Information Security
From Digital Culture & Society
Revision as of 20:55, 16 March 2018 (edit) Df10wl (Talk | contribs) (→Articles) ← Previous diff |
Revision as of 09:39, 19 March 2018 (edit) (undo) Kp15zf (Talk | contribs) (→Articles) Next diff → |
||
Line 14: | Line 14: | ||
[[Connelly, L., & Osborne, N. (2017, July). Exploring Risk, Privacy and the Impact of Social Media Usage with Undergraduates. In ECSM 2017 4th European Conference on Social Media (p. 72). Academic Conferences and publishing limited.]] Danielle Fenton | [[Connelly, L., & Osborne, N. (2017, July). Exploring Risk, Privacy and the Impact of Social Media Usage with Undergraduates. In ECSM 2017 4th European Conference on Social Media (p. 72). Academic Conferences and publishing limited.]] Danielle Fenton | ||
+ | |||
+ | [[Esau, L. A. (2017). The Correlation Between Wiretapping and Terrorism.]] Kevin Pendergast | ||
[[Mamonov, S., Koufaris, M. (2016). The Impact of Exposure to News about Electronic Government Surveillance on Concerns about Government Intrusion, Privacy Self- Efficacy, and Privacy Protective Behaviour.]] Alissa Reid | [[Mamonov, S., Koufaris, M. (2016). The Impact of Exposure to News about Electronic Government Surveillance on Concerns about Government Intrusion, Privacy Self- Efficacy, and Privacy Protective Behaviour.]] Alissa Reid |
Revision as of 09:39, 19 March 2018
Contents |
About This Subject
Information security in relation to communication includes surveillance and threats to the individual. Recently it has become more focused on the use of digital technologies in order to disclose and prevent unauthorized access to sensitive forms of data. The topic of emergency management is related to information security in the shift to these services going online. There is an importance of distributing accurate and secure information during a crisis. Examples of modern information security technologies include passwords, anti-virus software, firewall and encryption software.
Topics
Security and Privacy
Security and privacy refers to the protection against unauthorized data collection and surveillance. We examine how these practices are continually evolving and being innovated through the development of the Web 2.0 through a series of articles.
Articles
Andrejevic, M. (2014). WikiLeaks, surveillance, and transparency. Danielle Fenton
Campbell, J. E., Carlson, M. (2002). Panopticon.com: Online surveillance and the commodification of privacy. Danielle Fenton
Esau, L. A. (2017). The Correlation Between Wiretapping and Terrorism. Kevin Pendergast
Schuster, S., van den Berg, M., Larrucea, X., Slewe, T., and Ide-Kostic, P. (2017). Mass surveillance and technological policy options. Kevin Pendergast
Scott, J. D. (2017). The Case for Better Privacy Protections for our Newest Public Space. Alissa Reid
van Schaik, P. p., Jansen, J., Onibokun, J., Camp, J., and Kusev, P. (2018). Security and privacy in online social networking.Kevin Pendergast
Walsh, Patrick F., Miller, Seumas. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection. Kevin Pendergast
Waters, S. (2017). The Effects of Mass Surveillance on Journalists’ Relations With Confidential Sources: A constant comparative study. Danielle Fenton
Emergency Management
There has been a shift online in communicating within the public at the time of a disaster or emergency. Information communication technologies(ICT) when used correctly can be a powerful tool used to help inform victims and the public on statistics, facts and the next steps. The proper use of ICT'S is of most importance during emergency situations to ensure that emergency response is delivered effectively and also to keep the public informed with accurate information.
Articles
Alexander, D. (2014). Social Media in Disaster Risk Reduction and Crisis Management.
Kapucu, N. (2012). Disaster and emergency management systems in urban areas.Cities. Ben Blanchard