book’s five parts explore global youth cultures and the media, trans-media learning, media literacy and scientific controversies, varying national approaches to media research, media education policies, and much more. A ground breaking resource on the concepts and theories of media research, this important book: Provides a diversity of views and experiences relevant to media literacy education research Features contributions from experts from a wide-range of countries including South Africa, Finland, India, Italy, Brazil, and many more Examines the history and future of media education in various international contexts Discusses the development and current state of media literacy education institutions and policies Addresses important contemporary issues such as social media use; datafication; digital privacy, rights, and divides; and global cultural practices. The Handbook of Media Education Research is an invaluable guide for researchers in the field, undergraduate and graduate students in media studies, policy makers, and MIL practitioners.




Research Anthology on Privatizing and Securing Data


Book Description

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.




The Seven Veils


Book Description

The story begins in a small Texas hill country town of Llano. The main character, Robert Rhodes, is the editor of the local newspapers and a member of the city council. He was a decorated World War l hero, which is the prime reason he was accepted by the cliquish citizens of the tiny berg. It had been eight years since he had been discharged after receiving the Purple Heart medal for being injured in the battle of Chatel-Chehery near the Argonne Forest. On a moonless summer night, a bronze statue, without any warning or fanfare, appeared on the town square while the towns occupants slept. After the mysterious arrival of the nude life-size bronze lady holding an infant had manifested itself in between the turn-of-the-century county courthouse and the WWI doughboy statue erected in honor of the veterans from Llano County who gave their lives in Europe, the city government was left with little time to do anything else but to deal with the fury of their religious constituents. They, with their superstitions and religious prejudicial minds, were holding the city commission accountable for the sinful nude woman exposing herself shamelessly on the Town Square. The Llano city government consisted of a mayor and six council members, and each of their lives will be directly affected by the presence of the illicit statue blatantly displaying itself on the courthouse lawn. The unexplained visit by the statue of the naked young woman and child did more than ignite the anger of the religious communityit started the metamorphosis of each of the board members lives. Each member of the city council viewed the statue in a different light. As their lives took on a new beginning, it started in motion a change that would affect not only each member of the city commission but everyone they were connected to. The ripple of the rising tidal waters of social responsibility and reform were beginning to become apparent in the little hill country town and would soon be lapping on the pink granite steps of the Texas Capital Statehouse in Austin.




Algorithms, Artificial Intelligence and Beyond


Book Description

This volume brings together eminent scholars from various parts of the world, representing different fields of knowledge in order to explore the social, cultural, political and economic effects of the development of new technologies. On the one hand, the book contextualises the discussion of algorithms and artificial intelligence (AI) within the broader framework of the digital revolution, on the other it also examines individual experiences and practices. Moreover, in light of the speed at which algorithms and AI are being incorporated into various aspects of life, contributors also question the ethical implications of their development. The widespread development of AI and algorithmic solutions is one of the most important contemporary phenomena. It has an overwhelming impact on the social and cultural life of the 21st century. In this context, one can point to both exciting examples of the application of algorithms and AI in business and popular culture, as well as the challenges of widening social inequality or the expanding scope of surveillance. The scope of the impact of algorithms and AI makes the formation of new theoretical frameworks vital. This is the aim of this book, which will be of interest to academics within the humanities and social sciences with an interest in technology and the impact of algorithms and AI on society and culture.




Politics and Technology in the Post-Truth Era


Book Description

This book examines the relationship between information and communication technology (ICT) and politics in a global perspective.







The Theory and Practice of Social Machines


Book Description

Social machines are a type of network connected by interactive digital devices made possible by the ubiquitous adoption of technologies such as the Internet, the smartphone, social media and the read/write World Wide Web, connecting people at scale to document situations, cooperate on tasks, exchange information, or even simply to play. Existing social processes may be scaled up, and new social processes enabled, to solve problems, augment reality, create new sources of value, and disrupt existing practice. This book considers what talents one would need to understand or build a social machine, describes the state of the art, and speculates on the future, from the perspective of the EPSRC project SOCIAM – The Theory and Practice of Social Machines. The aim is to develop a set of tools and techniques for investigating, constructing and facilitating social machines, to enable us to narrow down pragmatically what is becoming a wide space, by asking ‘when will it be valuable to use these methods on a sociotechnical system?’ The systems for which the use of these methods adds value are social machines in which there is rich person-to-person communication, and where a large proportion of the machine’s behaviour is constituted by human interaction.