This publication is presented to you through Paradigm Publishing Services
University of Ottawa Press
Chapter
Licensed
Unlicensed
Requires Authentication
CHAPTER 1 Whose Security Are We Talking About Anyway? The Case of Amazon Ring
-
Jane Bailey
, Jacquelyn Burkell and Kristen Thomasen
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- About the Cover Art v
- Table of Contents vii
- List of Figures xi
- Acknowledgements xiii
- INTRODUCTION Conceptualizing Security of Self 1
-
PART I: REFRAMING CYBERSECURITY NARRATIVES
- CHAPTER 1 Whose Security Are We Talking About Anyway? The Case of Amazon Ring 19
- CHAPTER 2 Bringing Security Home: The Need for a Human-Centric Approach to Securing Smart Homes 37
- CHAPTER 3 The Vulnerability of Emerging Technologies of the Self: A Critical Analysis of Virtual Reality Through Psychedelic Self-Hacking 57
- CHAPTER 4 Developing Human-Centric Informational Security 75
- CHAPTER 5 The Technology-Facilitated Insecurity of Public and Private Selves 97
-
PART II: TOWARD THE SECURITY OF SELF
- CHAPTER 6 Achieving the Security of Self in Machine Learning: Empowering Individuals Through Self-Security Enhancing Technologies 121
- CHAPTER 7 Addressing the Harms of Data Security Breaches 135
- CHAPTER 8 Algorithmic Impact Assessment: From Risk Assessments to Community Research 149
- CHAPTER 9 Securing Public Interest Cybersecurity Researchers in Canadian Universities 161
- CHAPTER 10 The Online Mutual Help Practices of Romance Fraud Victims 179
- CHAPTER 11 When Victims Strike Back: Online Fraud Victims’ Response to their Victimization 195
- Biographies 217
- Series editor 223
Chapters in this book
- Frontmatter i
- About the Cover Art v
- Table of Contents vii
- List of Figures xi
- Acknowledgements xiii
- INTRODUCTION Conceptualizing Security of Self 1
-
PART I: REFRAMING CYBERSECURITY NARRATIVES
- CHAPTER 1 Whose Security Are We Talking About Anyway? The Case of Amazon Ring 19
- CHAPTER 2 Bringing Security Home: The Need for a Human-Centric Approach to Securing Smart Homes 37
- CHAPTER 3 The Vulnerability of Emerging Technologies of the Self: A Critical Analysis of Virtual Reality Through Psychedelic Self-Hacking 57
- CHAPTER 4 Developing Human-Centric Informational Security 75
- CHAPTER 5 The Technology-Facilitated Insecurity of Public and Private Selves 97
-
PART II: TOWARD THE SECURITY OF SELF
- CHAPTER 6 Achieving the Security of Self in Machine Learning: Empowering Individuals Through Self-Security Enhancing Technologies 121
- CHAPTER 7 Addressing the Harms of Data Security Breaches 135
- CHAPTER 8 Algorithmic Impact Assessment: From Risk Assessments to Community Research 149
- CHAPTER 9 Securing Public Interest Cybersecurity Researchers in Canadian Universities 161
- CHAPTER 10 The Online Mutual Help Practices of Romance Fraud Victims 179
- CHAPTER 11 When Victims Strike Back: Online Fraud Victims’ Response to their Victimization 195
- Biographies 217
- Series editor 223