Waubonsee Community College

Privacy in the age of big data, recognizing threats, defending your rights, and protecting your family, Theresa M. Payton and Theodore Claypoole ; foreword by the Honorable Howard A. Schmidt

Label
Privacy in the age of big data, recognizing threats, defending your rights, and protecting your family, Theresa M. Payton and Theodore Claypoole ; foreword by the Honorable Howard A. Schmidt
Language
eng
Bibliography note
Includes bibliographical references and index
Index
index present
Literary Form
non fiction
Main title
Privacy in the age of big data
Nature of contents
bibliography
Oclc number
855957401
Responsibility statement
Theresa M. Payton and Theodore Claypoole ; foreword by the Honorable Howard A. Schmidt
Sub title
recognizing threats, defending your rights, and protecting your family
Summary
Digital data collection and surveillance gets more pervasive and invasive by the day, but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security
Table Of Contents
Introduction: Your life on technology -- The intersection of privacy, law, and technology -- Your computer is watching you -- How government follows your electronics tracks -- Chased online by criminals and snoops -- Just hanging out online ... -- The spy in your pocket -- Cameras everywhere -- When your car is just another computer -- When your own body gives you away -- DNA and your health records -- Home sweet home: Spies in your living room -- Risks of computer and phone networks -- The future of technology and privacy -- Laws and regulations that could help preserve privacy
Classification
Content
authorofforeword
Mapped to