Exploding data : reclaiming our cyber security in the digital age
Resource Information
The work Exploding data : reclaiming our cyber security in the digital age represents a distinct intellectual or artistic creation found in Evansville Vanderburgh Public Library. This resource is a combination of several types including: Work, Audio, Nonmusical, Sounds, Music.
The Resource
Exploding data : reclaiming our cyber security in the digital age
Resource Information
The work Exploding data : reclaiming our cyber security in the digital age represents a distinct intellectual or artistic creation found in Evansville Vanderburgh Public Library. This resource is a combination of several types including: Work, Audio, Nonmusical, Sounds, Music.
- Label
- Exploding data : reclaiming our cyber security in the digital age
- Title remainder
- reclaiming our cyber security in the digital age
- Statement of responsibility
- Michael Chertoff
- Subject
-
- Computer security -- Government policy -- United States
- Computer security -- Law and legislation -- United States
- Conflict of laws -- Data protection -- United States
- Data protection -- Government policy -- United States
- Data protection -- Law and legislation -- United States
- Downloadable audiobooks
- Information warfare (International law)
- Internet -- Law and legislation -- United States
- Privacy, Right of -- United States
- Audiobooks
- Language
- eng
- Summary
- In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data-more widespread by business than by government, and impossible to stop-should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy-the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike
- Accompanying matter
- technical information on music
- Cataloging source
- Midwest
- Dewey number
- 343.7309/99
- Form of composition
- not applicable
- Format of music
- not applicable
- Literary text for sound recordings
- other
- PerformerNote
- Read by Jonathan Yen
- Target audience
- adult
- Transposition and arrangement
- not applicable
Context
Context of Exploding data : reclaiming our cyber security in the digital ageWork of
No resources found
No enriched resources found
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.evpl.org/resource/SH2QVo2MhAg/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.evpl.org/resource/SH2QVo2MhAg/">Exploding data : reclaiming our cyber security in the digital age</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.evpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.evpl.org/">Evansville Vanderburgh Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Exploding data : reclaiming our cyber security in the digital age
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.evpl.org/resource/SH2QVo2MhAg/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.evpl.org/resource/SH2QVo2MhAg/">Exploding data : reclaiming our cyber security in the digital age</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.evpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.evpl.org/">Evansville Vanderburgh Public Library</a></span></span></span></span></div>