Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Database Nation (Hardback)

Buy
Database Nation (Hardback), 9781565926530 (1565926536), O'Reilly, 2000
Forget the common cold for a moment. Instead, consider the rise of "false data syndrome," a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like "data shadow" and "datasphere" in Database Nation, offering a decidedly unappealing scenario of how we have overlooked privacy with the advent of advanced technology.

According to Garfinkel, "technology is not privacy neutral." It leaves us with only two choices: 1) allow our personal data to rest in the public domain or 2) become hermits (no credit cards, no midnight video jaunts--you get the point).

Garfinkel's thoroughly researched and example-rich text explores the history of identification procedures; the computerization of ID systems; how and where data is collected, tracked, and stored; and the laws that protect privacy. He also explains who owns, manipulates, ensures the safety of, and manages the vast amount of data that makes up our collective human infrastructure. The big surprise here? It's not the United States government who controls or manages the majority of this data but rather faceless corporations who trade your purchasing habits, social security numbers, and other personal information just like any other hot commodity.

There's a heck of a lot of data to digest about data here and only a smidgen of humor to counterbalance the weight of Garfinkel's projections. But then again, humor isn't really appropriate in connection with stolen identities; medical, bank, and insurance record exploitation; or the potential for a future that's a "video surveillance free-for-all."

In many information-horrific situations, Garfinkel explores the wide variety of data thievery and the future implications of larger, longer-lasting databases. "Citizens," Garfinkel theorizes, "don't know how to fight back even though we know our privacy is at risk." In a case study involving an insurance claim form, he explains how a short paragraph can grant "blanket authorization" to all personal (not just medical) records to an insurance company. Citizens who refuse to sign the consent paragraph typically must forfeit any reimbursement for medical services. Ultimately, "we do not have the choice [as consumers] either to negotiate or to strike our own deal."

This book is more than simply a journalistic summary of the current state of privacy rights and violations. It is a call to arms. Forty years ago, unbridled technology attacked our environment--and few people seemed to know or care. With the publication of "Silent Spring" in 1962, Rachel Carson opened our eyes. Her graphic depiction of the ecological and health ravages brought by technology made many people realize the risks as never before. Today, our environment still imperils us, but things are better than they might have been, and we have a population that's informed and, in many cases, activist.

This book pleads the case for privacy in the same way. There is much that can be done with, not in spite of, technology. An aware public is the first step. It is our hope that this book will open the public's eyes to the many intrusions on our privacy before it is too late.

(HTML tags aren't allowed.)

Mobile Internetworking with IPv6: Concepts, Principles and Practices
Mobile Internetworking with IPv6: Concepts, Principles and Practices
Internet access and mobility continue to change our perception of communications and computing. We are becoming more dependent on both, as can be seen by the continued proliferation of mobile telephones, personal digital assistants (PDAs), and laptop computers. Improvements in miniaturization and higher-speed communications media are creating an...
Mining of Massive Datasets
Mining of Massive Datasets
This book evolved from material developed over several years by Anand Rajaraman and Jeff Ullman for a one-quarter course at Stanford. The course CS345A, titled “Web Mining,” was designed as an advanced graduate course, although it has become accessible and interesting to advanced undergraduates.

The popularity of...

Artificial General Intelligence (Cognitive Technologies)
Artificial General Intelligence (Cognitive Technologies)

This is the first book on current research on artificial general intelligence (AGI), work explicitly focused on engineering general intelligence – autonomous, self-reflective, self-improving, commonsensical intelligence. Each author explains a specific aspect of AGI in detail in each chapter, while also investigating the common themes in...


The Universal Book of Mathematics: From Abracadabra to Zeno's Paradoxes
The Universal Book of Mathematics: From Abracadabra to Zeno's Paradoxes

What makes a number weird, and why, as far as anyone can tell, aren’t weird numbers odd? What do monsters, moonshine, and 24-dimensional oranges have in common? Why couldn’t Sam Loyd get a patent for his famous fifteen puzzle? What is the significance of the statement "the smallest number not nameable in under ten words"?...

Neurosurgery: A Case-Based Approach
Neurosurgery: A Case-Based Approach

This book describes neurosurgical cases following the format of the clinical handover. Each case has a one line summary and differential diagnosis, appropriate interpretation of illustrated radiological studies, further ancillary tests, and management options. When appropriate, scoring/scaling systems and detailed anatomy are...

Bio-MEMS: Technologies and Applications
Bio-MEMS: Technologies and Applications
Microelectromechanical systems (MEMS) are evolving into highly integrated technologies for a variety of application areas. Add the biological dimension to the mix and a host of new problems and issues arise that require a broad understanding of aspects from basic, materials, and medical sciences in addition to engineering. Collecting the efforts of...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy