Unauthorized Access The Crisis in Online Privacy and Security

Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-...

Full description

Saved in:
Bibliographic Details
Main Author: Sloan, Robert H. (auth)
Other Authors: Warner, Richard (auth)
Format: Electronic Book Chapter
Language:English
Published: Taylor & Francis 2014
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_41680
005 20200921
003 oapen
006 m o d
007 cr|mn|---annan
008 20200921s2014 xx |||||o ||| 0|eng d
020 |a b15148 
040 |a oapen  |c oapen 
024 7 |a 10.1201/b15148  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UMK  |2 bicssc 
072 7 |a UNF  |2 bicssc 
072 7 |a UR  |2 bicssc 
072 7 |a URY  |2 bicssc 
100 1 |a Sloan, Robert H.  |4 auth 
700 1 |a Warner, Richard  |4 auth 
245 1 0 |a Unauthorized Access  |b The Crisis in Online Privacy and Security 
260 |b Taylor & Francis  |c 2014 
300 |a 1 electronic resource (398 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. 
540 |a Creative Commons  |f by-nc-nd/4.0  |2 cc  |4 http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a English 
650 7 |a Games development & programming  |2 bicssc 
650 7 |a Data mining  |2 bicssc 
650 7 |a Computer security  |2 bicssc 
650 7 |a Data encryption  |2 bicssc 
653 |a CHOICE Highly Recommended Title 
653 |a Data Preparation and Mining 
653 |a IT Security 
653 |a Cryptology 
653 |a InfoSECURITY 
653 |a SCI-TECH 
653 |a COMPUTERSCIENCE 
653 |a ITECH 
653 |a INFORMATIONSCIENCE 
653 |a STM 
653 |a deep 
653 |a defense 
653 |a inspection 
653 |a malware 
653 |a norm 
653 |a optimal 
653 |a packet 
653 |a perfect 
653 |a software 
653 |a vulnerabilities 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/906cfc99-bd16-4f41-9abe-bebdd5832d68/9781439830147.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/handle/20.500.12657/41680  |7 0  |z OAPEN Library: description of the publication