Computer security, privacy, and politics: current issues, challenges and solutions
"This book offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA [u.a.]
IRM Press
2008
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy"--Provided by publisher. |
Beschreibung: | Includes bibliographical references and index Erscheint: März 2008 |
Beschreibung: | XII, 342 S. graph. Darst. |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023283431 | ||
003 | DE-604 | ||
005 | 20090217 | ||
007 | t | ||
008 | 080429s2008 xxud||| |||| 00||| eng d | ||
010 | |a 2007037717 | ||
020 | |z 9781599048048 |c hbk. |9 978-1-59904-804-8 | ||
035 | |a (OCoLC)171287726 | ||
035 | |a (DE-599)BVBBV023283431 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-703 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Computer security, privacy, and politics |b current issues, challenges and solutions |c Ramesh Subramanian [ed.] |
264 | 1 | |a Hershey, PA [u.a.] |b IRM Press |c 2008 | |
300 | |a XII, 342 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Erscheint: März 2008 | ||
520 | 3 | |a "This book offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy"--Provided by publisher. | |
650 | 4 | |a Politik | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security |x Government policy | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Subramanian, Ramesh B. |e Sonstige |0 (DE-588)121857972 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-59904-806-2 |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016468191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016468191 |
Datensatz im Suchindex
_version_ | 1804137603276996608 |
---|---|
adam_text | Computer
Privacy,
and Politics:
Current Issues, Challenges,
and Solutions
Table of Contents
Preface
..............................................................................................................vi
Section I
Security and Privacy: Global Concepts
Chapter I
Web Privacy: Issues, Legislations and Technological Challenges
Alok Mishra, Atilim University, Turkey
Section II
Privacy, Nations, and Laws
Chapter II
Is It Safe to Talk, Yet? The Evolution of Electronic Privacy Law
............23
John Thomas, Quinnipiac University School of Law, USA
Chapter
IH
Assessing the Impact of Governmental Regulations on the IT Industry:
A Neo
Institutional Theory Perspective
.......................................................36
Sushma Mishra, Virginia Commonwealth University, USA
Amita Goyal Chin, Virginia Commonwealth University, USA
Chapter IV
The Impact of the UK Human Rights Act
1998
on Privacy
Protection in the Workplace
..........................................................................55
Bernd Carsten Stahl, De Montfort
University, UK
Section
III
Privacy and Technology
Chapter V
Privacy Preserving Data Mining: Taxonomy of Existing Techniques
......70
Madhu V. Ahluwalia, University of Maryland, Baltimore County (UMBC),
USA
Aryya Gangopadyay, University of Maryland, Baltimore County (UMBC),
USA
Chapter VI
Rational Concerns about
Biometrie
Technology:
Security and Privacy
.....................................................................................94
Yue Liu, University of Oslo, Norway
Chapter
VII
Business Cases for Privacy-Enhancing Technologies
..............................135
Roger Clarke,
Хатах
Consultancy Pty Ltd., Australia, University
of New South Wales, Australia, Australian National University,
Australia, and University of Hong Kong, Hong Kong
Section IV
Privacy and Organizations
Chapter
VIII
Privacy through Security: Policy and Practice in a
Small-Medium Enterprise
..........................................................................] 57
Ian Allison, The Robert Gordon University, UK
Craig
Str
angwick, ABC Awards Ltd, UK
Chapter IX
Privacy and Security: Where do they fit into the Enterprise
Architecture Framework?
..........................................................................180
Richard V. McCarthy, Quinnipiac University, USA
Martin Grossman, Bridgewater State College, USA
Chapter X
Information Systems Security: A Survey of Canadian Executives
____195
Frederick Ip, Queen s University, Canada
Yolande
E.
Chan, Queen s University, Canada
Section V
Security and Privacy: Emerging Issues
Chapter XI
Emerging Technologies, Emerging Privacy Issues
...................................232
Sue Conger, University of Dallas, USA
Chapter
XII
Digital Democracy: Democracy in the Light of Information and
Communication Technology
.......................................................................271
AnzaAkramA., Management Consultant, USA,
Chapter
XIII
Trust Modeling and Management: From Social Trust to
Digital Trust
.................................................................................................290
Zheng Yon, Nokia Research Center, Finland
SUL· Holtmanns,
Nokia Research Center, Finland
Chapter
XIV
Security, Privacy, and Politics in Higher Education
................................324
Dan
Manson,
California State Polytechnic University, USA
About the Contributors
...............................................................................334
Index
..............................................................................................................340
|
adam_txt |
Computer
Privacy,
and Politics:
Current Issues, Challenges,
and Solutions
Table of Contents
Preface
.vi
Section I
Security and Privacy: Global Concepts
Chapter I
Web Privacy: Issues, Legislations and Technological Challenges
Alok Mishra, Atilim University, Turkey
Section II
Privacy, Nations, and Laws
Chapter II
Is It Safe to Talk, Yet? The Evolution of Electronic Privacy Law
.23
John Thomas, Quinnipiac University School of Law, USA
Chapter
IH
Assessing the Impact of Governmental Regulations on the IT Industry:
A Neo
Institutional Theory Perspective
.36
Sushma Mishra, Virginia Commonwealth University, USA
Amita Goyal Chin, Virginia Commonwealth University, USA
Chapter IV
The Impact of the UK Human Rights Act
1998
on Privacy
Protection in the Workplace
.55
Bernd Carsten Stahl, De Montfort
University, UK
Section
III
Privacy and Technology
Chapter V
Privacy Preserving Data Mining: Taxonomy of Existing Techniques
.70
Madhu V. Ahluwalia, University of Maryland, Baltimore County (UMBC),
USA
Aryya Gangopadyay, University of Maryland, Baltimore County (UMBC),
USA
Chapter VI
Rational Concerns about
Biometrie
Technology:
Security and Privacy
.94
Yue Liu, University of Oslo, Norway
Chapter
VII
Business Cases for Privacy-Enhancing Technologies
.135
Roger Clarke,
Хатах
Consultancy Pty Ltd., Australia, University
of New South Wales, Australia, Australian National University,
Australia, and University of Hong Kong, Hong Kong
Section IV
Privacy and Organizations
Chapter
VIII
Privacy through Security: Policy and Practice in a
Small-Medium Enterprise
.] 57
Ian Allison, The Robert Gordon University, UK
Craig
Str
angwick, ABC Awards Ltd, UK
Chapter IX
Privacy and Security: Where do they fit into the Enterprise
Architecture Framework?
.180
Richard V. McCarthy, Quinnipiac University, USA
Martin Grossman, Bridgewater State College, USA
Chapter X
Information Systems Security: A Survey of Canadian Executives
_195
Frederick Ip, Queen's University, Canada
Yolande
E.
Chan, Queen's University, Canada
Section V
Security and Privacy: Emerging Issues
Chapter XI
Emerging Technologies, Emerging Privacy Issues
.232
Sue Conger, University of Dallas, USA
Chapter
XII
Digital Democracy: Democracy in the Light of Information and
Communication Technology
.271
AnzaAkramA., Management Consultant, USA,
Chapter
XIII
Trust Modeling and Management: From Social Trust to
Digital Trust
.290
Zheng Yon, Nokia Research Center, Finland
SUL· Holtmanns,
Nokia Research Center, Finland
Chapter
XIV
Security, Privacy, and Politics in Higher Education
.324
Dan
Manson,
California State Polytechnic University, USA
About the Contributors
.334
Index
.340 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)121857972 |
building | Verbundindex |
bvnumber | BV023283431 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)171287726 (DE-599)BVBBV023283431 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02217nam a2200469zc 4500</leader><controlfield tag="001">BV023283431</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090217 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080429s2008 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007037717</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781599048048</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-59904-804-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)171287726</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023283431</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security, privacy, and politics</subfield><subfield code="b">current issues, challenges and solutions</subfield><subfield code="c">Ramesh Subramanian [ed.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA [u.a.]</subfield><subfield code="b">IRM Press</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 342 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Erscheint: März 2008</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Government policy</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Subramanian, Ramesh B.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)121857972</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-59904-806-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016468191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016468191</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV023283431 |
illustrated | Illustrated |
index_date | 2024-07-02T20:40:38Z |
indexdate | 2024-07-09T21:14:55Z |
institution | BVB |
language | English |
lccn | 2007037717 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016468191 |
oclc_num | 171287726 |
open_access_boolean | |
owner | DE-12 DE-703 |
owner_facet | DE-12 DE-703 |
physical | XII, 342 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IRM Press |
record_format | marc |
spelling | Computer security, privacy, and politics current issues, challenges and solutions Ramesh Subramanian [ed.] Hershey, PA [u.a.] IRM Press 2008 XII, 342 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Erscheint: März 2008 "This book offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy"--Provided by publisher. Politik Computer security Computer networks Security measures Computer security Government policy Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Subramanian, Ramesh B. Sonstige (DE-588)121857972 oth Erscheint auch als Online-Ausgabe 978-1-59904-806-2 Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016468191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computer security, privacy, and politics current issues, challenges and solutions Politik Computer security Computer networks Security measures Computer security Government policy Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4143413-4 |
title | Computer security, privacy, and politics current issues, challenges and solutions |
title_auth | Computer security, privacy, and politics current issues, challenges and solutions |
title_exact_search | Computer security, privacy, and politics current issues, challenges and solutions |
title_exact_search_txtP | Computer security, privacy, and politics current issues, challenges and solutions |
title_full | Computer security, privacy, and politics current issues, challenges and solutions Ramesh Subramanian [ed.] |
title_fullStr | Computer security, privacy, and politics current issues, challenges and solutions Ramesh Subramanian [ed.] |
title_full_unstemmed | Computer security, privacy, and politics current issues, challenges and solutions Ramesh Subramanian [ed.] |
title_short | Computer security, privacy, and politics |
title_sort | computer security privacy and politics current issues challenges and solutions |
title_sub | current issues, challenges and solutions |
topic | Politik Computer security Computer networks Security measures Computer security Government policy Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Politik Computer security Computer networks Security measures Computer security Government policy Computersicherheit Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016468191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT subramanianrameshb computersecurityprivacyandpoliticscurrentissueschallengesandsolutions |