Skip to Content
How Personal & Internet Security Work
book

How Personal & Internet Security Work

by Preston Gralla
May 2006
Beginner
288 pages
2h 32m
English
Que
Content preview from How Personal & Internet Security Work

Chapter 20. The Dangers of Data Mining

The Dangers of Data Mining

To live in a modern society is to leave digital traces of yourself with almost every action you take. Buy a meal at a restaurant? You probably paid for it with your credit card. Take out a library book? There’s a record of it in a database. Get born? That gets entered into a database as well. Whether you buy a car, visit a bank, make a phone call, or do any of many commonplace tasks, a record of that transaction exists somewhere.

Businesses see gold in that data about you and hundreds of millions of other Americans, and the government sees ways it believes it can better protect its citizens.

But the information ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses

Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses

Andy Walker
Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 0789735539Purchase book