Read about issues in digital privacy such as mass surveillance, data brokers, and online scams with these staff picks. For practical tips and tools, see this guide.
Author Kevin Mitnick, the world's "most famous hacker," shares his knowledge on how vulnerabilities can be exploited and provides step-by-step instructions on password protection, smart Wi-Fi usage, and advanced techniques to maximize anonymity. Mitnick emphasizes that privacy is a power that should be valued in the age of Big Brother and Big Data.
As the digital world grows, teens must be aware of threats to their online privacy and security. This book details forms of cyberspying, explores careers in cyberintelligence, and looks at various online threats.
This book looks at the way information and data is collected and used by individuals, governments, companies, and organizations. Arguments for both increased security and increased privacy are offered, encouraging readers to think critically about the issues. Topics relevant to children are included, such as being tracked at school, cyber bullying, and online safety.
Author Danielle Keats Citron, a civil rights advocate, highlights the disappearance of privacy in the 21st century, as technology becomes more intrusive into our lives. The author argues that privacy is a civil right, and citizens, lawmakers, and corporations can create a new reality where privacy is valued and people are protected. She urges readers to take back control of their data and build a better future for the digital generation.
The author explores privacy and surveillance in government and the marketplace, highlighting their evolution over time. Hartmann discusses the rise of Big Brother and Thought Police types of government and highlights how these concepts can control and predict human behavior.
The author dispels widespread myths about mass surveillance, privacy, and autonomy in the digital age. Boghosian presents various myths about surveillance, including the belief that smart homes are safer, social media monitoring is not done by police, and there's no way to stop surveillance.
This is an accessible guide to protecting your privacy while you take advantage of the extraordinary resources available to you through the internet and your mobile devices. It approaches every topic from a senior’s point of view, using meaningful examples, step-by-step tasks, large text, and a custom full-color interior designed for comfortable reading.
This book examines the risks and benefits of using the internet today. Readers will learn the history of important online issues, the warning signs of common online dangers, and the ways in which they can get online safely and responsibly.
Pegasus, a highly sought-after cyber-surveillance system, has been used to spy on numerous innocent individuals worldwide. The system can infect private cell phones without alerting the owner and can track daily movements, gain control of microphones and cameras, and capture all data. The author reports on this technology and its consequences for privacy, freedom of the press, and freedom of speech.
Wild provides a guide for making your technology "resilient," or reliable, secure, and under your control. The author covers computer and smartphone resiliency, digital file backup, and more. At the end of each chapter is a checklist to help you monitor your progress.
The author highlights the implications of our laid-back attitudes to data and outlines ways to reclaim control. She argues that we need new regulation, pressure policymakers for red lines on the data economy, and adopt privacy-friendly alternatives to online platforms.
This book examines the risks and benefits of using the internet today. Readers will learn the history of important online issues, the warning signs of common online dangers, and the ways in which they can get online safely and responsibly.
The author discusses how to protect personal information from online privacy violations. This book covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create online profiles. It also contains emergency instructions for those who have been hacked or had their identity, phone, or laptop stolen.
A literary and cultural critic turns his attention to social networking and its continued evolution, urging users to take back ownership of their digital lives from the Silicon Valley corporations who claim to know what's best for them.