Jump to ratings and reviews
Rate this book

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family

Rate this book
A thorough update to a classic in the field of privacy and big data. We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet. The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people’s sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year. People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end. These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of “contactless everything” became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don’t know how. The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future. While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven’t in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.

368 pages, Hardcover

First published January 1, 2014

28 people are currently reading
520 people want to read

About the author

Theresa M. Payton

3 books6 followers
Theresa is the daughter of a U.S. Marine and considers the United States her hometown. She was born in Jacksonville, Florida. Theresa has lived on the East Coast, the West Coast, and Hawaii and has called Charlotte home since 1995.

A proud graduate of Immaculata University, Theresa had a double major in Economics and Business Administration with a certification in Computers. Theresa graduated from Immaculata with honors in 1989 and went on to the University of Virginia to earn her Master of Science in Management Information Systems and completed that in 1990. She was in the first graduating class for this masters degree. Theresa earned her certificate in Graduate Banking studies from The Graduate School of Banking at LSU in 1997. She is also a certified Black Belt in Six Sigma.

Theresa caught the technology bug while still in high school doing a stint in computer support during the holiday season at the Quantico Marine Corps Exchange. After graduate school, she worked at Barnett Banks, Inc which is now a part of Bank of America and realized quickly that customers needed convenience while keeping their confidential banking information safe. She also worked in technology roles supporting customers at First Union which is now a part of Wells Fargo and at Bank of America. Most recently she was the Chief Information Officer for President George W. Bush. Theresa was the first woman to hold the position of CIO at the White House. She has a cybersecurity consulting practice.

Theresa was recently honored with the 2009 Charlotte Women in Business award from the Charlotte Business Journal. She also found serving the country while working at the White House a true honor.

She is a former recipient of other regional awards including Charlotte's 40 Under 40, Five Outstanding North Carolinians, Ten Outstanding Young Charlotteans, and Charlotte's Woman of the Year.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
25 (22%)
4 stars
37 (33%)
3 stars
31 (27%)
2 stars
14 (12%)
1 star
5 (4%)
Displaying 1 - 12 of 12 reviews
Profile Image for Jon.
390 reviews
January 4, 2015
I'm fairly well versed in security and I like security books. I don't know how to say something nice about this book. Maybe I can just say that the book has credentialed authors, and the random collection of sentences within are well footnoted. The structure, the editing, and the writing are all on equal footing, and it succeeds as a collection of unedited notes.

This is a complete waste of time.

Examples:
p. 64: Mentions a U of Maryland sorority sister who used a bunch of "F-bombs" in an email. It then says that she will have some work to do to reestablish her online reputation and polish her brand. It makes no mention that the email went viral and was even subject to a celebrity read by Michael Shannon. This was a sort of a key part of the example that would've made the paragraph make sense.

p. unknown: It goes on about how all information you put online is being put into databases and tracked, and then mentions, almost as a drunken afterthought, that it's essential to build and maintain an extensive online presence.

P. 91 (and others): This book is FULL of random, pointless interviews, such as page 91, which goes on for two pages about a mother tracking her daughter's phone and getting caught by the daughter. This is a two sentence point. Tell your kids you're tracking them. There is no need for an interview with a random person about nothing. You don't need to explain the cheese sandwich to me. Just put "CHEESE SANDWICH" on the menu.

p. 81 (Uh, what? quote of the day): "If you want a simple way to use email without worrying about snooping, just give up and assume that all of your emails will be snooped on." Is this a security book? Would the 15 year old who wrote this please come down to the office? We need to discuss pgp and email encryption before we deep dive into the basics of sentence structure.


p 224. "In February 2013, University of Pittsburgh researcher Andrew Schwartz's years of brain research paid off, as surgeons implanted four microchips in a paralyzed patient's brain that translate her brain's signals into movement in robotic equipment, so that she can feed herself ice cream through brain signals sent to a robotic arm."

Again, teen ghost writer, this sentence doesn't say what I think the author wants it to say.

If I didn't already immensely dislike this book, interspersed within the nonsense are more random, pointless quotes than an old school BBS.

While I do think that people should read more about potential security threats, I can't recommend that they read this version of them. Please read something else.
Profile Image for Sue Scheff.
12 reviews4 followers
January 31, 2014
I sincerely loved this book. Most tech book can be a bit difficult to understand - however this book is very "user-friendly" and is a topic that we ALL need to know about! From ages 8-80 - everyone needs to be concerned about their privacy, and the fact that big businesses are using data mining to predict our shopping habits (online and off) can not only be intrusive, it is frightening.

Fact is -this is our evolving world. We can't change it, we need to embrace it and learn as much as we can to protect ourselves and our family.

I highly recommend this book.
Profile Image for Lynda.
174 reviews
March 10, 2015
What is privacy exactly? What does it mean in today's highly connected world? Does it need redefining? How do we balance security against privacy? Perhaps we are all concerned about this issue but are we sufficiently educated on it and taking any active steps to address our concerns? First step, read this book. Second, what specific areas in the book caught your attention? I bet there's at least 2-3 things to implement right away to better enhance your privacy. Lastly, get educated on your relevant state's privacy laws. US Federal law on privacy is slim: "...the United States is content to allow its regulation with regard to privacy drift with the winds of business, protecting the most obviously vulnerable data and leaving the rest uncovered." Hmm, ok, but that doesn't mean we can't all take a more active role in shaping public policy on privacy. Start with your local district official. And why does the EU have more stringent privacy laws than the US? Of course after reading it I felt that the authors' well-articulated explanation should have been obvious to me.
Profile Image for Claire Binkley.
2,303 reviews17 followers
August 2, 2020
While paging through, I thought this book was probably on a little on the "too old" side for being a technology book - I thought that you had to keep those fewer than five years old. This is six. It is Copyright 2014, and today is 2 August 2020.

HOWEVER, the first time through, I read 48% of the authors' ideas.
It's on the edge, so I think it's okay to remain in the stacks for a little while longer...

This basically tells you to "opt-out" of various adware through your antivirus program.
It has a few other interesting ideas, as well.

Then, I felt guilty and finished the rest of the book, which honestly does have some riveting brand-new stuff I never saw before.
(I mean, it mostly is the normal wise password advice laced with how criminals can get at you through email, but it never hurts to get told that again!)
Why don't you have a look, too?
32 reviews
Read
December 21, 2019
Definitely an important book for anyone using technology. This book contains great information about who has access to your data, from governments to businesses to cyber criminals, how this data can be used to help you or hurt you, and what you can do to protect yourself. Written in consumer language, this book is simple enough for the average, non-techie to understand.
Profile Image for Lynn.
565 reviews17 followers
September 21, 2015
One of the best books on this topic I've read - it explains, in simple language and without being unduly alarming, how the legal protections we have against invasion of our privacy have failed to keep up with technology, and that this leaves us increasingly powerless to protect ourselves from intrusion not only by government and law enforcement but also by corporations and even private citizens who have no moral right to know where we go, who we see and what goes on even in our own homes. Basic strategies are suggested to help us defend ourselves, but the authors clearly feel that the only *real* hope we have of limiting access to our deepest secrets and resources is in making our government establish legal restrictions on who can keep track of our views, habits, and relationships.
3 reviews5 followers
February 1, 2015
This practical book lays out clearly all the ways that we are being digitally tracked at the present, and all the ways we are likely to be tracked in the very near future at the Internet of Things develops more fully. The book provides practical ways that we can protect ourselves from this tracking, including behavioral changes, technology solutions, and advocated for legislative changes. Anyone who wants to reduce the size of his or her digital footprint would benefit from reading this book.
Profile Image for River.
147 reviews
July 26, 2014
This book was a decent introduction to the concept of privacy in the digital era. It explains various privacy issues and debates as they relate to phones, the internet, and biometrics. It's quite broad and tackles a lot of topics, but does so while maintaining a satisfying amount of detail. It's probably the best book I have read on the topic and largely ignores some more tedious historical and philosophical arguments that other books tend to make.
273 reviews1 follower
April 20, 2015
Definitely worth a read if you embrace modern technology. Wearable technology, home networks, and mobile computing are moving society forward, but you should know the risks. I work in tech and I still got some good information out of this book.
Profile Image for Lisa.
315 reviews22 followers
August 5, 2014
While it is an excellent survey of the topic, if you're interested in privacy and have been keeping up with the topic on the internet, there is little new to you in this book.
Displaying 1 - 12 of 12 reviews

Can't find what you're looking for?

Get help and learn more about the design.