The Resource Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
Resource Information
The item Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of San Diego Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of San Diego Libraries.
This item is available to borrow from 1 library branch.
- Summary
-
- "Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened"--Amazon.com
- "The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal data; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber attack. In this bracing book, Michael Chertoff makes clear that personal data has become one of the most valuable assets of the modern age; and yet our laws and policies surrounding the protection of personal information were written for an earlier time and need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread even by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades, through to the present, that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a forceful new strategy that balances the needs of individuals, government, and business alike."--Jacket
- Language
- eng
- Edition
-
- First Grove Atlantic hardcover edition
- First edition
- Extent
- vii, 254 pages
- Contents
-
- Conclusion : meeting the challenge of data 3.0 : recommendations for law and policy
- Introduction : big data is watching you
- What is the Internet and how did it change data?
- How did law and policy evolve to address data 1.0 and 2.0?
- Data 3.0 and the challenges of privacy and security
- Reconfiguring privacy and security in the data 3.0 universe
- Data 3.0 and controls on private sector use of data
- Data 3.0 and sovereignty : a question of conflict of laws
- Cyber warfare : deterrence and response
- Isbn
- 9780802127938
- Label
- Exploding data : reclaiming our cyber security in the digital age
- Title
- Exploding data
- Title remainder
- reclaiming our cyber security in the digital age
- Statement of responsibility
- Michael Chertoff
- Subject
-
- Computer security -- Law and legislation
- Computer security -- Law and legislation -- United States
- Conflict of laws -- Data protection
- Conflict of laws -- Data protection -- United States
- Data protection -- Government policy
- Data protection -- Government policy -- United States
- Data protection -- Law and legislation
- Computer security -- Government policy
- Information warfare (International law)
- Information warfare (International law)
- Internet -- Law and legislation
- Internet -- Law and legislation -- United States
- Privacy, Right of
- Privacy, Right of -- United States
- United States
- Data protection -- Law and legislation -- United States
- Computer security -- Government policy -- United States
- Language
- eng
- Summary
-
- "Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened"--Amazon.com
- "The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal data; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber attack. In this bracing book, Michael Chertoff makes clear that personal data has become one of the most valuable assets of the modern age; and yet our laws and policies surrounding the protection of personal information were written for an earlier time and need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread even by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades, through to the present, that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a forceful new strategy that balances the needs of individuals, government, and business alike."--Jacket
- Cataloging source
- PUL
- http://library.link/vocab/creatorDate
- 1953-
- http://library.link/vocab/creatorName
- Chertoff, Michael
- Illustrations
- illustrations
- Index
- index present
- LC call number
- KF1263.C65
- LC item number
- C44 2018
- Literary form
- non fiction
- Nature of contents
- bibliography
- http://library.link/vocab/subjectName
-
- Data protection
- Data protection
- Conflict of laws
- Computer security
- Computer security
- Privacy, Right of
- Internet
- Information warfare (International law)
- Computer security
- Computer security
- Conflict of laws
- Data protection
- Data protection
- Information warfare (International law)
- Internet
- Privacy, Right of
- United States
- Label
- Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
- Bibliography note
- Includes bibliographical references (pages 213-242) and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Conclusion : meeting the challenge of data 3.0 : recommendations for law and policy
- Introduction : big data is watching you
- What is the Internet and how did it change data?
- How did law and policy evolve to address data 1.0 and 2.0?
- Data 3.0 and the challenges of privacy and security
- Reconfiguring privacy and security in the data 3.0 universe
- Data 3.0 and controls on private sector use of data
- Data 3.0 and sovereignty : a question of conflict of laws
- Cyber warfare : deterrence and response
- Control code
- 1030446157
- Dimensions
- 24 cm
- Edition
-
- First Grove Atlantic hardcover edition
- First edition
- Extent
- vii, 254 pages
- Isbn
- 9780802127938
- Lccn
- 2018012763
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- Specific material designation
- regular print
- System control number
- (OCoLC)1030446157
- Label
- Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
- Bibliography note
- Includes bibliographical references (pages 213-242) and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Conclusion : meeting the challenge of data 3.0 : recommendations for law and policy
- Introduction : big data is watching you
- What is the Internet and how did it change data?
- How did law and policy evolve to address data 1.0 and 2.0?
- Data 3.0 and the challenges of privacy and security
- Reconfiguring privacy and security in the data 3.0 universe
- Data 3.0 and controls on private sector use of data
- Data 3.0 and sovereignty : a question of conflict of laws
- Cyber warfare : deterrence and response
- Control code
- 1030446157
- Dimensions
- 24 cm
- Edition
-
- First Grove Atlantic hardcover edition
- First edition
- Extent
- vii, 254 pages
- Isbn
- 9780802127938
- Lccn
- 2018012763
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- Specific material designation
- regular print
- System control number
- (OCoLC)1030446157
Subject
- Computer security -- Law and legislation
- Computer security -- Law and legislation -- United States
- Conflict of laws -- Data protection
- Conflict of laws -- Data protection -- United States
- Data protection -- Government policy
- Data protection -- Government policy -- United States
- Data protection -- Law and legislation
- Computer security -- Government policy
- Information warfare (International law)
- Information warfare (International law)
- Internet -- Law and legislation
- Internet -- Law and legislation -- United States
- Privacy, Right of
- Privacy, Right of -- United States
- United States
- Data protection -- Law and legislation -- United States
- Computer security -- Government policy -- United States
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/portal/Exploding-data--reclaiming-our-cyber-security-in/yTii8U1g4Q0/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/portal/Exploding-data--reclaiming-our-cyber-security-in/yTii8U1g4Q0/">Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/portal/Exploding-data--reclaiming-our-cyber-security-in/yTii8U1g4Q0/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/portal/Exploding-data--reclaiming-our-cyber-security-in/yTii8U1g4Q0/">Exploding data : reclaiming our cyber security in the digital age, Michael Chertoff</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>