The Audacity to Spy

The Audacity to Spy

The Audacity to Spy

Ashley Wilson / Catherine Nolan

15,14 €
IVA incluido
Disponible
Editorial:
Technics Publications
Año de edición:
2014
Materia
Cuestiones y debates éticos
ISBN:
9781935504795
Páginas:
464
15,14 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería 7artes
  • Donde los libros
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Ever get the feeling you’re being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet.The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalize their own services and to sell to other advertisers for behavioral marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasn’t enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users’ valuable personal and financial information.More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.   3

Artículos relacionados

  • Collateral Damage
    Kelley Jill
    This story is what every American fears: the damage that can be caused by our government's electronic overreach — the collection of everything about everyone — and the catastrophe that can occur when government agents are given free rein to invade people’s private communications, with the boundless tools available to them. This story goes far beyond the narrative of one po...
    Consulta disponibilidad

    15,11 €

  • Negotiating Workplace Relationships
    Jeffrey W. Kassing / Jeffrey WKassing / Vincent R. Waldron / Vincent RWaldron
    Negotiating Workplace Relationships teaches students how to navigate the ethically challenging and professionally risky situations they are likely to encounter in their working lives. Grounded in both classic and contemporary studies, this narrative-based text introduces a theoretical framework and pragmatic communication strategies for mitigating personal risk and optimizing r...
    Disponible

    73,42 €

  • Negotiating Workplace Relationships
    Vincent R. Waldron / Vincent RWaldron
    ...
    Disponible

    116,99 €

  • How to Hack a Human
    Raef Meeuwisse / Marina Meeuwisse
    Do you worry about cyber criminals hacking your computers and other digital devices? You should. Connect a new computer to the Internet and the average time before there is a hacking attempt is less than a minute.But you may not be aware that hacking the human mind is far easier than hacking any computer system – if you know how to do it. What’s even scarier is that both crimin...
    Disponible

    26,40 €

  • Adolfo Sánchez Rebolledo
    María Patricia Pensado Leglise
    El presente libro es un discurrir por la memoria –documentada, decantada– y por el tiempo. Un listado de intereses, preocupaciones, temas y debates abiertos. Un “plus” de largas sesiones de pláticas que sostuvo Adolfo Sánchez Rebolledo con Patricia Pensado, cuyo material está en el Instituto Mora a disposición de todo interesado. Abanico multicolor son los temas que se abordan:...
    Consulta disponibilidad

    0,00 €

  • Balcanes, la herida abierta de europa
    José Ángel Ruiz Jiménez
    Desde el inicio de las guerras balcánicas en 1991, ha existido un constante interés académico y mediático en esa región, casi siempre centrado en su cara más violenta y llamativa: guerras, limpiezas étnicas, nacionalismos asesinos, odios milenarios, etc. Esta obra ofrece una imagen distinta, más cercana y a la vez más compleja, sobre los Balcanes. Para ello, especialistas en di...
    Consulta disponibilidad

    13,87 €