The Resource Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
Resource Information
The item Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Austin Public Library.This item is available to borrow from 3 library branches. This resource has been enriched with EBSCO NoveList data.
Resource Information
The item Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Austin Public Library.
This item is available to borrow from 3 library branches.
This resource has been enriched with EBSCO NoveList data.
- Summary
- "The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal data; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber attack. In this bracing book, Michael Chertoff makes clear that personal data has become one of the most valuable assets of the modern age; and yet our laws and policies surrounding the protection of personal information were written for an earlier time and need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread even by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades, through to the present, that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a forceful new strategy that balances the needs of individuals, government, and business alike."--Dust jacket
- Language
- eng
- Edition
-
- First Grove Atlantic hardcover edition.
- First edition.
- Extent
- vii, 254 pages
- Contents
-
- Introduction : big data is watching you
- What is the Internet and how did it change data?
- How did law and policy evolve to address data 1.0 and 2.0?
- Data 3.0 and the challenges of privacy and security
- Reconfiguring privacy and security in the data 3.0 universe
- Data 3.0 and controls on private sector use of data
- Data 3.0 and sovereignty : a question of conflict of laws
- Cyber warfare : deterrence and response
- Conclusion : meeting the challenge of data 3.0 : recommendations for law and policy
- Isbn
- 9780802127938
- Label
- Exploding data : reclaiming our cyber security in the digital age
- Title
- Exploding data
- Title remainder
- reclaiming our cyber security in the digital age
- Statement of responsibility
- Michael Chertoff
- Subject
-
- Data protection -- Law and legislation -- United States
- Privacy, Right of
- Privacy, Right of -- United States
- United States
- trueUnited States -- Politics and government -- 21st century
- trueComputer security
- Computer security -- Government policy
- Computer security -- Government policy -- United States
- Computer security -- Law and legislation
- Computer security -- Law and legislation -- United States
- trueConflict of laws
- Conflict of laws -- Data protection
- Conflict of laws -- Data protection -- United States
- Data protection -- Government policy
- Data protection -- Government policy -- United States
- Data protection -- Law and legislation
- trueData protection -- Law and legislation
- trueInformation warfare
- Information warfare (International law)
- Information warfare (International law)
- trueInternet -- Law and legislation
- Internet -- Law and legislation
- trueInternet -- Law and legislation -- United States
- POLITICAL SCIENCE / American Government / Judicial Branch
- POLITICAL SCIENCE / Civics & Citizenship
- POLITICAL SCIENCE / Public Policy
- truePrivacy rights
- Language
- eng
- Summary
- "The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal data; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber attack. In this bracing book, Michael Chertoff makes clear that personal data has become one of the most valuable assets of the modern age; and yet our laws and policies surrounding the protection of personal information were written for an earlier time and need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread even by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades, through to the present, that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a forceful new strategy that balances the needs of individuals, government, and business alike."--Dust jacket
- http://library.link/vocab/ext/novelist/bookUI
- 10677522
- Cataloging source
- PUL
- http://library.link/vocab/creatorDate
- 1953-
- http://library.link/vocab/creatorName
- Chertoff, Michael
- Dewey number
- 343.7309/99
- Illustrations
- illustrations
- Index
- index present
- LC call number
- KF1263.C65
- LC item number
- C44 2018
- Literary form
- non fiction
- Nature of contents
- bibliography
- http://library.link/vocab/resourcePreferred
- True
- http://library.link/vocab/subjectName
-
- Data protection
- Data protection
- Conflict of laws
- Computer security
- Computer security
- Privacy, Right of
- Internet
- Information warfare (International law)
- Computer security
- Computer security
- Conflict of laws
- Data protection
- Data protection
- Information warfare (International law)
- Internet
- Privacy, Right of
- United States
- POLITICAL SCIENCE / American Government / Judicial Branch
- POLITICAL SCIENCE / Civics & Citizenship
- POLITICAL SCIENCE / Public Policy
- http://bibfra.me/vocab/lite/titleRemainder
- reclaiming our cybersecurity in the digital age
- Label
- Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
- Bibliography note
- Includes bibliographical references (pages 213-242) and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction : big data is watching you -- What is the Internet and how did it change data? -- How did law and policy evolve to address data 1.0 and 2.0? -- Data 3.0 and the challenges of privacy and security -- Reconfiguring privacy and security in the data 3.0 universe -- Data 3.0 and controls on private sector use of data -- Data 3.0 and sovereignty : a question of conflict of laws -- Cyber warfare : deterrence and response -- Conclusion : meeting the challenge of data 3.0 : recommendations for law and policy
- Control code
- on1030446157
- Dimensions
- 24 cm
- Edition
-
- First Grove Atlantic hardcover edition.
- First edition.
- Extent
- vii, 254 pages
- Isbn
- 9780802127938
- Lccn
- 2018012763
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- System control number
- (OCoLC)1030446157
- Label
- Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
- Bibliography note
- Includes bibliographical references (pages 213-242) and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction : big data is watching you -- What is the Internet and how did it change data? -- How did law and policy evolve to address data 1.0 and 2.0? -- Data 3.0 and the challenges of privacy and security -- Reconfiguring privacy and security in the data 3.0 universe -- Data 3.0 and controls on private sector use of data -- Data 3.0 and sovereignty : a question of conflict of laws -- Cyber warfare : deterrence and response -- Conclusion : meeting the challenge of data 3.0 : recommendations for law and policy
- Control code
- on1030446157
- Dimensions
- 24 cm
- Edition
-
- First Grove Atlantic hardcover edition.
- First edition.
- Extent
- vii, 254 pages
- Isbn
- 9780802127938
- Lccn
- 2018012763
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- System control number
- (OCoLC)1030446157
Subject
- Data protection -- Law and legislation -- United States
- Privacy, Right of
- Privacy, Right of -- United States
- United States
- trueUnited States -- Politics and government -- 21st century
- trueComputer security
- Computer security -- Government policy
- Computer security -- Government policy -- United States
- Computer security -- Law and legislation
- Computer security -- Law and legislation -- United States
- trueConflict of laws
- Conflict of laws -- Data protection
- Conflict of laws -- Data protection -- United States
- Data protection -- Government policy
- Data protection -- Government policy -- United States
- Data protection -- Law and legislation
- trueData protection -- Law and legislation
- trueInformation warfare
- Information warfare (International law)
- Information warfare (International law)
- trueInternet -- Law and legislation
- Internet -- Law and legislation
- trueInternet -- Law and legislation -- United States
- POLITICAL SCIENCE / American Government / Judicial Branch
- POLITICAL SCIENCE / Civics & Citizenship
- POLITICAL SCIENCE / Public Policy
- truePrivacy rights
Tone Tone is the feeling that a book evokes in the reader. In many cases, this category best answers the question, "What are you in the mood for?"
Writing style Writing style terms tell us how a book is written, from the complexity of the language to the level of the detail in the background.
Library Locations
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.austintexas.gov/portal/Exploding-data--reclaiming-our-cyber-security-in/b84ch10Lm7c/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.austintexas.gov/portal/Exploding-data--reclaiming-our-cyber-security-in/b84ch10Lm7c/">Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.austintexas.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.austintexas.gov/">Austin Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.austintexas.gov/portal/Exploding-data--reclaiming-our-cyber-security-in/b84ch10Lm7c/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.austintexas.gov/portal/Exploding-data--reclaiming-our-cyber-security-in/b84ch10Lm7c/">Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.austintexas.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.austintexas.gov/">Austin Public Library</a></span></span></span></span></div>