
Cyber Privacy
Who Has Your Data and Why You Should Care
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $21.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Chloe Cannon
About this listen
We live in an era of unprecedented data aggregation, and it's never been more difficult to navigate the trade-offs between individual privacy, personal convenience, national security, and corporate profits. Technology is evolving quickly, while laws and policies are changing slowly.
You shouldn't have to be a privacy expert to understand what happens to your data. April Falcon Doss, a privacy expert and former NSA and Senate lawyer, has seen this imbalance in action. In Cyber Privacy, Doss demystifies the digital footprints we leave in our daily lives and reveals how our data is being used - sometimes against us - by the private sector, the government, and even our employers and schools. She explains the trends in data science, technology, and the law that impact our everyday privacy. She tackles big questions: how data aggregation undermines personal autonomy, how to measure what privacy is worth, and how society can benefit from big data while managing its risks and being clear-eyed about its cost.
It's high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us.
©2020 April Falcon Doss (P)2020 TantorListeners also enjoyed...
-
The Age of Surveillance Capitalism
- The Fight for a Human Future at the New Frontier of Power
- By: Shoshana Zuboff
- Narrated by: Nicol Zanzarella
- Length: 24 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Age of Surveillance Capitalism is neither a hand-wringing narrative of danger and decline nor a digital fairy tale. Rather, it offers a deeply reasoned and evocative examination of the contests over the next chapter of capitalism that will decide the meaning of information civilization in the 21st century. The stark issue at hand is whether we will be the masters of information and machines or its slaves.
-
-
Book Editors failed to trim the word count
- By Todd B on 07-14-19
By: Shoshana Zuboff
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
The Future Is Faster Than You Think
- How Converging Technologies Are Disrupting Business, Industries, and Our Lives
- By: Peter H. Diamandis, Steven Kotler
- Narrated by: Peter H. Diamandis
- Length: 9 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In their book Abundance, best-selling authors and futurists Peter Diamandis and Steven Kotler tackled grand global challenges, such as poverty, hunger, and energy. Then, in Bold, they chronicled the use of exponential technologies that allowed the emergence of powerful new entrepreneurs. Now the best-selling authors are back with The Future Is Faster Than You Think, a blueprint for how our world will change in response to the next 10 years of rapid technological disruption.
-
-
Totally Mixed on This One
- By D. Sooley on 02-03-20
By: Peter H. Diamandis, and others
-
Breached!
- Why Data Security Law Fails and How to Improve It: 1st Edition
- By: Daniel J. Solove, Woodrow Hartzog
- Narrated by: Jim Frangione
- Length: 7 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital connections permeate our lives - and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.
By: Daniel J. Solove, and others
-
Weapons of Math Destruction
- How Big Data Increases Inequality and Threatens Democracy
- By: Cathy O'Neil
- Narrated by: Cathy O'Neil
- Length: 6 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
We live in the age of the algorithm. Increasingly, the decisions that affect our lives—where we go to school, whether we can get a job or a loan, how much we pay for health insurance—are being made not by humans, but by machines. In theory, this should lead to greater fairness: Everyone is judged according to the same rules.
-
-
More are US social problems that WMD
- By Laurent Bourgault-Roy on 01-08-17
By: Cathy O'Neil
-
The Age of Surveillance Capitalism
- The Fight for a Human Future at the New Frontier of Power
- By: Shoshana Zuboff
- Narrated by: Nicol Zanzarella
- Length: 24 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Age of Surveillance Capitalism is neither a hand-wringing narrative of danger and decline nor a digital fairy tale. Rather, it offers a deeply reasoned and evocative examination of the contests over the next chapter of capitalism that will decide the meaning of information civilization in the 21st century. The stark issue at hand is whether we will be the masters of information and machines or its slaves.
-
-
Book Editors failed to trim the word count
- By Todd B on 07-14-19
By: Shoshana Zuboff
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- By: Amy B. Zegart
- Narrated by: Amy B. Zegart
- Length: 11 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- By Cameron on 02-01-22
By: Amy B. Zegart
-
The Future Is Faster Than You Think
- How Converging Technologies Are Disrupting Business, Industries, and Our Lives
- By: Peter H. Diamandis, Steven Kotler
- Narrated by: Peter H. Diamandis
- Length: 9 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In their book Abundance, best-selling authors and futurists Peter Diamandis and Steven Kotler tackled grand global challenges, such as poverty, hunger, and energy. Then, in Bold, they chronicled the use of exponential technologies that allowed the emergence of powerful new entrepreneurs. Now the best-selling authors are back with The Future Is Faster Than You Think, a blueprint for how our world will change in response to the next 10 years of rapid technological disruption.
-
-
Totally Mixed on This One
- By D. Sooley on 02-03-20
By: Peter H. Diamandis, and others
-
Breached!
- Why Data Security Law Fails and How to Improve It: 1st Edition
- By: Daniel J. Solove, Woodrow Hartzog
- Narrated by: Jim Frangione
- Length: 7 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Digital connections permeate our lives - and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.
By: Daniel J. Solove, and others
-
Weapons of Math Destruction
- How Big Data Increases Inequality and Threatens Democracy
- By: Cathy O'Neil
- Narrated by: Cathy O'Neil
- Length: 6 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
We live in the age of the algorithm. Increasingly, the decisions that affect our lives—where we go to school, whether we can get a job or a loan, how much we pay for health insurance—are being made not by humans, but by machines. In theory, this should lead to greater fairness: Everyone is judged according to the same rules.
-
-
More are US social problems that WMD
- By Laurent Bourgault-Roy on 01-08-17
By: Cathy O'Neil
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Thomas Rose on 08-08-20
By: Richard A. Clarke, and others
-
Cybersecurity
- The Insights You Need from Harvard Business Review
- By: Harvard Business Review, Alex Blau, Andrew Burt, and others
- Narrated by: Jonathan Todd Ross
- Length: 2 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room.
By: Harvard Business Review, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- By: Glenn Greenwald
- Narrated by: L. J. Ganser
- Length: 9 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- By Alfredo Ramirez on 11-22-14
By: Glenn Greenwald
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- By: Geoff White
- Narrated by: Geoff White
- Length: 8 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
Propagandistic tone
- By Philippe Delteil on 04-17-23
By: Geoff White
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
Genius Makers
- The Mavericks Who Brought AI to Google, Facebook, and the World
- By: Cade Metz
- Narrated by: John Lee
- Length: 9 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
What does it mean to be smart? To be human? What do we really want from life and the intelligence we have, or might create? With deep and exclusive reporting, across hundreds of interviews, New York Times Silicon Valley journalist Cade Metz brings you into the rooms where these questions are being answered. Where an extraordinarily powerful new artificial intelligence has been built into our biggest companies, our social discourse, and our daily lives, with few of us even noticing.
-
-
difficult listen
- By LEE on 03-17-21
By: Cade Metz
People who viewed this also viewed...
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Privacy Is Power
- Why and How You Should Take Back Control of Your Data
- By: Carissa Véliz
- Narrated by: Rachel Perry
- Length: 7 hrs and 26 mins
- Unabridged
-
Overall
-
Performance
-
Story
Governments and hundreds of corporations are spying on you and everyone you know. They're not just selling your data. They're selling the power to influence you and decide for you. Even when you've explicitly asked them not to. Reclaiming privacy is the only way we can regain control of our lives and our societies. These governments and corporations have too much power, and their power stems from us - from our data. Privacy is as collective as it is personal, and it's time to take back control.
-
-
A glimpse into the mind of a big government privacy researcher
- By Marc O on 04-30-24
By: Carissa Véliz
-
Once Upon an Algorithm
- How Stories Explain Computing
- By: Martin Erwig
- Narrated by: Walter Dixon
- Length: 10 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Once Upon an Algorithm, Martin Erwig explains computation as something that takes place beyond electronic computers, and computer science as the study of systematic problem solving. Erwig points out that many daily activities involve problem solving. Getting up in the morning, for example: You get up, take a shower, get dressed, eat breakfast. This simple daily routine solves a recurring problem through a series of well-defined steps. In computer science, such a routine is called an algorithm.
-
-
didn't quite cut it for me
- By Jack Frasier on 08-02-18
By: Martin Erwig
-
A Vulnerable System
- The History of Information Security in the Computer Age
- By: Andrew J. Stewart
- Narrated by: Rick Adamson
- Length: 10 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
-
Would have been a good paper.
- By Mr. Magnanimous on 03-08-25
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- By: Bruce Schneier
- Narrated by: Dan John Miller
- Length: 9 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- By Jeremy on 06-12-15
By: Bruce Schneier
-
Hacking for Dummies, 7th Edition
- By: Kevin Beaver CISSP
- Narrated by: Tom Perkins
- Length: 11 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- By Amazon Customer on 12-25-22
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
Privacy Is Power
- Why and How You Should Take Back Control of Your Data
- By: Carissa Véliz
- Narrated by: Rachel Perry
- Length: 7 hrs and 26 mins
- Unabridged
-
Overall
-
Performance
-
Story
Governments and hundreds of corporations are spying on you and everyone you know. They're not just selling your data. They're selling the power to influence you and decide for you. Even when you've explicitly asked them not to. Reclaiming privacy is the only way we can regain control of our lives and our societies. These governments and corporations have too much power, and their power stems from us - from our data. Privacy is as collective as it is personal, and it's time to take back control.
-
-
A glimpse into the mind of a big government privacy researcher
- By Marc O on 04-30-24
By: Carissa Véliz
-
Once Upon an Algorithm
- How Stories Explain Computing
- By: Martin Erwig
- Narrated by: Walter Dixon
- Length: 10 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Once Upon an Algorithm, Martin Erwig explains computation as something that takes place beyond electronic computers, and computer science as the study of systematic problem solving. Erwig points out that many daily activities involve problem solving. Getting up in the morning, for example: You get up, take a shower, get dressed, eat breakfast. This simple daily routine solves a recurring problem through a series of well-defined steps. In computer science, such a routine is called an algorithm.
-
-
didn't quite cut it for me
- By Jack Frasier on 08-02-18
By: Martin Erwig
-
A Vulnerable System
- The History of Information Security in the Computer Age
- By: Andrew J. Stewart
- Narrated by: Rick Adamson
- Length: 10 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
-
Would have been a good paper.
- By Mr. Magnanimous on 03-08-25
What listeners say about Cyber Privacy
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- 2B Or NoT
- 07-22-23
Data privacy from different angles
if you are in the data privacy field, this is a must for you
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Anonymous User
- 03-03-25
Before you click accept
For those of us who routinely fail to read and consider those too-long and sometimes incomprehensible terms and conditions when installing this week's must-have app, or answering last week's popular online survey, and even more importantly, those of us who don't realize the danger of data aggregation and how it impacts our privacy today, "Cyber Privacy: Who Has Your Data and Why You Should Care" should serve as a wake-up call.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- J.B.
- 02-17-23
Book Worthy of Joe Biden Admin Privacy Ethics
Privacy is a dense topic on the one hand legal, compliance, etc, and squishy on the other hand ethics, politics etc. So when I say, it was a comical read, there is a bit of sarcasm in that comment.
First, it was a treat to realize that April also read the book Writing Creative Nonfiction By: Tilar J J. Mazzeo , The Great Courses, as I did. In the book, Writing Creative Nonfiction, the author discusses how you can essentially look at a picture, or video, extract specific details to support your biases, and dump substantive contextual information so that you can write a story that is "bulletproof" in that no one can say that you lied. April is obviously advanced in creative non-fiction, so it made me smile to hear how she chose to exercise those skills.
April associates every negative example of privacy with "those conservatives", and then dox those "Right Wingers", and then when it comes to the next administration i.e. "barack hussein obama" April doesn't mention that but refers to them as "follow-on administrative bodies" or something similar. You see how I just did that, I mentioned conservatives in the general sense and called out Obama in the specific sense. April can say, well I mentioned the Obama administration's approval of FISA, but she didn't say Obama, and said Bush. (I'm no bush fan either!) Tons of examples like that, on and on salted throughout the creative non-fiction. Well, that is a small glimpse of what April does, but the polar opposite of the names I just named.
I realize I don't do April's creative non-fiction justice with my example, but I'm just trying to give you a sense and flavor of what made me smile.
I kept listening and listing and wondered when April would write the letters S-N-O-W-D-E-N, as in Edward Snowden, the guy who exposed you and the NSA and all of their illegal survivance methods against US Citizens and the World at large. Not a peep, lol. If you are an NSA agent and writing a book on privacy and don't have SNOWDEN in the first chapter, almost all privacy street cred is in the toilet lol smh... It was just before the chapter when April goes TDS on us (those that would actually read/listen to this book haha), when I was thinking I'm going to bet that April is a high appointment in the Biden administration; everything points to that in the book. As if the book was part of April's career launch at the expense of basic human morals. Sure enough, she went TDS, so funny and predictable, which kept reinforcing my hunch. I later checked her current creds... General Counsel of NSA, L-M-A-0!!!
Again, nice creative non-fiction. There are very serious topics referenced in the book, and the performance was good, but April's Privacy Street Cred is an "empty star", not even one star. As of this review, Members of the European Parliament do not want to extend the adequacy decision to the U.S., urging the rejection of it. In layman's terms, The EU knows about NSA and doesn't think EU citizens should be spied on. US citizens should think about that. April, you are the reason why the EU doesnt' have trust in the US privacy!
You have all of the ambitions of lucifer, with fewer principles. The spin of this book makes me dizzy! You are the reason we need privacy! A Book Worthy of Joe Biden Admin Privacy Ethics.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
1 person found this helpful