This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a …
In June 2013, Edward Snowden revealed a secret US government program that collected records on every phone call made in the country. Further disclosures followed, detailing mass surveillance by the UK as well. Journalists and policymakers soon began discussing large-scale programs in other countries. Over two years before the Snowden leaks began, Cate and Dempsey had started researching systema…
Since the dawn of the oil era, cities in Saudi Arabia have witnessed rapid growth and profound societal changes. As a response to foreign architectural solutions and the increasing popularity of Western lifestyles, a distinct style of architecture and urban planning has emerged. Characterised by an emphasis on privacy, expressed through high enclosures, gates, blinds, and tinted windows, ‘New…
Since the dawn of the oil era, cities in Saudi Arabia have witnessed rapid growth and profound societal changes. As a response to foreign architectural solutions and the increasing popularity of Western lifestyles, a distinct style of architecture and urban planning has emerged. Characterised by an emphasis on privacy, expressed through high enclosures, gates, blinds, and tinted windows, ‘New…
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultur…
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore…