Compromised Data

Compromised Data
Author: Greg Elmer
Publisher: Bloomsbury Publishing USA
Total Pages: 297
Release: 2015-07-30
Genre: Social Science
ISBN: 1501306529

There has been a data rush in the past decade brought about by online communication and, in particular, social media (Facebook, Twitter, Youtube, among others), which promises a new age of digital enlightenment. But social data is compromised: it is being seized by specific economic interests, it leads to a fundamental shift in the relationship between research and the public good, and it fosters new forms of control and surveillance. Compromised Data: From Social Media to Big Data explores how we perform critical research within a compromised social data framework. The expert, international lineup of contributors explores the limits and challenges of social data research in order to invent and develop new modes of doing public research. At its core, this collection argues that we are witnessing a fundamental reshaping of the social through social data mining.

Compromised Data

Compromised Data
Author: Greg Elmer
Publisher: Bloomsbury Publishing USA
Total Pages: 297
Release: 2015-07-30
Genre: Social Science
ISBN: 1501306510

Explores the ethical and political issues surrounding big data, specifically obtained from social media.

Information is Beautiful

Information is Beautiful
Author: David McCandless
Publisher: HarperCollins UK
Total Pages: 258
Release: 2009
Genre: Art
ISBN: 0007294662

Miscellaneous facts and ideas are interconnected and represented in a visual format, a "visual miscellaneum," which represents "a series of experiments in making information approachable and beautiful" -- from p.007

America, Compromised

America, Compromised
Author: Lawrence Lessig
Publisher: University of Chicago Press
Total Pages: 264
Release: 2018-10-22
Genre: Law
ISBN: 022631667X

An analysis of “the Trump era, but not about Trump. . . . but on how incentives across a range of institutions have created corruption” (New York Times Book Review). “There is not a single American awake to the world who is comfortable with the way things are.” So begins Lawrence Lessig's sweeping indictment of modern-day American institutions and the corruption that besets them—from the selling of Congress to special interests to the corporate capture of the academy. And it’s our fault. What Lessig brilliantly shows is that we can’t blame the problems of contemporary American life on bad people, as our discourse all too often tends to do. Rather, he explains, “We have allowed core institutions of America’s economic, social, and political life to become corrupted. Not by evil souls, but by good souls. Not through crime, but through compromise.” Through case studies of Congress, finance, the academy, the media, and the law, Lessig shows how institutions are drawn away from higher purposes and toward money, power, quick rewards—the first steps to corruption. Lessig knows that a charge so broad should not be levied lightly, and that our instinct will be to resist it. So he brings copious detail gleaned from years of research, building a case that is all but incontrovertible: America is on the wrong path. If we don’t acknowledge our own part in that, and act now to change it, we will hand our children a less perfect union than we were given. It will be a long struggle. This book represents the first steps. “A devastating argument that America is racing for the cliff's edge of structural, possibly irreversible tyranny.” —Cory Doctorow

Compromised

Compromised
Author: Heidi Ayarbe
Publisher: Harper Collins
Total Pages: 470
Release: 2010-05-04
Genre: Young Adult Fiction
ISBN: 0062001469

Maya's life has always been chaotic. Living with a con-man dad, she's spent half her life on the run. Whenever her father's schemes go wrong, Maya finds a scientific way to fix it. But when her dad ends up in prison and foster care fails, Maya grasps at her last possible hope of a home: a long-lost aunt, who may not even exist. So Maya formulates a plan, and with her wits, two unlikely allies, and twenty dollars in her pocket, she sets off in search of this aunt, navigating the unpredictable four hundred miles from Reno to Boise. Life on the streets, though, becomes a struggle for survival—those scientific laws Maya has relied on her whole life just don't apply. And with each passing day, Maya's definitions of right and wrong are turned upside down when she's confronted with the realities and dangers of life as a runaway. She can't help but wonder if trying to find her aunt—and some semblance of stability—is worth the harrowing journey or if she should compromise and find a way to survive on her own.

Data and Applications Security XXII

Data and Applications Security XXII
Author: Vijay Atluri
Publisher: Springer Science & Business Media
Total Pages: 356
Release: 2008-07
Genre: Business & Economics
ISBN: 354070566X

This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems.

Subcommittee Hearing on Data Security

Subcommittee Hearing on Data Security
Author: United States. Congress. House. Committee on Small Business. Subcommittee on Finance and Tax
Publisher:
Total Pages: 100
Release: 2007
Genre: Business & Economics
ISBN:

Advances in Information and Computer Security

Advances in Information and Computer Security
Author: Atsuo Inomata
Publisher: Springer
Total Pages: 330
Release: 2018-08-08
Genre: Computers
ISBN: 3319979167

This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security.