Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family

eBookSecond Edition (Second Edition)

$33.00 

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

A thorough update to a classic in the field of privacy and big data.

We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet.

The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people’s sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year.

People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end.

These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of “contactless everything” became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don’t know how.

The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future.

While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven’t in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.


Product Details

ISBN-13: 9781538167830
Publisher: Rowman & Littlefield Publishers, Inc.
Publication date: 03/15/2023
Sold by: Barnes & Noble
Format: eBook
Pages: 364
File size: 579 KB

About the Author

Ted Claypoole is a partner at the law firm of Womble Bond Dickinson, practicing in Atlanta, Georgia. He has co-authored with Theresa Payton the book Protecting Your Internet Identity. He wrote the book Technology, Data and Law and also edited and co-wrote The Law of Artificial Intelligence and Smart Machines. He lives in Atlanta, GA.

Theresa Payton runs Fortalice Solutions, a globally recognized cybersecurity and business intelligence firm headquartered in Charlotte where she resides. A reality TV star from the CBS hit show, “Hunted”, Payton addresses Boards, CEOs, and individuals on security and privacy matters and is regularly featured on global news media outlets discussing privacy and security issues. She lives in Charlotte, NC.

Read an Excerpt

Privacy in the Age of Big Data

Recognizing Threats, Defending Your Rights, and Protecting Your Family


By Theresa M. Payton, Theodore Claypoole

ROWMAN & LITTLEFIELD

Copyright © 2014 Rowman & Littlefield
All rights reserved.
ISBN: 978-1-4422-2545-9



CHAPTER 1

The Intersection of Privacy, Law, and Technology


Privacy is crucial to protect and support the many freedoms and responsibilities that we possess in a democracy. The law is society's primary method of protecting and enforcing our ability to exercise our rights—if a basic human right is denied, then the law should provide recourse to reinstate it. Unfortunately, our society has reached a point at which the law cannot keep up with the advancement of technology and the constant change technology brings to our lives. Those technological changes are important and helpful in many ways, but they are overwhelming our system, and our privacy is the canary in our technological coal mine. If the law can't keep up to protect our privacy, then the technology whirlwind may affect many of our important rights.


WHY IS PRIVACY IMPORTANT?

Although it seems that every day fewer people care about their privacy, the ability to maintain parts of our life as private remains crucial to our democracy, our economy, and our personal well-being. Many people expose their deepest thoughts and barest body parts every day, leading pundits to decry that privacy is passé. Others suggest that the only people who would care if the government, the press, or even their neighbors are watching them are those people who are behaving badly.

These positions entirely miss the point of privacy. Privacy is not about embarrassment or bad behavior; privacy is about choice. In many cases people who expose their ideas or their derrieres online choose to do so. In those cases in which people were exposed through someone else's choice, such as a reporter, the people exposed felt that their privacy was violated. Similarly, when the government watches your every move, sooner or later it is likely to find something objectionable.

Over time, the government and society change their definitions of what is acceptable and what is not, so staying on the right side of the law and society's standards is not always as easy as it seems. Recently, a car insurance company has been advertising a service in which it provides a small monitor to record and analyze the way that its insurance customers drive every second that the customer is in the car. The company markets this technology as a "cool" advance that allows good drivers to benefit from reduced rates. However, the company never promises to use consistent standards for what it considers "good driving," it never promises in its commercials not to turn its customers in to the police for speeding or running red lights or driving in restricted areas—all actions that could now be recorded and analyzed. The company never promises that the device's information will not be used against a customer in a trial following an auto accident, by the other driver, or by the insurance company itself. The company doesn't discuss whether it will find one incident of questionable driving behavior—maybe during the time the customer's car was loaned to her brother—and make broad generalizations about the customer's driving habits that affect her insurance prices, her ability to be insured at all, or even her freedom if the technology decides she was driving while impaired. In short, there are dozens of unexplained downsides likely to arise from a technology that watches our every move, even if the technology only reports the results to your insurance company initially.


Losing Anonymity

In this book we do not attempt to provide a definitive interpretation of the nebulous concept of privacy. However, we address the importance of maintaining your choices for what you wish to keep private. Your home, your body, your thoughts and beliefs are all within the control of their owner, and they are easier to hold private. Your finances, your relationships, and your sexuality are areas that most of us would consider private, although additional parties—your bank, your best friend, your sexual partner—hold information concerning these private matters, so privacy is expected, though absolute control is not possible. You may travel places on the public streets and therefore not expect absolute privacy, but you still expect to be relatively anonymous either in a crowd or a place where no one knows you.

In this case, you would lose a measure of independence if everyone knew you everywhere you went and could tie together information about this trip with other information they knew about your shopping habits, your family history, and whose company you enjoy. Once your movements in space are recorded and added into the general base of knowledge without your permission, your freedom is limited. With the pervasive technology discussed in the following chapters, loss of anonymity is rapidly increasing and the basic loss of ability to keep secrets is in jeopardy.


Privacy Protects Freedom of Choice

When your privacy is protected, you are free to choose how much of your sensitive information to expose, to whom you will expose it, and, in some cases, how others can use the information. Philosophers such as John Locke thought that private information is a type of property, and, as with other property, we have the choice about how it can be used and whether to profit from it.

When you have no control over your private information, you have less freedom of choice. When a person understands that everyone will hear his opinion, then his opinion tends to be expressed in a way that is more acceptable to his neighbors, his boss, or the local police. If your living room is being watched by video, you are less likely to walk around in your underwear or eat that block of cheddar on the couch in front of the television, even if that's the way you like to spend an evening.

You might refrain from arguing with your spouse, kids, or parents if you believe people are watching you. We all behave differently when we know we are being watched and listened to, and the resulting change in behavior is simply a loss of freedom—the freedom to behave in a private and comfortable fashion; the freedom to allow the less socially careful branches of our personalities to flower. Loss of privacy reduces the spectrum of choices we can make about the most important aspects of our lives.

By providing a broader range of choices, and by freeing our choices from immediate review and censure from society, privacy enables us to be creative and to make decisions about ourselves that are outside the mainstream. Privacy grants us the room to be as creative and thought-provoking as we want to be. British scholar and law dean Timothy Macklem succinctly argues that the "isolating shield of privacy enables people to develop and exchange ideas, or to foster and share activities, that the presence or even awareness of other people might stifle. For better and for worse, then, privacy is a sponsor and guardian to the creative and the subversive."

Our economy thrives on creativity and new thinking, which in turn are nurtured by privacy of information. Without this privacy, the pace of invention and change slows because our ability to stay ahead of competitors sputters. Privacy is an important lubricant of free thought and free enterprise.


Privacy Secures Our Human Dignity

The wrongheaded notion that privacy is only important for people who are misbehaving ignores the fundamental aspect of privacy as protector of our essential human dignity. Civilized people tend to shield from view the activities and attributes that most remind us of our animal natures. Eating in public is taboo in many societies, and nearly every society contains unwritten rules about what is an acceptable manner of eating around other people. While some societies honor the naked body, people in the Western world cover themselves at all times in public and can be arrested in the United States for doing otherwise.

All animals must dispose of bodily waste, and people in the modern age find the act to be private and prefer to engage in it far from the public eye. Likewise, the entirely natural act of childbirth and the sexual acts that lead to it are considered to be personal and sensitive matters by our society, and basic human dignity requires that people be allowed to choose privacy in these matters. None of these subjects necessarily arouses a question of whether a person is behaving properly, but polite and civilized behavior dictates that people are allowed privacy in acting naturally. Privacy is important for maintaining our status as respected members of society.

Many intrusions on privacy can harm our dignity. In a landmark law review article on the nature of privacy under the law, Professor Edward Bloustein wrote in 1964 about a famous American court case limiting press access:

When a newspaper publishes a picture of a newborn deformed child, its parents are not disturbed about any possible loss of reputation as a result. They are rather mortified and insulted that the world should be witness to their private tragedy. The hospital and the newspaper have no right to intrude in this manner upon a private life.... The wrong is in replacing personal anonymity by notoriety, in turning a private life into a public spectacle.


Professor Bloustein defined this act as an imposition upon and an affront to the plaintiff's human dignity. Fifty years later, the concept of privacy as a protector of personal dignity seems somehow quaint, as game show contestants fight to heap more humiliation upon each other, and an entire class of reality television is based on exposing the ignorance and boorish behavior of happily compliant citizens. But this is a choice that these people make to grab their fifteen minutes of fame, maybe more, as some profit handsomely by exposing themselves to ridicule. Just because television producers can find people who will trade their dignity for silver or spotlights does not mean that dignity isn't important to the vast majority of us, or that privacy choices should be limited in any way.

Privacy is important for protecting personal dignity, not only because it shields our animal natures and our personal misfortunes from publicity. Privacy also allows us to think, talk, and behave as we like in seclusion but still be treated with basic respect accorded all members of our society. If everyone knew how each person behaved in her personal "down time," then their understanding of a person who drools in her sleep, is addicted to daytime soap operas, or can't cook could tarnish the professional and personal respect that they have toward her.


Seeking Normal

No human is perfect, and it can be considered pathological to try too hard to be perfect. We all have our foibles and eccentricities. It seems that the only people who are not somehow strange are the people you don't know very well. But we try to seem "normal" in the ways that are important to each of us, and we present a face to the public that shows our best side. Privacy allows us the dignity to present ourselves as we want the world to see us, the freedom to make mistakes, be clumsy, and display socially unattractive behavior without fear of judgment.

In 1987, President Reagan nominated Judge Robert Bork for the Supreme Court seat vacated by Justice Lewis Powell's retirement. Bork was a controversial figure with strong views on nearly all legal topics, and his nomination engendered much opposition. During the battle for his confirmation, Judge Bork's video-rental history was leaked to the press and used as fodder by some reporters.

While the video history did not seem to affect the confirmation hearings, its introduction into the public consciousness led directly to one of the first federal privacy laws in the United States, the Video Privacy Protection Act of 1988. In this act, Congress recognized that video-rental databases contain private records that, if widely publicized, could negatively affect the ways that people viewed each other.

In a rare, quick act of protection of human dignity, Congress determined that information about the videos that you watch is nobody's business. The introduction of reading material, television-viewing history, video rentals, or Internet-surfing records into a public debate about a political figure allows the public to see a private side that is likely to be completely irrelevant to a person's performance in office, and it allows the public to chuckle at the silly, stupid, or offensive material a public figure consumes in private.

We are afforded less dignity and basic respect when people know the human foibles and odd preferences of our private lives. Privacy in the personal space allows us to maintain that core level of respect that all of us deserve.


Privacy Protects People from Coercion

Why would someone want to intrude on your privacy? Simply because the more he knows about you, the more he can influence your decisions. We have described privacy as a preserver of choices, and therefore freedom. The more choices you have, the freer you are to live your life in the way you prefer. Limiting that freedom can drive you to make the choices that someone else wants you to make.

The most severe example of this coercion through limited privacy was the police state of East Germany during the Cold War. Some estimates claim that the Stasi, the East German secret police, had over half a million informers within the state itself. Informants included many children and teens who were expected to inform on the activities of their parents and teachers, so that no citizen of the East German state could expect privacy from government snooping in any aspect of their lives.

This knowledge allowed the secret police and the government media to coerce the "appropriate" decisions from all citizens on the important aspects of political and economic life. East German citizens were afraid to express opinions or take actions that the government would find offensive, so they toed the party line or suffered serious consequences. Government in a police state first strips its citizens of privacy so that it may exert controlling influence on the large and small decisions of its citizens. Complete destruction of privacy leads to coercion on personal choices.

This ability to influence personal choices need not be so dramatic as to destroy your privacy. For example, a company that knows much about your private choices can influence your future choices. An apparently benign example of this influence is the subtle pull of Amazon.com's recommendations after you make a purchase. You bought a book about kite-flying and then you are presented with a list of similar books on the same topic that might appeal to you. Have you considered the new music by that singer whose previous three sets of mp3s are in your collection? Amazon fully expects that it will be rewarded for making these suggestions by your purchase of additional items from its store.


THE ROLE OF DATA IN LOSS OF PRIVACY

Two practices made possible by technology are data mining and Big Data. Data mining systematically gathers information, while Big Data involves the prediction of trends based on that data.


Data Mining: Your Privacy Is the Mine

An invasive example of data mining is the story reported in the New York Times in 2011 about discount department store Target's use of data mining to increase sales. The Times reported that Target had discovered that one of the few points in a person's life in which she is open to overhauling her shopping habits is after the birth of a baby, and Target realized that, because the birth of a baby is a public announcement, many companies attempted to influence shopping habits at this time. Target decided to try to learn when its customers were pregnant, so it could make an advanced play for that crucial baby business, breaking customers away from shopping at smaller stores for discrete items and moving them into shopping at Target for all of their needs. The store hired statisticians who identified several items, such as prenatal vitamins and purses big enough to hold diapers, that women purchased when they were pregnant. Target then sent coupons to those identified mothers-to-be to encourage them to increase Target purchases.


(Continues...)

Excerpted from Privacy in the Age of Big Data by Theresa M. Payton, Theodore Claypoole. Copyright © 2014 Rowman & Littlefield. Excerpted by permission of ROWMAN & LITTLEFIELD.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Table of Contents

Introduction: Your Life on Technology

Chapter 1. The Intersection of Privacy, Law and Technology

Section I: Your Computer and the Internet

Chapter 2. Your Computer is Watching You

Chapter 3. How the Government Follows Your Electronic Tracks

Chapter 4. Criminals and Snoops

Chapter 5. Just Hanging Out Online

Chapter 6. The Spy in Your Pocket

Section II: Risk in the Streets

Chapter 7. Cameras Everywhere

Chapter 8. When Your Car is Just Another Computer

Chapter 9. When Your Own Body Gives You Away

Chapter 10. DNA and Health Records

Section III: Home is Where the Heart (of Surveillance) Is

Chapter 11. Home Sweet Home: Spies in Your Living Room

Chapter 12. Risks of Computer and Phone Networks

Section IV: Where Do We Go from Here?

Chapter 13. Reality Meets the Metaverse Plus

Chapter 14. Judging You by Your Data

Chapter 15. The Future of Technology and Privacy

Chapter 16. Laws and Regulations That Could Help Preserve Privacy

Index

About the Authors

From the B&N Reads Blog

Customer Reviews