Information Security
From Digital Culture & Society
Revision as of 10:30, 12 March 2018 (edit) Bb14ah (Talk | contribs) (→Articles) ← Previous diff |
Revision as of 10:31, 12 March 2018 (edit) (undo) Kp15zf (Talk | contribs) (→Articles) Next diff → |
||
Line 16: | Line 16: | ||
[[Reddick, C.G., Takeoka Hatfield, A., Jaramillo, P.A. (2015). Public opinion on National Security Agency surveillance programs: A multi-method approach.]] Alissa Reid | [[Reddick, C.G., Takeoka Hatfield, A., Jaramillo, P.A. (2015). Public opinion on National Security Agency surveillance programs: A multi-method approach.]] Alissa Reid | ||
- | [[Schuster, S., van den Berg, M., Larrucea, X., Slewe, T., & Ide-Kostic, P. (2017). Mass surveillance and technological policy options.]] | + | [[Schuster, S., van den Berg, M., Larrucea, X., Slewe, T., & Ide-Kostic, P. (2017). Mass surveillance and technological policy options.]]Kevin Pendergast |
[[Scott, J. D. (2017). The Case for Better Privacy Protections for our Newest Public Space.]] Alissa Reid | [[Scott, J. D. (2017). The Case for Better Privacy Protections for our Newest Public Space.]] Alissa Reid | ||
Line 22: | Line 22: | ||
[[Wahl-Jorgensen, K., Bennett, L., Taylor, G. (2017). The normalization of surveillance and the invisibility of digital citizenship: Media debates after the Snowden revelations.]] Alissa Reid | [[Wahl-Jorgensen, K., Bennett, L., Taylor, G. (2017). The normalization of surveillance and the invisibility of digital citizenship: Media debates after the Snowden revelations.]] Alissa Reid | ||
- | [[Walsh, Patrick F., Miller, Seumas. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection.]] | + | [[Walsh, Patrick F., Miller, Seumas. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection.]] Kevin Pendergast |
===Emergency Management=== | ===Emergency Management=== |
Revision as of 10:31, 12 March 2018
Contents |
About This Subject
Information security in relation to communication includes surveillance and threats to the individual.Recently it has become more focused on the use of digital technologies in order to disclose and prevent unauthorized access to sensitive forms of data. The topic of emergency management is related to information security in the shift to these services going online. There is an importance of distributing accurate and secure information during a crisis. Examples of modern information security technologies include passwords, anti-virus software, firewall and encryption software.
Topics
Security and Privacy
Articles
Andrejevic, M. (2014). WikiLeaks, surveillance, and transparency.
Schuster, S., van den Berg, M., Larrucea, X., Slewe, T., & Ide-Kostic, P. (2017). Mass surveillance and technological policy options.Kevin Pendergast
Scott, J. D. (2017). The Case for Better Privacy Protections for our Newest Public Space. Alissa Reid
Walsh, Patrick F., Miller, Seumas. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection. Kevin Pendergast
Emergency Management
There has been a shift online in communicating with the public at the time of a disaster or emergency. Information communication technologies(ICT) when used correctly can be a powerful tool used to help inform victims and the public on statistics, facts and the next steps. The ethical use of ICT'S is of most importance during emergency situations to ensure that emergency response is delivered effectively and also to keep the public informed with accurate information.
Articles
Alexander, D. (2014). Social Media in Disaster Risk Reduction and Crisis Management.
Kapucu, N. (2012). Disaster and emergency management systems in urban areas.Cities. Ben Blanchard