Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Data and Goliath : the hidden battles to capture your data and control your world
Schneier B., W. W. Norton & Co., Inc., New York, NY, 2015. 320 pp. Type: Book (978-0-393244-81-6)
Date Reviewed: Jun 17 2015

On a daily basis, we produce a huge amount of data by using laptops, mobile phones, or any other computer-based systems. The book’s scary title is no exaggeration. It covers the most interesting case studies on the use of our data by governments, marketing companies, and any corporation we interact with either as customers or as users, for surveillance and monitoring. This trend, as stated by the author, has been assisted by the decline in the costs of surveillance technology and storage media.

As examples, companies such as Google and Microsoft, which in the past were storing only metadata (such as email headers, sender, recipient, and so on) pertaining to our communications, are now storing whole messages. This makes it easy to build an extremely accurate profile of anyone using online technologies. Many of the online services we use don’t consult their customers, and the latter are therefore not aware that their data is being collected and analyzed.

Data and Goliath is a collection of 16 chapters divided into three parts. Part 1 discusses the rise in the amount of produced data as a result of using technology. It also discusses the emergence of the business of control. Part 2 covers the main concerns over surveillance and exposes a set of real case studies. In Part 3, the author presents a set of best practices in order to counter this systematic collection of our data for surveillance use. In my opinion, although this list of countermeasures is useful, most of them relate to political activism. I believe that we need more concrete solutions in order to block surveillance and protect our data. Proper research on data obfuscation mechanisms is of primordial importance if we don’t want to drown in Orwell’s 1984 world.

The case studies are very well documented. Schneier’s support for freedom and the right for privacy are quite apparent. The writing style is very light, and the book is interesting. I would highly recommend this book, along with a few other titles [1,2,3], to anyone wanting to discover the real world we live in.

More reviews about this item: Amazon, Goodreads, Slashdot

Reviewer:  Ghita Kouadri Review #: CR143535 (1509-0778)
1) Goodman, M. Future crimes: a journey to the dark side of technology - and how to survive it. Doubleday, New York, NY, 2015.
2) Angwin, J. Dragnet nation: a quest for privacy, security, and freedom in a world of relentless surveillance (reprint ed.). Times Books, New York, NY, 2014.
3) Brooke, H. The silent state: secrets, surveillance and the myth of British democracy. Windmill Books, London, UK, 2011.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Organizational Impacts (K.4.3 )
 
 
Privacy (K.4.1 ... )
 
 
Public Policy Issues (K.4.1 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Organizational Impacts": Date
Enterprise networking
Grenier R., Metes G., Digital Press, Newton, MA, 1992. Type: Book (9781555580742)
Sep 1 1992
Managing computer impact: an international study of management and organizations
Bjo ., Eason K., Robey D., Ablex Publishing Corp., Norwood, NJ, 1986. Type: Book (9789780893913588)
Dec 1 1987
Computing and organizations: what we know and what we don’t know
Attewell P., Rule J. Communications of the ACM 27(12): 1184-1192, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy