Defending Secrets, Sharing Data

Defending Secrets, Sharing Data

Author:

Publisher:

Published: 1987

Total Pages: 196

ISBN-13:

DOWNLOAD EBOOK

Examines Federal policies directed at protecting information, particularly in electronic communications systems. Examines the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these systems. Addresses important trends taking place in the private sector. Charts and tables.


Global Corporate Intelligence

Global Corporate Intelligence

Author: George Roukis

Publisher: Praeger

Published: 1990-05-08

Total Pages: 370

ISBN-13:

DOWNLOAD EBOOK

In this volume, noted experts in a variety of information, business, and management fields offer a comprehensive overview of the role information plays in global business and its impact on competition and competitiveness. At the core of the collection is a common belief in the essential value of information to the modern business and a recognition that the corporate intelligence function must today cope with changing realities produced by both new technology and the globalization of markets. Taking these as their points of departure, the contributors discuss a broad spectrum of corporate intelligence issues ranging from the uses of artificial intelligence and the structure of the corporate intelligence system to the nature of security threats, financial warfare, and corporate risk assessment. The chapters are divided into five sections and begin with two essays on the emerging interrelated global world order. George Roukis discusses the corporate intelligence process as it embodies the global view, while Hugh Conway shows how modern technology has changed the corporate intelligence function. Three chapters explore the information applications of new technologies, including the use of the computer to further all aspects of corporate intelligence gathering and the emergence of an information industry to serve the needs of intelligence gatherers. The following section contains chapters that address,in turn, the use of intelligence in strategic decisionmaking, coping with bad news, the process of intelligence gathering, and field-marketing intelligence. Turning to a discussion of outside threats to corporate intelligence data security, the contributors examine computer security in general, defense related computer security, and the terrorist threat to corporations. In the final section, the contributors look at a number of strategic challenges. A particularly interesting chapter examines corporate intelligence in Japan; others look at geography and corporate risk assessment, the Soviet foreign intelligence service, and corporate responses to financial warfare. Competitive intelligence and marketing executives, as well as students in international business programs, will find this volume enlightening and provocative reading.


Privacy in the Age of Big Data

Privacy in the Age of Big Data

Author: Theresa Payton

Publisher: Rowman & Littlefield

Published: 2014-01-16

Total Pages: 277

ISBN-13: 1442225467

DOWNLOAD EBOOK

Digital devices have made our busy lives a little easier and they do great things for us, too – we get just-in-time coupons, directions, and connection with loved ones while stuck on an airplane runway. Yet, these devices, though we love them, can invade our privacy in ways we are not even aware of. The digital devices send and collect data about us whenever we use them, but that data is not always safeguarded the way we assume it should be to protect our privacy. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Payton and Claypoole skillfully introduce readers to the many ways we are “watched” and how to change behaviors and activities to recapture and regain more of our privacy. The authors suggest remedies from tools, to behavior changes, to speaking out to politicians to request their privacy back. Anyone who uses digital devices for any reason will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.


Silencing Science

Silencing Science

Author: Harold Relyea

Publisher: Praeger

Published: 1994

Total Pages: 280

ISBN-13:

DOWNLOAD EBOOK

. . . Relyea's book provides good source material and discussion for an important juncture in American and world history, and also a point of departure for future studies of scientific communication in relation to national security concerns in the so-called Post-Cold War Setting. -Journal of Information Ethics