The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
By Courtney Bowman, Ari Gesher, John K Grant and
4/5
()
Currently unavailable
Currently unavailable
About this ebook
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of product functionality, rather than add them late in the development process.
Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures and their foundational components—building blocks that you can combine in many ways. Policymakers, academics, students, and advocates unfamiliar with the technical terrain will learn how these tools can help drive policies to maximize privacy protection.
- Restrict access to data through a variety of application-level controls
- Use security architectures to avoid creating a single point of trust in your systems
- Explore federated architectures that let users retrieve and view data without compromising data security
- Maintain and analyze audit logs as part of comprehensive system oversight
- Examine case studies to learn how these building blocks help solve real problems
- Understand the role and responsibilities of a Privacy Engineer for maintaining your privacy architecture
Courtney Bowman
Courtney Bowman has been working in the data analytics space for the last decade. After earning degrees in Physics and Philosophy at Stanford University, Courtney spent several years at Google working on quantitative analytics, auction design, and pricing strategy, where he developed a strong understanding of the intricacies of data analytics algorithmic implementation and the attendant privacy challenges. Drawing on that background and an appreciation of the need for value-oriented approaches to systems architecture and design in order to ensure privacy protections, Courtney joined Palantir Technologies in 2010 as an in-house Privacy and Civil Liberties specialists. Within that role, he has developed extensive experience working with local and federal government agencies (including law enforcement, criminal justice, health and social services) to develop technology-driven solutions to information sharing and inter-agency cooperation in a manner that respects applicable privacy, security, and data integrity requirements. Courtney is an avid distance runner and cyclist. He resides in New York City with his increasingly unwieldy library of German literature and philosophy.
Related to The Architecture of Privacy
Related ebooks
Python for Microcontrollers: Getting Started with MicroPython Rating: 0 out of 5 stars0 ratingsOpen Source Fuzzing Tools Rating: 0 out of 5 stars0 ratingsInterconnecting Smart Objects with IP: The Next Internet Rating: 5 out of 5 stars5/5Developing Intelligent Agent Systems: A Practical Guide Rating: 3 out of 5 stars3/5Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems Rating: 5 out of 5 stars5/5How to Build a Digital Library Rating: 4 out of 5 stars4/5CompTIA Security+ Certification Study Guide: Exam SY0-201 3E Rating: 0 out of 5 stars0 ratingsSecurity for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts Rating: 4 out of 5 stars4/5Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem Rating: 0 out of 5 stars0 ratingsICT Futures: Delivering Pervasive, Real-time and Secure Services Rating: 0 out of 5 stars0 ratingsDevelopment Research in Practice: The DIME Analytics Data Handbook Rating: 0 out of 5 stars0 ratingsGrid Computing: The Savvy Manager's Guide Rating: 0 out of 5 stars0 ratingsDeveloping Web Information Systems: From Strategy to Implementation Rating: 5 out of 5 stars5/5Mastering Data Warehouse Design: Relational and Dimensional Techniques Rating: 4 out of 5 stars4/5Programming FPGAs: Getting Started with Verilog Rating: 4 out of 5 stars4/5Distributed Systems Security: Issues, Processes and Solutions Rating: 0 out of 5 stars0 ratingsDigital Watermarking and Steganography Rating: 5 out of 5 stars5/5Network Security: Know It All Rating: 4 out of 5 stars4/5CompTIA Linux+ Certification Study Guide (2009 Exam): Exam XK0-003 Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime Rating: 4 out of 5 stars4/5Content Production Technologies Rating: 0 out of 5 stars0 ratingsEarly Computer Science Education – Goals and Success Criteria for Pre-Primary and Primary Education Rating: 0 out of 5 stars0 ratingsFritzing for Inventors: Take Your Electronics Project from Prototype to Product Rating: 0 out of 5 stars0 ratingsProgramming the Photon: Getting Started with the Internet of Things Rating: 5 out of 5 stars5/5IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5Moving To The Cloud: Developing Apps in the New World of Cloud Computing Rating: 3 out of 5 stars3/5Microsoft SQL Server 2005: A Beginner''s Guide Rating: 0 out of 5 stars0 ratingsIntroduction to Business Analytics Using Simulation Rating: 3 out of 5 stars3/5Improving Survey Response: Lessons Learned from the European Social Survey Rating: 0 out of 5 stars0 ratings
Internet & Web For You
More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5Introduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5SEO For Dummies Rating: 4 out of 5 stars4/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsThe Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5Podcasting For Dummies Rating: 4 out of 5 stars4/5How to Destroy Surveillance Capitalism Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow To Start A Podcast Rating: 4 out of 5 stars4/5
Reviews for The Architecture of Privacy
1 rating0 reviews