Information Security
From Digital Culture & Society
Revision as of 11:03, 12 March 2018 (edit) Bb14ah (Talk | contribs) (→Articles) ← Previous diff |
Revision as of 11:21, 12 March 2018 (edit) (undo) Kp15zf (Talk | contribs) (→Topics) Next diff → |
||
Line 20: | Line 20: | ||
[[Scott, J. D. (2017). The Case for Better Privacy Protections for our Newest Public Space.]] Alissa Reid | [[Scott, J. D. (2017). The Case for Better Privacy Protections for our Newest Public Space.]] Alissa Reid | ||
+ | |||
+ | [[van Schaik, P. p., Jansen, J., Onibokun, J., Camp, J., and Kusev, P. (2018). Security and privacy in online social networking.]]Kevin Pendergast | ||
[[Wahl-Jorgensen, K., Bennett, L., Taylor, G. (2017). The normalization of surveillance and the invisibility of digital citizenship: Media debates after the Snowden revelations.]] Alissa Reid | [[Wahl-Jorgensen, K., Bennett, L., Taylor, G. (2017). The normalization of surveillance and the invisibility of digital citizenship: Media debates after the Snowden revelations.]] Alissa Reid |
Revision as of 11:21, 12 March 2018
Contents |
About This Subject
Information security in relation to communication includes surveillance and threats to the individual.Recently it has become more focused on the use of digital technologies in order to disclose and prevent unauthorized access to sensitive forms of data. The topic of emergency management is related to information security in the shift to these services going online. There is an importance of distributing accurate and secure information during a crisis. Examples of modern information security technologies include passwords, anti-virus software, firewall and encryption software.
Topics
Security and Privacy
Security and privacy refers to the protection against unauthorized data collection and surveillance. We examine how these practices are continually evolving and being innovated through the development of the Web 2.0 through a series of articles.
Articles
Andrejevic, M. (2014). WikiLeaks, surveillance, and transparency. Danielle Fenton
Campbell, J. E., Carlson, M. (2002). Panopticon.com: Online surveillance and the commodification of privacy. Danielle Fenton
Schuster, S., van den Berg, M., Larrucea, X., Slewe, T., and Ide-Kostic, P. (2017). Mass surveillance and technological policy options. Kevin Pendergast
Scott, J. D. (2017). The Case for Better Privacy Protections for our Newest Public Space. Alissa Reid
van Schaik, P. p., Jansen, J., Onibokun, J., Camp, J., and Kusev, P. (2018). Security and privacy in online social networking.Kevin Pendergast
Walsh, Patrick F., Miller, Seumas. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection. Kevin Pendergast
Emergency Management
There has been a shift online in communicating within the public at the time of a disaster or emergency. Information communication technologies(ICT) when used correctly can be a powerful tool used to help inform victims and the public on statistics, facts and the next steps. The proper use of ICT'S is of most importance during emergency situations to ensure that emergency response is delivered effectively and also to keep the public informed with accurate information.
Articles
Alexander, D. (2014). Social Media in Disaster Risk Reduction and Crisis Management.
Kapucu, N. (2012). Disaster and emergency management systems in urban areas.Cities. Ben Blanchard