"This book provides a paradigm changing approach for protecting organizational email users from falling prey to social engineering"--OCLC-licensed vendor bibliographic record.
"Cracking the Bro-Code is an ethnography that engages women navigating male-dominated cultures of computing. It provides evidence of women's experiences to reveal the values and practices of U.S.-based high-tech institutions and how they reproduce discrimination and harassment not only in their workplaces, but also in the broader political economy"--OCLC-licensed vendor bibliographic record.
"Broussard argues that the structural inequalities reproduced in algorithmic systems are no glitch. They are part of the system design. This book shows how everyday technologies embody racist, sexist, and ableist ideas; how they produce discriminatory and harmful outcomes; and how this can be challenged and changed"--OCLC-licensed vendor bibliographic record.
"An examination of the factors that influence women's rise to leadership in male-dominated industries, informed by scholarly research and personal interviews"--OCLC-licensed vendor bibliographic record.
"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--OCLC-licensed vendor bibliographic record.
"The pandemic has raised awareness of the need for universal access to high speed internet service in the United States. This book shows us that the debate about internet access is but the latest chapter in a long history of debates about universal service in the United States. This book analyzes the history, costs, and benefits of providing universal access to technologies and services, includ…
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach--the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump--makes headlines, in…
In this book, the author argues that in embarking on an unprecedented effort to build surveillance capabilities deeply into communications infrastructure, the U.S. government is opting for short-term security and creating dangerous long-term risks. Landau describes what makes communications security hard, warrantless wiretapping and the role of electronic surveillance in the war on terror, the …
Virginia Valian uses concepts and data from psychology, sociology, economics, and biology to explain the disparity in the professional advancement of men and women. Why do so few women occupy positions of power and prestige? Virginia Valian uses concepts and data from psychology, sociology, economics, and biology to explain the disparity in the professional advancement of men and women. Accordi…
This book intends to contribute to the growing body of transitional justice literature by providing insight into how truth commissions may be beneficial to victims of mass violence, based on data collected in Timor-Leste and on the Solomon Islands. Drawing on literature in the fields of victim psychology, procedural justice, and transitional justice, this study is guided by the puzzle of why…