Cover Image
市場調查報告書

Stratecast的機密:NSA的巨量資料對市場的影響,全球通訊市場

Stratecast Confidential: The Impact of the NSA on the Big Data Market -- and Global Communications

出版商 Frost & Sullivan 商品編碼 299045
出版日期 內容資訊 英文 14 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
Stratecast的機密:NSA的巨量資料對市場的影響,全球通訊市場 Stratecast Confidential: The Impact of the NSA on the Big Data Market -- and Global Communications
出版日期: 2014年04月08日 內容資訊: 英文 14 Pages
簡介

本報告提供美國的國家安全局(NSA)/中央安全署(CSS)進軍巨量資料領域的相關研究、過程、問題點及影響要素相關驗證,為您概述為以下內容。

摘要整理

簡介

與美國進行電子通訊時,交給NSA資料嗎?以相當的概率:是

  • NSA通訊網路侵入
  • NSA監視線上活動(信用卡交易)
  • NSA資料攔截

「不是內容,只是元資料」?NSA的加密破解

Google自NSA保護用戶的可能性,但非自願的

  • Google應用程式間無意的資料共享
  • Google強化電子郵件的加密

美國的法律措施抑制NSA行動的可能性

隱私掌握關鍵,維持和平和隱私

技術掌握關鍵,否則在政府的管理下

打擊威脅,還是扼殺美國經濟?

彙整

圖表

目錄
Product Code: 9A37-00-11-00-00

This report analyzes privacy issues surrounding the NSA, how they appear similar to those found in other sectors, and how lessons learned in one area may potentially benefit, or at least inform, other areas in pursuit of an equitable balance between the need to know and the right to privacy.

Table of Contents

Executive Summary

Introduction

When You Communicate Electronically in the U.S., Are You Handing Your Data Over to the NSA? Quite Possibly: Yes

  • NSA Taps into Communications Networks
  • NSA Monitors Online Activity Including Credit Card Transactions
  • NSA Data Snoops Even Flock to Angry Birds

"Not Content; Just Metadata"? NSA Encryption-cracking Suggests Otherwise

Google May Be Protecting Users from the NSA, but Not from Itself

  • Users Face Law of Unintended Data-sharing Consequences among Google Apps
  • On the Other Hand: Google Enhances Email Encryption, which Could Thwart the NSA

U.S. Legislative Action Could Curb the NSA's Actions...but When?

Differential Privacy May Hold Answers to Keeping the Peace and Privacy, Too

Technology May Hold the Key-or Run Aground on Government Control

Could Clamping Down on Threats Squeeze the Life Out of the U.S. Economy?

The Last Word

List of Figures

  • Figure 1: The NSA Now Has Access to Most Electronic Communications in the U.S.
  • Figure 2: Competing Interests Threaten Privacy in Various Contexts
Back to Top