|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
in00004414667 |
005 |
20211018102239.0 |
007 |
ta |
008 |
180320t20182018nyua b 001 0 eng c |
010 |
|
|
|a 2018012763
|
019 |
|
|
|a 1061863926
|a 1083155490
|a 1083674946
|
020 |
|
|
|a 9780802127938
|q (hardcover)
|
020 |
|
|
|a 0802127932
|q (hardcover)
|
020 |
|
|
|z 9780802165787
|q (eISBN)
|
020 |
|
|
|a 9781611856293
|
020 |
|
|
|a 1611856299
|
029 |
1 |
|
|a AU@
|b 000062132876
|
029 |
1 |
|
|a CHNEW
|b 001017495
|
029 |
1 |
|
|a CHVBK
|b 524638624
|
035 |
|
|
|a (OCoLC)on1030446157
|
035 |
|
|
|a (OCoLC)1030446157
|z (OCoLC)1061863926
|z (OCoLC)1083155490
|z (OCoLC)1083674946
|
040 |
|
|
|a PUL
|b eng
|e rda
|c PUL
|d OCLCF
|d IK2
|d DAD
|d DLC
|d QQ3
|d BUR
|d IGA
|d XRQ
|d TXSCH
|d VP@
|d CHVBK
|d NZLPP
|d IOG
|d B@L
|d BOP
|d WTX
|d TJZ
|d OY4
|d FIE
|d WYG
|d TSC
|d RKWLC
|d TXHLC
|d YKC
|d YDX
|d ZAC
|d T7X
|d OCLCQ
|d COD
|d JTV
|d LTP
|d OCLCO
|d UMC
|d H9Z
|d DUD
|d OCLCA
|d MLM
|d OCLCQ
|d CGN
|d OCLCA
|d OCLCQ
|d OCLCO
|d DYJ
|d LD4
|d OMB
|d UtOrBLW
|
042 |
|
|
|a pcc
|
043 |
|
|
|a n-us---
|
049 |
|
|
|a TXAM
|
050 |
0 |
0 |
|a KF1263.C65
|b C44 2018
|
082 |
0 |
0 |
|a 343.7309/99
|2 23
|
100 |
1 |
|
|a Chertoff, Michael,
|d 1953-
|e author.
|0 http://id.loc.gov/authorities/names/no2002038803
|
245 |
1 |
0 |
|a Exploding data :
|b reclaiming our cyber security in the digital age /
|c Michael Chertoff.
|
250 |
|
|
|a First Grove Atlantic hardcover edition.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a New York :
|b Atlantic Monthly Press,
|c 2018.
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a vii, 254 pages :
|b illustrations ;
|c 24 cm
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 213-242) and index.
|
505 |
0 |
|
|a Introduction : Big data is watching you -- What is the Internet and how did it change data? -- How did law and policy evolve to address Data 1.0 and 2.0? -- Data 3.0 and the challenges of privacy and security -- Reconfiguring privacy and security in the Data 3.0 universe -- Data 3.0 and controls on private sector use of data -- Data 3.0 and sovereignty : a question of conflict of laws -- Cyber warfare: deterrence and response -- Conclusion : Meeting the challenge of Data 3.0: recommendations for law and policy.
|
520 |
|
|
|a "Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened."--Amazon.com.
|
520 |
|
|
|a "The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal data; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber attack. In this bracing book, Michael Chertoff makes clear that personal data has become one of the most valuable assets of the modern age; and yet our laws and policies surrounding the protection of personal information were written for an earlier time and need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread even by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades, through to the present, that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a forceful new strategy that balances the needs of individuals, government, and business alike."--Jacket.
|
650 |
|
0 |
|a Data protection
|x Law and legislation
|z United States.
|0 http://id.loc.gov/authorities/subjects/sh2008102020
|
650 |
|
0 |
|a Data protection
|x Government policy
|z United States.
|
650 |
|
0 |
|a Conflict of laws
|x Data protection
|z United States.
|
650 |
|
0 |
|a Computer security
|x Law and legislation
|z United States.
|0 http://id.loc.gov/authorities/subjects/sh2009121191
|
650 |
|
0 |
|a Computer security
|x Government policy
|z United States.
|0 http://id.loc.gov/authorities/subjects/sh2009121189
|
650 |
|
0 |
|a Privacy, Right of
|z United States.
|0 http://id.loc.gov/authorities/subjects/sh2008108965
|
650 |
|
0 |
|a Internet
|x Law and legislation
|z United States.
|0 http://id.loc.gov/authorities/subjects/sh2008104755
|
650 |
|
0 |
|a Information warfare (International law)
|0 http://id.loc.gov/authorities/subjects/sh2002002082
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x American Government
|x Judicial Branch.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Civics & Citizenship.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Public Policy.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Government policy.
|2 fast
|0 (OCoLC)fst00872490
|
650 |
|
7 |
|a Computer security
|x Law and legislation.
|2 fast
|0 (OCoLC)fst00872492
|
650 |
|
7 |
|a Conflict of laws
|x Data protection.
|2 fast
|0 (OCoLC)fst01902878
|
650 |
|
7 |
|a Data protection
|x Government policy.
|2 fast
|0 (OCoLC)fst00887961
|
650 |
|
7 |
|a Data protection
|x Law and legislation.
|2 fast
|0 (OCoLC)fst00887963
|
650 |
|
7 |
|a Information warfare (International law)
|2 fast
|0 (OCoLC)fst00973189
|
650 |
|
7 |
|a Internet
|x Law and legislation.
|2 fast
|0 (OCoLC)fst00977193
|
650 |
|
7 |
|a Privacy, Right of.
|2 fast
|0 (OCoLC)fst01077444
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
650 |
|
7 |
|a Datenschutz.
|2 gnd
|0 (DE-588)4011134-9
|
650 |
|
7 |
|a Privatsphäre.
|2 gnd
|0 (DE-588)4123980-5
|
650 |
|
7 |
|a Computersicherheit.
|2 gnd
|0 (DE-588)4274324-2
|
650 |
|
7 |
|a Data
|x Protection.
|2 sears
|
650 |
|
7 |
|a Computer security.
|2 sears
|
650 |
|
7 |
|a Right of privacy
|z United States.
|2 sears
|
651 |
|
4 |
|a United States.
|
655 |
|
4 |
|a Nonfiction.
|
776 |
0 |
8 |
|i Online version:
|a Chertoff, Michael, 1953-
|t Exploding data.
|b First edition.
|d New York : Atlantic Monthly Press, [2018]
|z 9780802165787
|w (DLC) 2018015217
|
994 |
|
|
|a C0
|b TXA
|
999 |
f |
f |
|s 75f04c12-c0a1-33f3-aa20-eeb608f46504
|i ca0b077f-041a-3940-ad9a-f2eb61d80dcd
|t 0
|