Record ID | ia:privacyinageofbi0000payt |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/privacyinageofbi0000payt/privacyinageofbi0000payt_marc.xml |
Download MARC binary | https://www.archive.org/download/privacyinageofbi0000payt/privacyinageofbi0000payt_meta.mrc |
LEADER: 05335cam 2200673 i 4500
001 ocn855957401
003 OCoLC
005 20180719045502.0
008 140801t20142014mdu b 001 0 eng d
010 $a 2013417859
040 $aYDXCP$beng$erda$cDLC$dYDXCP$dBTCTA$dBDX$dUKMGB$dOSO$dWCL$dUOK$dMNW$dCDX$dDAC$dTSQ$dOHI$dPHA$dBUR$dOCLCF$dSGB$dCGN$dOCLCQ$dAU@$dCOH$dYLS$dMOF$dNDS$dOCL$dOCLCQ$dLRP$dOCLCQ$dCSJ$dIOK$dOCLCQ$dQQ3
016 7 $a016537354$2Uk
019 $a873502221$a874100626$a880892531$a898050325$a931650729$a936052133$a966587473$a967797176$a973970707$a980538585$a985289631$a988990870$a993393636$a995517344$a1017918786$a1022752939$a1027985722$a1029830802$a1034939563$a1039170819
020 $a1442225459$q(hardback ;$qalkaline paper)
020 $a9781442225459$q(hardback ;$qalkaline paper)
020 $z9781442225466$q(electronic)
020 $z1442225467$q(electronic bk.)
020 $z9781442225466$q(electronic bk.)
035 $a(OCoLC)855957401$z(OCoLC)873502221$z(OCoLC)874100626$z(OCoLC)880892531$z(OCoLC)898050325$z(OCoLC)931650729$z(OCoLC)936052133$z(OCoLC)966587473$z(OCoLC)967797176$z(OCoLC)973970707$z(OCoLC)980538585$z(OCoLC)985289631$z(OCoLC)988990870$z(OCoLC)993393636$z(OCoLC)995517344$z(OCoLC)1017918786$z(OCoLC)1022752939$z(OCoLC)1027985722$z(OCoLC)1029830802$z(OCoLC)1034939563$z(OCoLC)1039170819
042 $alccopycat
043 $an-us---
050 00 $aKF1262$b.P39 2014
082 04 $a323.448$223
100 1 $aPayton, Theresa,$d1966-$eauthor.
245 10 $aPrivacy in the age of big data :$brecognizing threats, defending your rights, and protecting your family /$cTheresa M. Payton and Theodore Claypoole ; foreword by the Honorable Howard A. Schmidt.
264 1 $aLanham ;$aBoulder ;$aNew York ;$aToronto ;$aPlymouth, UK :$bRowman & Littlefield,$c[2014]
264 4 $c℗♭2014
300 $axvi, 259 pages ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references and index.
505 0 $aIntroduction: Your life on technology -- The intersection of privacy, law, and technology -- Your computer is watching you -- How government follows your electronics tracks -- Chased online by criminals and snoops -- Just hanging out online ... -- The spy in your pocket -- Cameras everywhere -- When your car is just another computer -- When your own body gives you away -- DNA and your health records -- Home sweet home: Spies in your living room -- Risks of computer and phone networks -- The future of technology and privacy -- Laws and regulations that could help preserve privacy.
520 $aDigital data collection and surveillance gets more pervasive and invasive by the day, but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security.
650 0 $aPrivacy, Right of$zUnited States.
650 0 $aData protection$zUnited States.
650 0 $aElectronic surveillance$zUnited States.
650 0 $aBig data.
650 0 $aConsumer protection.
650 7 $aBig data.$2fast$0(OCoLC)fst01892965
650 7 $aConsumer protection.$2fast$0(OCoLC)fst00876358
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
650 7 $aElectronic surveillance.$2fast$0(OCoLC)fst00907477
650 7 $aPrivacy, Right of.$2fast$0(OCoLC)fst01077444
651 7 $aUnited States.$2fast$0(OCoLC)fst01204155
655 4 $aNonfiction.
700 1 $aClaypoole, Ted,$d1963-$eauthor.
700 1 $aSchmidt, Howard A.,$eauthor of foreword.
856 42 $zAdditional Information at Google Books$uhttp://books.google.com/books?isbn=1442225459
938 $aBrodart$bBROD$n106896113
938 $aBaker and Taylor$bBTCP$nBK0013704659
938 $aCoutts Information Services$bCOUT$n25999375
938 $aYBP Library Services$bYANK$n11058110
029 1 $aAU@$b000052553161
029 1 $aAU@$b000052695545
029 1 $aAU@$b000053876270
029 1 $aNZ1$b15374999
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 888 OTHER HOLDINGS