000 | 04198cam a2200505 i 4500 | ||
---|---|---|---|
001 | 22643843 | ||
003 | BJBSDDR | ||
005 | 20250613183834.0 | ||
006 | a|||||r|||| 00| 0 | ||
007 | ta | ||
008 | 220609s2023 nyu rb 001 0 eng | ||
010 | _a 2022024271 | ||
020 |
_a9780197620502 _q(hardback) |
||
020 | _a9780197620519 | ||
020 |
_z9780197620526 _q(epub) |
||
020 | _a9780197620533 | ||
040 |
_aDLC _beng _erda _cDLC _dDLC |
||
041 | _aeng | ||
042 | _apcc | ||
043 |
_aa-cc--- _an-us--- |
||
050 | 0 | 0 |
_aHD30.3815 _b.K65 2023 |
082 | 0 | 0 |
_a323.44/80951 _223/eng/20220907 |
100 | 1 |
_aKokas, Aynne, _d1979- _942709 |
|
245 | 1 | 0 |
_aTrafficking data : _bhow China is winning the battle for digital sovereignty / _cAynne Kokas. |
264 | 1 |
_aNew York, NY : _bOxford University Press, _c[2023] |
|
300 |
_axx, 335 pages ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | _aContenidos : The Data Trafficking Dilemma – What data trafficking is and why it matters. Fragmented US Oversight – Weak U.S. regulation enables data exposure. China's Data Governance – How China asserts control over digital data. Networking Sovereignty – Chinese tech expansion in the U.S. Social Media – Algorithms as tools of state power. Gaming – Cross-border data flows through virtual games. Money – Financial tech and data vulnerabilities. Health – Risks in biotech and health data. Home – Consumer devices leaking private data. Toward Data Stabilization – Proposals to manage digital sovereignty. | ||
520 |
_a"Trafficking Data argues that the movement of human data across borders for political and financial gain is disenfranchising consumers, eroding national autonomy, and destabilizing sovereignty. Focusing on the United States and China, it traces how US government leadership failures, Silicon Valley's disruption fetish, and Wall Street's addiction to growth have yielded an unprecedented opportunity for Chinese firms to gather data in the United States and quietly send it back to China, and by extension, the Chinese government. Such "data trafficking," as the book names this insidious phenomenon, is enabled by the competing governance models of the world's two largest economies: mass government data aggregation in China and impenetrable corporate data management policies in the United States. China is stepping up its data trafficking efforts through national regulations, soft power persuasion, and tech investment, extending the scope of state control over domestic and international data and tech infrastructure, and thereby expanding its global influence. The United States, by contrast, is retreating from participation in foreign alliances, international organizations, and the systemic regulation of the tech industry-practices with the potential to counter data trafficking. Confronting data trafficking as the defining international competition of the twenty-first century, this book ultimately advocates for an alternative future of data stabilization. To stem data trafficking and stabilize data flows, it shows, policymakers can synthesize tools from across the private sector, public sector, multi-national organizations, and consumers to protect users, secure national sovereignty, and establish valuable international standards"-- _cProvided by publisher. |
||
650 | 0 |
_aData mining _zChina. |
|
650 | 0 |
_aData sovereignty _zUnited States. |
|
650 | 0 | _aData privacy. | |
650 | 0 |
_aBusiness intelligence _zChina. |
|
650 | 0 |
_aPersonal information management _xPolitical aspects _zChina. |
|
650 | 0 |
_aDisclosure of information _zUnited States. |
|
653 | _aData trafficking. | ||
776 | 0 | 8 |
_iOnline version: _aKokas, Aynne, 1979- _tTrafficking data _dNew York : Oxford University Press, 2023 _z9780197620519 _w(DLC) 2022024272 |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _n0 _cBK |
||
946 | _iLLH | ||
999 |
_c123867 _d123867 |