Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family Hardcover – January 16, 2014
Featured Functional Programming Titles
Check out these featured titles from O'Reilly Media and distributed publishers.
Frequently Bought Together
Customers Who Bought This Item Also Bought
Former White House Chief Information Officer Payton and lawyer Claypoole, authors of Protecting Your Internet Identity, team up again to produce this quick and easy overview of data collection and its relevance in our everyday lives. The authors guide readers through the many ways our personal information is collected and used in today’s society. They are quick to point out the beneficial aspects of technological advancements in commercial, private, and government settings. However, any collection of personal data is susceptible to malicious use. The authors go on to elaborate on the everyday possibilities of hacking, wiretapping, and other big data strategies by marketers and cybercriminals. Most alarming are the implications of data mining for everyday citizens: cybercriminals can and will steal any information, through government or commercial enterprises. Payton and Claypoole provide practical tips and tools for protecting personal data throughout making this a perfect beginner’s guide for anyone looking to stay informed. (Publishers Weekly)
Payton and Claypoole intend this book as an overview of the threats facing private citizens in the era of cloud computing and big data. Discussions of privacy in this time take as their departure point the problematic nature of cloud-based computing and of the storage of massive amounts of personal data by businesses, governments, and devices connected to the cloud. The threats reviewed include those associated with mobile access and tracking individuals’ locations, Internet viewing, and the ubiquity of cameras as peripherals on devices. The final section details mitigating risks to individual privacy and reviews legislative efforts that could help. VERDICT Well-researched and well-written, this timely and important addition to the literature on privacy and big data will resonate with researchers of information policy and related legislation. (Library Journal)
I think people out there don’t realize there’s this whole underground economy out there, knives and daggers, people out there trying to get any piece of your data at any cost and at the end of the day we’re the ones who will pay the price. . . This is great advice. (The Willis Report, Fox Business)
Privacy in the Age of Big Data is a valuable source of information, no matter how much you know about cybersecurity; for those who are just starting to protect their data, however, you won’t want to let this book out of your sight. (datascience@berkeley Blog, Berkeley School of Information)
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family provides a powerful reference focusing on privacy in the digital world, and is a fine pick for any who would consider the ramifications of how data is collected, stored and used. Current practices have created a level of data collection and surveillance never before used: while some of these methods are justified by protection and new services, others intrude on civil liberties. This book considers the pros and cons of new digital surveillance systems and analyzes the dangers of information tracking, offering readers insights into ways we are tracked, and how to change behaviors and activities to regain more privacy. It's an in-depth discussion that should be a part of any social issues or computer science library, offering much food for thought. (Midwest Book Review)
Payton and Claypole highlight the pros and cons of Big Data collection and illuminate the many areas of data collection that are still largely unknown to the general public. (Information Today)
The Pew Internet Research Center noted that 74% of teens use their cell phone for internet access and almost 25% of teens use cell phones almost exclusively to conduct their digital life on the internet. Parents and kids need a guide in the digital age and Payton and Claypoole are your new sherpas to protect your family. Although every chapter of the book has great advice for families, parents and kids should pay special attention to Chapter 6 - The Spy In Your Pocket. This chapter will help parents illustrate to their kids why their words and actions matter. Privacy in the Age of Big Data by Theresa Payton and Ted Claypoole will walk you through the solutions that can help your kids have fun while protecting their privacy and security. A must read for everyone! (Sue Scheff, Nationally Recognized Author of Wit's End; Family Internet Safety Advocate)
People of all ages are increasingly confused about who is collecting their data and why the collection itself could lead to a loss of privacy. Privacy in the age of Big Data by Theresa Payton and Ted Claypoole provides a thoughtful and balanced view on how to harness the power of big data to make it work for you while maintaining the security and privacy of your company and your personal life. Unlike other books, they don't just leave you feeling a sense of dread, they walk you through the steps you can take to combat the threats, know your rights, and protect the privacy and security of your loved ones in the age of big data and surveillance. This book is a must read for all of us that live in this digital age. (Michele Borba, Ed.D., Child Media Expert, Educational Psychologist, and author of The Big Book of Parenting Solutions)
If you value your privacy, this book is an absolute must read. So many of us have no idea how much of our daily lives is captured, stored and in the possession of someone else. Privacy in Age of Big Data will enlighten you as to how much of your private life is being digitally acquired without your permission or knowledge. (Doris Gardner, FBI Cyber Supervisor (Retired), recipient of FBI Director’s Award (2009))
Once again, Theresa Payton and Ted Claypoole have provided a thorough examination of the unforeseen consequences that our plunge into the digital age has had on our traditional notions of privacy. Their latest endeavor, Privacy in the Age of Big Data, clearly articulates the impact that a myriad of seemingly innocuous technological advances have had on our daily lives, many of which have irreparably undermined our ability to control the deluge of personal information that is being collected, archived, analyzed, and ultimately leveraged for everything from marketing and advertizing to law enforcement and criminal activities. Payton and Claypoole look beyond the obvious ramifications of over-sharing online and the spread of surveillance mechanisms in the public domain, further delving into the corrosive nature of a world inundated with privacy depriving technologies that now touch every aspect of our society, as well as providing an analysis of the legal and political consequences that our desire for convenience through ever more connectivity has wrought. Privacy in the Age of Big Data is a timely and captivating study of our brave new digital world. (Anthony M. Freed, security journalist and community engagement coordinator for Tripwire, Inc.)
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family, accomplishes this feat in lay person's language and in a clear and concise manner. I recommend it should be read by everyone - from grandparents to teens, from corporate America to the homemaker. Safety and security starts with being aware and educated, and reading this book is a must! (Christopher Duque, CyberCrimes Investigator, Department of Prosecuting Attorney (Honolulu); CyberSafety-CyberSecuirty advocate)
Technology has improved our lives dramatically over the past two decades, yet there are emerging concerns with the ubiquitous digital collection of private information. Privacy in the Age of Big Data is a thorough look into the growing vulnerabilities we face; Payton and Claypoole explore all aspects of these dangers...effectively raising the reader's awareness, and providing solid recommendations to protect yourself and your most sensitive information. (Shawn Henry, president, CrowdStrike Services; former executive assistant director, FBI)
Every informed American needs to know more about today's privacy-invading technologies and what to do about them. This book explains the problems in a readable and lively way. It provides expert and timely insights about the technology, law, and policy for privacy in this age of Big Data. (Peter Swire, Huang Professor, Georgia Institute of Technology and formerly Chief Counselor for Privacy in the U.S. government)
About the Author
Theodore Claypoole is a technology attorney and is currently cochair of the Cyberspace Mobile Commerce Subcommittee for the American Bar Association’s Business Law Section. Ted is the author of chapters in published books on biometrics and data security, as well as several articles on Internet security and Internet law. He is currently leader of the Privacy and Data Management team at the law firm Womble Carlyle. He leads data breach incident response teams in the financial, information processing, retail, and software industries. Ted consults on information security, privacy, consumer data treatment, and contingency planning matters, and advises clients on strategic technology and marketing alliances. Ted was previously the in-house technology and Internet counsel for CompuServe and Bank of America.
If you’re the author, publisher, or rights holder of this book, let ACX help you produce the audiobook.Learn more.
Top Customer Reviews
Anyone who has followed my research and reviews knows that I'm a budding data scientist who condemns unethical use of data analytics; but I like to think that I explain my views in a level headed manner, leaving people without technology backgrounds with actionable information. However, Payton makes me look like a pundit screaming on the local news. She expresses her views without bias or subjectivity in a concise and compact manner (almost to a fault).
This book assumes literally no technological background on behalf of the reader, and follows a logical progression from how your computer is used as a data collection tool to how data is actually used by companies and governments without your consent. And at only 274 pages, I can't imagine the book taking more than a week to read for even the most recreational reader.
The only reason this book didn't get 5 stars was due in part to the overtly compact nature of the book. The book just didn't flow right. Granted, Payton (et al) are covering a vast expanse of knowledge and trying to fit so many facts into 274 pages and properly source each and every quote, factoid, and case study takes talent.
Unfortunately, the book missed its mark there, and would have benefited from an extra 20-25 pages worth the "fluff" and smoother transitions.Read more ›
As I said, the information in the book is really important, but each point goes on and on and becomes quite repetitive. It makes for tough reading at times, but is overall an interesting read.
The book is divided into four sections; starting with "The Intersection of Privacy, Law, and Technology”, authors delve into general cyber tracking both by government and individuals, and explain the threats associated with today's malware analysis. Authors wrote:
“Not only Tibetans and Chinese political dissidents need to be concerned with government malware. The Chinese government is apparently also interested in the mobile computers of North American businesspeople and government officials. According to Joel F. Brenner, formerly the top counterintelligence official in the office of the director of national intelligence: “If a company has significant intellectual property that the Chinese and Russians are interested in, and you go over there with mobile devices, your devices will get penetrated.””
More than anything, I enjoyed the diverse array of knowledge and material accumulated by the authors.Read more ›
Most Recent Customer Reviews
great book- will respect privacy of secret society for now- great writing here- will name ops etc- buy this!!!Published 3 months ago by graywar3
Read it if you are interested in being informed and protecting your privacy.Published 5 months ago by Edwin Muchiri
Overall I think many people have low personal awareness when it comes to the subject of information security and data privacy. Read morePublished 20 months ago by Darin Hurd
Well written and clear, this book is worth reading by anyone interested in privacy. Even a privacy professional like myself found nuggets of wisdom within its pages.Published on March 18, 2014 by Vahle J. C. M.
This is a really good book for mothers interested in keeping your family's privacy protected. What I loved most was Mrs Payton epitomizes the hard working mom that understands the... Read morePublished on March 12, 2014 by Melissa Ferguson
Mrs Peyton knows management, technology and privacy. Her experiences provide a unique view into privacy and individual rights. Read morePublished on March 12, 2014 by Fergus
The information is timely and interesting but clearly the authors did a lot of padding to fill in. I find myself skimming a lot. It could have been written more succinctly. Read morePublished on January 30, 2014 by Friendly Shopper