Écouter et lire

Entrez dans un monde infini d'histoires

  • Lire et écouter autant que vous le voulez
  • Plus d'un million de titres
  • Titres exclusifs + créations originales Storytel
  • 14 jours d'essai gratuit, puis 9,99 € par mois
  • Annulation facile à tout moment
Essayer gratuitement
Details page - Device banner - 894x1036
Cover for Exploding Data: Reclaiming Our Cyber Security in the Digital Age

Exploding Data: Reclaiming Our Cyber Security in the Digital Age

19 évaluations

3.7

Durée
6h 47min
Langue
Anglais
Format
Catégorie

Documents et essais

In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data—more widespread by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.

© 2018 HighBridge Audio (Livre audio): 9781684414635

Date de publication

Livre audio : 19 septembre 2018

Mots-clés

D'autres ont également apprécié ...

  1. Artificial Intelligence: From Medieval Robots to Neural Networks
    Artificial Intelligence: From Medieval Robots to Neural Networks Clifford A. Pickover
  2. Auctions
    Auctions Timothy P. Hubbard
  3. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  4. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  5. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  6. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  7. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  8. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  9. Robot-Proof: Higher Education in the Age of Artificial Intelligence
    Robot-Proof: Higher Education in the Age of Artificial Intelligence Joseph E. Aoun
  10. Future Histories: What Ada Lovelace, Tom Paine, and the Paris Commune Can Teach Us About Digital Technology
    Future Histories: What Ada Lovelace, Tom Paine, and the Paris Commune Can Teach Us About Digital Technology Lizzie O'Shea
  11. Recycling
    Recycling Finn Arne Jorgensen
  12. Deep Learning
    Deep Learning John D. Kelleher
  13. GPS
    GPS Paul E. Ceruzzi
  14. Data For the People: How to Make Our Post-Privacy Economy Work for You
    Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  15. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  16. New Laws of Robotics: Defending Human Expertise in the Age of AI
    New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
  17. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  18. Extraterrestrials
    Extraterrestrials Wade Roush
  19. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  20. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  21. The Age of AI: Artificial Intelligence and the Future of Humanity
    The Age of AI: Artificial Intelligence and the Future of Humanity Jason Thacker
  22. Radicals
    Radicals Jamie Bartlett
  23. The Digital Silk Road: China's Quest to Wire the World and Win the Future
    The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
  24. Waves
    Waves Fredric Raichlen
  25. Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets
    Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets Pablo Triana
  26. What's Wrong with China
    What's Wrong with China Paul Midler
  27. Liars: Falsehoods and Free Speech in an Age of Deception: Falsehoods and Free Speech in an Age of Deception
    Liars: Falsehoods and Free Speech in an Age of Deception: Falsehoods and Free Speech in an Age of Deception Cass R. Sunstein
  28. Grand Pursuit: The Story of Economic Genius
    Grand Pursuit: The Story of Economic Genius Sylvia Nasar
  29. Virtual Reality
    Virtual Reality Samuel Greengard
  30. All These Worlds Are Yours: The Scientific Search for Alien Life
    All These Worlds Are Yours: The Scientific Search for Alien Life Jon Willis
  31. We Have Root: Even More Advice from Schneier on Security
    We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  32. The Ethical Algorithm: The Science of Socially Aware Algorithm Design
    The Ethical Algorithm: The Science of Socially Aware Algorithm Design Michael Kearns
  33. The Body Economic: Why Austerity Kills
    The Body Economic: Why Austerity Kills David Stuckler
  34. Future Rising: A Journey from the Past to the Edge of Tomorrow
    Future Rising: A Journey from the Past to the Edge of Tomorrow Andrew Maynard
  35. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
    The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  36. To Engineer Is Human: The Role of Failure in Successful Design
    To Engineer Is Human: The Role of Failure in Successful Design Henry Petroski
  37. Spark: The Life of Electricity and the Electricity of Life
    Spark: The Life of Electricity and the Electricity of Life Timothy J. Jorgensen
  38. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
    Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
  39. Cybersecurity Program Development for Business: The Essential Planning Guide
    Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  40. Haptics
    Haptics Lynette Jones
  41. 3D Printing
    3D Printing John M. Jordan
  42. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  43. Life After Capitalism: The Meaning of Wealth, the Future of the Economy, and the Time Theory of Money
    Life After Capitalism: The Meaning of Wealth, the Future of the Economy, and the Time Theory of Money George Gilder
  44. Computational Thinking
    Computational Thinking Peter J. Denning
  45. The Billion Dollar Molecule: One Company's Quest for the Perfect Drug
    The Billion Dollar Molecule: One Company's Quest for the Perfect Drug Barry Werth
  46. Ten Short Lessons in Artificial Intelligence and Robotics
    Ten Short Lessons in Artificial Intelligence and Robotics Peter J. Bentley
  47. True or False: A CIA Analyst's Guide to Spotting Fake News
    True or False: A CIA Analyst's Guide to Spotting Fake News Cindy L. Otis
  48. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  49. They Don't Represent Us: Reclaiming Our Democracy
    They Don't Represent Us: Reclaiming Our Democracy Lawrence Lessig
  50. Information and Society
    Information and Society Michael Buckland
  51. The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace
    The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace Eric Rauchway
  52. How the Laser Happened: Adventures of a Scientist
    How the Laser Happened: Adventures of a Scientist Charles H. Townes
  53. Behemoth: A History of the Factory and the Making of the Modern World
    Behemoth: A History of the Factory and the Making of the Modern World Joshua B. Freeman
  54. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  55. What Makes a Terrorist?: Economics and the Roots of Terrorism (10th Anniversary Edition)
    What Makes a Terrorist?: Economics and the Roots of Terrorism (10th Anniversary Edition) Alan B. Krueger
  56. The Einstein Syndrome: Bright Children Who Talk Late
    The Einstein Syndrome: Bright Children Who Talk Late Thomas Sowell
  57. The Scandal of Money: Why Wall Street Recovers but the Economy Never Does
    The Scandal of Money: Why Wall Street Recovers but the Economy Never Does George Gilder
  58. The Myth of Artificial Intelligence: Why Computers Can’t Think the Way We Do
    The Myth of Artificial Intelligence: Why Computers Can’t Think the Way We Do Erik J. Larson
  59. Getting Gamers: The Psychology of Video Games and Their Impact on the People who Play Them
    Getting Gamers: The Psychology of Video Games and Their Impact on the People who Play Them Jamie Madigan
  60. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
    Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  61. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  62. How Money Became Dangerous: The Inside Story of our Turbulent Relationship with Modern Finance
    How Money Became Dangerous: The Inside Story of our Turbulent Relationship with Modern Finance Christopher Varelas
  63. Darwin’s House of Cards: A Journalist’s Odyssey Through the Darwin Debates
    Darwin’s House of Cards: A Journalist’s Odyssey Through the Darwin Debates Tom Bethell
  64. Monopolized: Life in the Age of Corporate Power
    Monopolized: Life in the Age of Corporate Power David Dayen
  65. The Captured Economy: How the Powerful Enrich Themselves, Slow Down Growth, and Increase Inequality
    The Captured Economy: How the Powerful Enrich Themselves, Slow Down Growth, and Increase Inequality Brink Lindsey
  66. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
    Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
  67. Humans Need Not Apply: A Guide to Wealth and Work in the Age of Artificial Intelligence
    Humans Need Not Apply: A Guide to Wealth and Work in the Age of Artificial Intelligence Jerry Kaplan
  68. Memes: In Digital Culture
    Memes: In Digital Culture Limor Shifman
  69. The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It
    The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It Jon Danielsson
  70. Driven: The Race to Create the Autonomous Car
    Driven: The Race to Create the Autonomous Car Alex Davies
  71. The Bourgeois Virtues: Ethics for an Age of Commerce
    The Bourgeois Virtues: Ethics for an Age of Commerce Deirdre N. McCloskey
  72. System Error: Where Big Tech Went Wrong and How We Can Reboot
    System Error: Where Big Tech Went Wrong and How We Can Reboot Rob Reich
  73. A History of Video Games in 64 Objects
    A History of Video Games in 64 Objects World Video Game Hall of Fame
  74. Ludicrous: The Unvarnished Story of Tesla Motors
    Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
  75. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
    What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
  76. Cyber Hacking: Wars in Virtual Space
    Cyber Hacking: Wars in Virtual Space Scientific American
  77. The Shape of a Life: One Mathematician’s Search for the Universe’s Hidden Geometry
    The Shape of a Life: One Mathematician’s Search for the Universe’s Hidden Geometry Shing-Tung Yau
  78. Point Made: How to Write Like the Nation's Top Advocates, Second Edition
    Point Made: How to Write Like the Nation's Top Advocates, Second Edition Ross Guberman
  79. Human Work in the Age of Smart Machines
    Human Work in the Age of Smart Machines Jamie Merisotis
  80. The Science Delusion: Asking the Big Questions in a Culture of Easy Answers
    The Science Delusion: Asking the Big Questions in a Culture of Easy Answers Curtis White
  81. How Charts Lie: Getting Smarter about Visual Information
    How Charts Lie: Getting Smarter about Visual Information Alberto Cairo
  82. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
  83. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  84. They're Not Listening: How The Elites Created the Nationalist Populist Revolution
    They're Not Listening: How The Elites Created the Nationalist Populist Revolution Harlan Hill
  85. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  86. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles

L’offre Storytel :

  • Accès à la bibliothèque complète

  • Mode enfant

  • Annulez à tout moment

15 heures

Pour accompagner vos loisirs

9.99€ /mois
30 jours gratuits
  • 1 compte

  • 15 heures/mois

Essayer maintenant

30 heures

Pour vos trajets quotidiens

14.99€ /mois
30 jours gratuits
  • 1 compte

  • 30 heures/mois

Essayer maintenant

45 heures

Pour écouter tous les jours

17.99€ /mois
30 jours gratuits
  • 1 compte

  • 45 heures/mois

Essayer maintenant