Tekijänoikeuden erikoiskirjasto

Privacy in the age of big data : recognizing threats, defending your rights, and protecting your family
Muistilista on tyhjä
Vis
Hylly
  • PAYTON 33.2
Henkilönnimi
  • Payton, Theresa.
Nimeke- ja vastuullisuusmerkintö
  • Privacy in the age of big data : recognizing threats, defending your rights, and protecting your family
Julkaistu
  • Rowman & Littlefield, Lanham ; Boulder ; New York ; Toronto ; Plymouth, : 2014.
SAB-luokituskoodi
  • 33.2
Muu luokituskoodi
  • 33.2
Ulkoasutiedot
  • 259 s.
Huomautus sisällöstä, tiivistelmä tms.
  • 1 The Intersection of Privacy, Law, and Technology -- 2 Your Computer Is Watching You -- 3 How Government Follows Your Electronic Tracks -- 4 Chased Online by Criminals and Snoops -- 5 Just Hanging Out Online ... -- 6 The Spy in Your Pocket -- 7 Cameras Everywhere -- 8 When Your Car Is Just Another Computer -- 9 When Your Own Body Gives You Away -- 10 DNA and Your Health Records -- 11 Home Sweet Home: Spies in Your Living Room -- 12 Risks of Computer and Phone Networks -- 13 The Future of Technology and Privacy -- 14 Laws and Regulations That Could Help Preserve Privacy.
Asiasana - Kontrolloimaton
Henkilönnimi
  • Claypoole, Ted.
ISBN
  • 978-1-4422-4257-9
*00001528nam a22003014a 4500
*0019714
*00520201106111820.0
*008150422s2014\\\\xx\||||||||||\||||||eng|c
*020  $a978-1-4422-4257-9
*035  $a22299
*035  $a(PLib-conv)0000022299
*0410 $aeng
*084  $a33.2$2ykl
*1001 $aPayton, Theresa.
*24510$aPrivacy in the age of big data :$brecognizing threats, defending your rights, and protecting your family /$cTheresa Payton, Ted Claypoole.
*260  $aLanham  ;$aBoulder  ;$aNew York  ;$aToronto  ;$aPlymouth, :$bRowman & Littlefield,$c2014.
*300  $a259 s.
*520  $a1 The Intersection of Privacy, Law, and Technology -- 2 Your Computer Is Watching You -- 3 How Government Follows Your Electronic Tracks -- 4 Chased Online by Criminals and Snoops -- 5 Just Hanging Out Online ... -- 6 The Spy in Your Pocket -- 7 Cameras Everywhere -- 8 When Your Car Is Just Another Computer -- 9 When Your Own Body Gives You Away -- 10 DNA and Your Health Records -- 11 Home Sweet Home: Spies in Your Living Room -- 12 Risks of Computer and Phone Networks -- 13 The Future of Technology and Privacy -- 14 Laws and Regulations That Could Help Preserve Privacy.
*653  $aYKSILÖNSUOJA
*653  $aTIETOSUOJA
*653  $aYHDYSVALLAT
*653  $aELECTRONIC SURVEILLANCE
*653  $aUNITED STATES
*653  $aDATA PROTECTION
*653  $aPRIVACY
*7001 $aClaypoole, Ted.
*852  $i9723056$h33.2$cPAYTON
*979  $a0000022299
*999  $aMikroMarc$b[Book]$x0
^
Tästä teoksesta ei ole arvioita.
Näpäytä kun haluat kirjoittaa ensimmäisen arvion.

Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched,' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.

Lähetä
Niteen tunnusTilaEräpäiväKuuluuSijaintiHylly
22667Saatavana KirjastoKirjasto 33.2