Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, 1st Edition

  • Published By:
  • ISBN-10: 1522571140
  • ISBN-13: 9781522571148
  • DDC: 363.31
  • 2174 Pages | eBook
  • Original Copyright 2019 | Published/Released October 2019
  • This publication's content originally published in print form: 2019

  • Price:  Sign in for price



The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. This title is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
List of Contributors.
Table of Contents.
1: Fundamental Concepts and Theories.
2: Rethinking Information Privacy in a “Connected” World.
3: CVSS: A Cloud-Based Visual Surveillance System.
4: Using Crowd Sourcing to Analyze Consumers’ Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level.
5: Risks, Security, and Privacy for HIV/AIDS Data: Big Data Perspective.
6: Privacy Concerns and Customers’ Information-Sharing Intentions: The Role of Culture.
7: Information Disclosure on Social Networking Sites: An Exploratory Survey of Factors Impacting User Behaviour on Facebook.
8: The Right to Privacy Is Dying: Technology Is Killing It and We Are Letting It Happen.
9: Algorithms vs. Hive Minds: Preserving Democracy’s Future in the Age of AI.
10: Real World Applications: A Literature Survey.
11: Advances in Information, Security, Privacy and Ethics: Use of Cloud Computing for Education.
12: Turning Weakness into Strength: How to Learn From an IT Security Incident.
13: Privacy, Security, and Liberty: ICT in Crises.
14: Development and Design Methodologies.
15: An Information Security Model for Implementing the New ISO 27001.
16: Effective Surveillance Management During Service Encounters: A Conceptual Framework.
17: Who Is Tracking You? A Rhetorical Framework for Evaluating Surveillance and Privacy Practices.
18: Monetization of Personal Digital Identity Information: Technological and Regulatory Framework.
19: Maturity in Health Organization Information Systems: Metrics and Privacy Perspectives.
20: Critical Video Surveillance and Identification of Human Behavior Analysis of ATM Security Systems.
21: A Novel Framework for Efficient Extraction of Meaningful Key Frames From Surveillance Video.
22: An Intelligent Traffic Engineering Method Over Software Defined Networks for Video Surveillance Systems Based on Artificial Bee Colony.
23: A Framework for Protecting Users’ Privacy in Cloud.
24: Designing Secure and Privacy-Aware Information Systems.
25: Mobile Application for Ebola Virus Disease Diagnosis (EbolaDiag).
26: Clustering Based on Two Layers for Abnormal Event Detection in Video Surveillance.
27: Hybrid Privacy Preservation Technique Using Neural Networks.
28: Privacy Preservation of Social Media Services: Graph Prospective of Social Media.
29: Visual Sensor Networks: Critical Infrastructure Protection.
30: Suggestions for Achieving Balance Between Corporate Dataveillance and Employee Privacy Concerns.