Salem Press
Back Search

SEARCH

Search
To search multiple titles Click Here
Salem Press
Copy Permalink to this Title to Clipboard

The Reference Shelf: Internet Abuses and Privacy Rights

Table of Contents

Preface




1 Personal Cybersecurity




The Personal Data Dimension




How to Protect Your Digital Privacy in the Era of Public Shaming




Passing the Email Privacy Act Has Never Been More Urgent




Practicing Good Personal Cybersecurity Isn’t Just about Protecting Yourself




The Watchers: Assaults on Privacy in America




Open Technology: Values, Compromises, and Ownership




2 Net Neutrality and Government Surveillance




Cyberpolitics: Neutrality, Privacy, and Security




Follow Obama's Lead on Cybersecurity




Consumers Are Going to Love the End of Net Neutrality—at First




Government's Privacy Rights Don't Exceed the Public's




Documents Show AT&T Secretly Sells Customer Data to Law Enforcement




Concerns Loom Over a Data-Sharing Pact to Protect Privacy of Europeans




Trump’s FCC Pick Quickly Targets Net Neutrality Rules




Now It’s Much Easier for Government Agencies to Get NSA Surveillance Data




The Risks of Sending Secret Messages in the White House




3 New Challenges to Privacy




Cyberthreats of Today and Tomorrow




The Privacy Threat from Always-On Microphones Like the Amazon Echo




Incentives Need to Change for Firms to Take Cyber-Security More Seriously




Hacking, Cryptography, and the Countdown to Quantum Computing




The Dyn DDoS Attack and the Changing Balance of Online Cyber Power




The Internet of Things Is a Cyberwar Nightmare




The Biggest Security Threats Coming in 2017




Why Does Our Privacy Really Matter?




4 Internet News and Accountability




Internet News and the Fight for Legitimacy




Fake News Expert on How False Stories Spread and Why People Believe Them




Who Controls Your Facebook Feed




The Very Real Consequences of Fake News Stories and Why Your Brain Can’t Ignore Them




Why Do We Fall for Fake News?




The Trump Administration Plays Right into Russia’s Information Warfare Strategy




5 The Power and Influence of Technology




Black Hats and White Hats: The Hacking Phenomenon




The Perfect Weapon: How Russian Cyberpower Invaded the U.S.




Hacking the Attention Economy




Partisan Politics and the Russian Hacking Imbroglio




Feds: We Can Read All Your Email, and You’ll Never Know




Lobbying Muscle May Help Tech Titans “Trump” Trump




Reboot the World




Bibliography




Websites