Unauthorized Access The Crisis in Online Privacy and Security
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Taylor & Francis
2014
|
Subjects: | |
Online Access: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | oapen_2024_20_500_12657_41680 | ||
005 | 20200921 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20200921s2014 xx |||||o ||| 0|eng d | ||
020 | |a b15148 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.1201/b15148 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UMK |2 bicssc | |
072 | 7 | |a UNF |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a URY |2 bicssc | |
100 | 1 | |a Sloan, Robert H. |4 auth | |
700 | 1 | |a Warner, Richard |4 auth | |
245 | 1 | 0 | |a Unauthorized Access |b The Crisis in Online Privacy and Security |
260 | |b Taylor & Francis |c 2014 | ||
300 | |a 1 electronic resource (398 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. | ||
540 | |a Creative Commons |f by-nc-nd/4.0 |2 cc |4 http://creativecommons.org/licenses/by-nc-nd/4.0 | ||
546 | |a English | ||
650 | 7 | |a Games development & programming |2 bicssc | |
650 | 7 | |a Data mining |2 bicssc | |
650 | 7 | |a Computer security |2 bicssc | |
650 | 7 | |a Data encryption |2 bicssc | |
653 | |a CHOICE Highly Recommended Title | ||
653 | |a Data Preparation and Mining | ||
653 | |a IT Security | ||
653 | |a Cryptology | ||
653 | |a InfoSECURITY | ||
653 | |a SCI-TECH | ||
653 | |a COMPUTERSCIENCE | ||
653 | |a ITECH | ||
653 | |a INFORMATIONSCIENCE | ||
653 | |a STM | ||
653 | |a deep | ||
653 | |a defense | ||
653 | |a inspection | ||
653 | |a malware | ||
653 | |a norm | ||
653 | |a optimal | ||
653 | |a packet | ||
653 | |a perfect | ||
653 | |a software | ||
653 | |a vulnerabilities | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/id/906cfc99-bd16-4f41-9abe-bebdd5832d68/9781439830147.pdf |7 0 |z OAPEN Library: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/handle/20.500.12657/41680 |7 0 |z OAPEN Library: description of the publication |