In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data—more widespread by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
Exploding Data : Reclaiming Our Cyber Security in the Digital Age
Aloita kirja saman tien hintaan 0 €
- Kokeilujakson aikana käytössäsi on kaikki sovelluksen kirjat
- Ei sitoumusta, voit perua milloin vain
Kirjailija:
Lukija:
Kieli:
englanti
Muoto:

Girls Can Kiss Now : Essays

Nurkkahuone : Eräänlaiset päiväkirjat 2001–2022

Cyber Intelligence Driven Risk : How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions

Operationalizing Threat Intelligence : A guide to developing and operationalizing cyber threat intelligence programs

Rethinking IT Security : What Needs to Be Said — How Can We Solve the IT Security Problem Long Term?

American Conspiracy Theories

Schneier on Security

Cyber Mayday and the Day After : A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions

Poisonous People : How to Resist Them and Improve Your Life

Continuous Integration, Delivery, and Deployment : Reliable and faster software releases with automating builds, tests, and deployment

Pentaho 3.2 Data Integration: Beginner's Guide : Explore, transform, validate, and integrate your data with ease

Service Oriented Architecture: An Integration Blueprint
