O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Privacy and Big Data

Book Description

There is a perfect storm brewing. While data is growing at an exponential rate, technology is pushing the transformation envelope making data aggregation and large scale analytic computation easy. What is the most valuable commodity on the market today? It’s us. We are the asset that every company, industry, non-profit, and government agency (civil, internal security, military, or intelligence) wants. In fact, the investment community is placing huge bets on “us.” Our personal digital data is now considered more valuable than diamonds, rubies, gold, or platinum.

Table of Contents

  1. Special Upgrade Offer
  2. Preface
    1. Conventions Used in This Book
    2. Safari® Books Online
    3. How to Contact Us
    4. Acknowledgments
      1. In Terence’s Own Words...
      2. It’s Mary’s Turn Now...
  3. 1. The Perfect Storm
    1. Through the Looking Glass
    2. Welcome to the Big Data Age
    3. From Pieces of a Puzzle to a Complete Picture: The Future Is Now
    4. Advertising as the Big Bad Wolf
    5. Big Brother and Big Data Around the World
    6. At the Crossroads: Privacy versus Security and Safety
    7. Bibliography
  4. 2. The Right to Privacy in the Digital Age
    1. What Does Privacy Mean in the Digital Age?
    2. Privacy in the U.S.: The Right to Be Let Alone
    3. Privacy in Europe: Honor and Dignity
    4. Privacy is Always Viewed through Some Sort of Prism
    5. Privacy Without Borders
    6. A Clash of Values
    7. Networked Privacy: The “I” Versus the Collective “We”
    8. Bibliography
  5. 3. The Regulators
    1. A (Very) Brief History of “Digital” Privacy Regulation
    2. Privacy Regulatory Models—Complimentary or Contradictory?
    3. The U.S. Regulatory Model—A Bottom Up Approach
      1. The Federal Trade Commission (FTC)
      2. The Federal Communications Commission (FCC)
      3. The Department of Commerce (Commerce)
      4. The Department of Energy (DOE)
      5. The Department of Health and Human Services (HHS)
      6. The Consumer Financial Protection Bureau (CFPB)
      7. Some Final Words on the U.S. Model
    4. The European Union Model—A Top Down Approach
      1. The Safe Harbor Effect
      2. Some Final Words on the EU Model
    5. A Quick Tour of Other Country’s Privacy Laws
    6. Privacy Versus Security and Safety
    7. Data Never Dies
    8. Enlightened or Otherwise, We All Have Skin in This Game
    9. Bibliography
  6. 4. The Players
    1. Meet the Players
    2. A (Very) Brief History of Online Advertising
    3. Intellectual Property Rights, Trusted Computing, and Privacy
    4. Pushing the Privacy Envelope All the Way to the Bank
    5. Unprecedented Access Further Erodes Privacy Expectations
    6. Letting the Genie Out of the Bottle
    7. Those that Protect and Serve in the Name of Privacy
    8. The Rising Privacy Economy
    9. While the Players are Playing, Consumer Privacy Continues to Erode
    10. Bibliography
  7. 5. Making Sense of It All
    1. The Heart of the Matter: Commodity Versus Right
    2. We Are All Connected
    3. What Are We Willing to Give Up for Safety and Security?
    4. The Truth About Data: Once It’s Out There, It’s Hard to Control
    5. Coming Full Circle
    6. Bibliography
  8. A. Afterword
    1. Terence’s Point of View
    2. Mary’s Point of View
  9. About the Authors
  10. Special Upgrade Offer
  11. Copyright