In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data—more widespread by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
Exploding Data : Reclaiming Our Cyber Security in the Digital Age
Über dieses Buch
In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data—more widespread by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
Starten Sie noch heute mit diesem Buch für 0 €
- Hole dir während der Testphase vollen Zugriff auf alle Bücher in der App
- Keine Verpflichtungen, jederzeit kündbar
Autor*in:
Sprecher*in:
Sprache:
Englisch
Format:

Radical Technologies : The Design of Everyday Life

Social Engineering : The Science of Human Hacking 2nd Edition

Der Tätowierer von Auschwitz : Die wahre Geschichte des Lale Sokolov

Pfoten vom Tisch! : Meine Katzen, andere Katzen und ich

Informationssicherheitsbewusstsein für den Schulalltag : SecAware4school

Informationssicherheitsbeauftragte: Aufgaben, notwendige Qualifizierung und Sensibilisierung praxisnah erklärt : Basis: ISO/IEC 2700x, BSI-Standards 200-x und IT-Grundschutz-Kompendium

INFORMATIONSSICHERHEIT kompakt, effizient und unter Kontrolle : Praxisorientierte Prinzipien für ein profitables und effizientes Security-Management und -Controlling für Unternehmen

IT Sicherheitsmanagement : Ihr Praxis - Leitfaden!

Methoden der projektorientierten Risikoanalyse : Klassifikation und kritische Betrachtung ausgewählter Verfahren

Musik zum Einschlafen

Das Kapital : Kritik der politischen Ökonomie. Erster Band

ICDL Office-Grundlagen mit Microsoft Word, Excel und PowerPoint 2021/365 (Syllabus 1.0) : ICDL Education Base Modul (Schweiz)
