Information Security

From Digital Culture & Society

(Difference between revisions)
Jump to: navigation, search
Revision as of 11:36, 12 February 2018 (edit)
Bb14ah (Talk | contribs)
(Articles)
← Previous diff
Revision as of 11:36, 12 February 2018 (edit) (undo)
Kp15zf (Talk | contribs)
(Articles)
Next diff →
Line 16: Line 16:
[[Scott, Jeramie D. (2017). The Case for Better Privacy Protections for our Newest Public Space.]] [[Scott, Jeramie D. (2017). The Case for Better Privacy Protections for our Newest Public Space.]]
-[[Walsh, Patrick F., & Miller, Seumas. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection.]]+[[Walsh, Patrick F., Miller, Seumas. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection.]]
====Books==== ====Books====

Revision as of 11:36, 12 February 2018

Contents

About This Subject

Information security in relation to communication includes surveillance and threats to the individual.Recently it has become more focused on the use of digital technologies in order to disclose and prevent unauthorized access to sensitive forms of data. The topic of emergency management is related to information security in the shift to these services going online. There is an importance of distributing accurate and secure information during a crisis. Examples of modern information security technologies in include passwords, anti-virus software, firewall and encryption software.

Topics

Security and Privacy

2-3 sentence description of the topic

Articles

Author, A. A. (2018). Title of article.

Campbell, J. E., & Carlson, M. (2002). Panopticon.com: Online surveillance and the commodification of privacy. Journal of Broadcasting & Electronic Media, 46(4), 586-606.

Mamonov, Stanislav., & Koufaris, Marios. (2016). The Impact of Exposure to News about Electronic Government Surveillance on Concerns about Government Intrusion, Privacy Self- Efficacy, and Privacy Protective Behaviour.

Scott, Jeramie D. (2017). The Case for Better Privacy Protections for our Newest Public Space.

Walsh, Patrick F., Miller, Seumas. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection.

Books

Author, A. A. (2018). Title of work: Capital letter also for subtitle.

Emergency Management

2-3 sentence description of the topic

Articles

Author, A. A. (2018). Title of article.

Alexander, D. (2014). Communicating earthquake risk to the public: The trial of the “L’Aquila seven”.

Alexander, D. (2014). Social Media in Disaster Risk Reduction and Crisis Management.

Hu, Q., & Kapucu, N. (2016). Information Communication Technology Utilization for Effective Emergency Management Networks. Public Management Review.

Kapucu, N. (2012). Disaster and emergency management systems in urban areas.Cities.

Books

Author, A. A. (2018). Title of work: Capital letter also for subtitle.

Personal tools
Bookmark and Share