Privacy in the Age of Big Data

Privacy in the Age of Big Data
افزودن به بوکمارک اشتراک گذاری 0 دیدگاه کاربران 4 (1)

Recognizing Threats, Defending Your Rights, and Protecting Your Family

مشارکت: عنوان و توضیح کوتاه هر کتاب را ترجمه کنید این ترجمه بعد از تایید با نام شما در سایت نمایش داده خواهد شد.
iran گزارش تخلف

فرمت کتاب

ebook

تاریخ انتشار

2014

نویسنده

Hon. Howard A. Schmidt

شابک

9781442225466
  • اطلاعات
  • نقد و بررسی
  • دیدگاه کاربران
برای مطالعه توضیحات وارد حساب کاربری خود شوید

نقد و بررسی

Publisher's Weekly

February 24, 2014
Former White House Chief Information Officer Payton and lawyer Claypoole, authors of Protecting Your Internet Identity, team up again to produce this quick and easy overview of data collection and its relevance in our everyday lives. The authors guide readers through the many ways our personal information is collected and used in today's society. They are quick to point out the beneficial aspects of technological advancements in commercial, private, and government settings. However any collection of personal data is susceptible to malicious use. The authors go on to elaborate on the everyday possibilities of hacking, wiretapping, and other big data strategies by marketers and cybercriminals. Most alarming are the implications of data mining for everyday citizens, cybercriminals can and will steal any information, through government or commercial enterprises. Payton and Claypoole provide practical tips and tools for protecting personal data throughout making this a perfect beginner's guide for anyone looking to stay informed.



Library Journal

June 1, 2014

Payton (founder, Fortalics, LLC, a security, risk, and fraud consulting company; former White House CIO) and Claypoole (cochair of the Cyberspace Privacy and Data Security Subcommittee for the American Bar Association's Business Law Section) intend this book as an overview of the threats facing private citizens in the era of cloud computing and big data. Discussions of privacy in this time take as their departure point the problematic nature of cloud-based computing and of the storage of massive amounts of personal data by businesses, governments, and devices connected to the cloud. The threats reviewed include those associated with mobile access and tracking individuals' locations, Internet viewing, and the ubiquity of cameras as peripherals on devices. The final section details mitigating risks to individual privacy and reviews legislative efforts that could help. VERDICT Well-researched and well-written, this timely and important addition to the literature on privacy and big data will resonate with researchers of information policy and related legislation.--Jim Hahn, Univ. of IL Lib, Urbana

Copyright 2014 Library Journal, LLC Used with permission.




دیدگاه کاربران

دیدگاه خود را بنویسید
|