Exploding data : reclaiming our cyber security in the digital age /

"Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should b...

Full description

Bibliographic Details
Main Author: Chertoff, Michael, 1953- (Author)
Format: Book
Language:English
Published: New York : Atlantic Monthly Press, 2018.
Edition:First Grove Atlantic hardcover edition.
Subjects:

MARC

LEADER 00000cam a2200000 i 4500
001 in00004414667
005 20211018102239.0
007 ta
008 180320t20182018nyua b 001 0 eng c
010 |a  2018012763 
019 |a 1061863926  |a 1083155490  |a 1083674946 
020 |a 9780802127938  |q (hardcover) 
020 |a 0802127932  |q (hardcover) 
020 |z 9780802165787  |q (eISBN) 
020 |a 9781611856293 
020 |a 1611856299 
029 1 |a AU@  |b 000062132876 
029 1 |a CHNEW  |b 001017495 
029 1 |a CHVBK  |b 524638624 
035 |a (OCoLC)on1030446157 
035 |a (OCoLC)1030446157  |z (OCoLC)1061863926  |z (OCoLC)1083155490  |z (OCoLC)1083674946 
040 |a PUL  |b eng  |e rda  |c PUL  |d OCLCF  |d IK2  |d DAD  |d DLC  |d QQ3  |d BUR  |d IGA  |d XRQ  |d TXSCH  |d VP@  |d CHVBK  |d NZLPP  |d IOG  |d B@L  |d BOP  |d WTX  |d TJZ  |d OY4  |d FIE  |d WYG  |d TSC  |d RKWLC  |d TXHLC  |d YKC  |d YDX  |d ZAC  |d T7X  |d OCLCQ  |d COD  |d JTV  |d LTP  |d OCLCO  |d UMC  |d H9Z  |d DUD  |d OCLCA  |d MLM  |d OCLCQ  |d CGN  |d OCLCA  |d OCLCQ  |d OCLCO  |d DYJ  |d LD4  |d OMB  |d UtOrBLW 
042 |a pcc 
043 |a n-us--- 
049 |a TXAM 
050 0 0 |a KF1263.C65  |b C44 2018 
082 0 0 |a 343.7309/99  |2 23 
100 1 |a Chertoff, Michael,  |d 1953-  |e author.  |0 http://id.loc.gov/authorities/names/no2002038803 
245 1 0 |a Exploding data :  |b reclaiming our cyber security in the digital age /  |c Michael Chertoff. 
250 |a First Grove Atlantic hardcover edition. 
250 |a First edition. 
264 1 |a New York :  |b Atlantic Monthly Press,  |c 2018. 
264 4 |c ©2018 
300 |a vii, 254 pages :  |b illustrations ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references (pages 213-242) and index. 
505 0 |a Introduction : Big data is watching you -- What is the Internet and how did it change data? -- How did law and policy evolve to address Data 1.0 and 2.0? -- Data 3.0 and the challenges of privacy and security -- Reconfiguring privacy and security in the Data 3.0 universe -- Data 3.0 and controls on private sector use of data -- Data 3.0 and sovereignty : a question of conflict of laws -- Cyber warfare: deterrence and response -- Conclusion : Meeting the challenge of Data 3.0: recommendations for law and policy. 
520 |a "Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened."--Amazon.com. 
520 |a "The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal data; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber attack. In this bracing book, Michael Chertoff makes clear that personal data has become one of the most valuable assets of the modern age; and yet our laws and policies surrounding the protection of personal information were written for an earlier time and need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread even by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not the simple loss of privacy, which is almost impossible to protect, but that of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades, through to the present, that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a forceful new strategy that balances the needs of individuals, government, and business alike."--Jacket. 
650 0 |a Data protection  |x Law and legislation  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2008102020 
650 0 |a Data protection  |x Government policy  |z United States. 
650 0 |a Conflict of laws  |x Data protection  |z United States. 
650 0 |a Computer security  |x Law and legislation  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2009121191 
650 0 |a Computer security  |x Government policy  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2009121189 
650 0 |a Privacy, Right of  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2008108965 
650 0 |a Internet  |x Law and legislation  |z United States.  |0 http://id.loc.gov/authorities/subjects/sh2008104755 
650 0 |a Information warfare (International law)  |0 http://id.loc.gov/authorities/subjects/sh2002002082 
650 7 |a POLITICAL SCIENCE  |x American Government  |x Judicial Branch.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE  |x Civics & Citizenship.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE  |x Public Policy.  |2 bisacsh 
650 7 |a Computer security  |x Government policy.  |2 fast  |0 (OCoLC)fst00872490 
650 7 |a Computer security  |x Law and legislation.  |2 fast  |0 (OCoLC)fst00872492 
650 7 |a Conflict of laws  |x Data protection.  |2 fast  |0 (OCoLC)fst01902878 
650 7 |a Data protection  |x Government policy.  |2 fast  |0 (OCoLC)fst00887961 
650 7 |a Data protection  |x Law and legislation.  |2 fast  |0 (OCoLC)fst00887963 
650 7 |a Information warfare (International law)  |2 fast  |0 (OCoLC)fst00973189 
650 7 |a Internet  |x Law and legislation.  |2 fast  |0 (OCoLC)fst00977193 
650 7 |a Privacy, Right of.  |2 fast  |0 (OCoLC)fst01077444 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
650 7 |a Datenschutz.  |2 gnd  |0 (DE-588)4011134-9 
650 7 |a Privatsphäre.  |2 gnd  |0 (DE-588)4123980-5 
650 7 |a Computersicherheit.  |2 gnd  |0 (DE-588)4274324-2 
650 7 |a Data  |x Protection.  |2 sears 
650 7 |a Computer security.  |2 sears 
650 7 |a Right of privacy  |z United States.  |2 sears 
651 4 |a United States. 
655 4 |a Nonfiction. 
776 0 8 |i Online version:  |a Chertoff, Michael, 1953-  |t Exploding data.  |b First edition.  |d New York : Atlantic Monthly Press, [2018]  |z 9780802165787  |w (DLC) 2018015217 
994 |a C0  |b TXA 
999 f f |s 75f04c12-c0a1-33f3-aa20-eeb608f46504  |i ca0b077f-041a-3940-ad9a-f2eb61d80dcd  |t 0