Unauthorized access: the crisis in online privacy and security
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton [u.a.]
CRC Press
2013
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXIII, 374 S. Ill. |
ISBN: | 9781439830130 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041186501 | ||
003 | DE-604 | ||
005 | 20131118 | ||
007 | t | ||
008 | 130725s2013 a||| |||| 00||| eng d | ||
020 | |a 9781439830130 |c pbk |9 9781-4398-3013-0 | ||
035 | |a (OCoLC)859374217 | ||
035 | |a (DE-599)BVBBV041186501 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M382 | ||
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Sloan, Robert H. |e Verfasser |0 (DE-588)1041857918 |4 aut | |
245 | 1 | 0 | |a Unauthorized access |b the crisis in online privacy and security |c Robert H. Sloan ; Richard Warner |
264 | 1 | |a Boca Raton [u.a.] |b CRC Press |c 2013 | |
300 | |a XXIII, 374 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Internet / Moral and ethical aspects | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Ethik | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Warner, Richard |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026161672&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026161672 |
Datensatz im Suchindex
_version_ | 1804150605334183936 |
---|---|
adam_text | Contents
at a Glance
Preface,
xix
Acknowledgments,
xxi
Authors,
xxiii
Снлгпк!
■
Introduction
G
JAI
Tf. K
2
m
An Explanation of the Internet, Computers,
and Data Mining
13
Сі ілі
TIR
3 .
Norms and Markets
53
CHA!
T Ľ R
4 .
Informational Privacy: The General Theory
75
Chai
T
1:
R
5 -
Informational Privacy: Norms and Value
Optimality
95
Chai
THR
6 -
Software Vulnerabilities and the Low-Priced
Software Norm
125
Chai
TFK
7 .
Software Vulnerabilities: Creating
Best Practices
157
Chai
ТЕК
8 ■
Computers and Networks: Attack
and Defense
181
Chai
TER
9 -
Malware,
Norms, and ISPs
221
vi
■ Contents
at a Glance
AľTľk
10 - Malware:
Creating a Best Practices Norm
251
Смлітгк
11 >
Tracking, Contracting, and Behavioral
Advertising
273
Снлртгк
12 .
From One-Sided Chicken to Value Optimal
Norms
303
INDEX,
355
Contents
Preface,
xix
Acknowledgments,
xxi
Authors,
xxiii
Chapter
1 -
Introduction
1
INTRODUCTION
1
THE GOOD, THE BAD, AND THE IN BETWEEN
2
The Good
2
The Bad
2
The In Between
3
MAKING TRADE-OFFS
4
VALUES
7
Profit-Motive-Driven Businesses
8
POLITICS
9
TODAY AND TOMORROW: WEB
1.0, 2.0, 3.0 10
A LOOK AHEAD
11
NOTES AND REFERENCES
11
FURTHER READING
12
Chapter
2 -
An Explanation of the Internet, Computers,
____________
and Data Mining
_____________________________13
INTRODUCTION
13
PRIMER ON THE INTERNET
13
History
15
vii
viii
■ Contents
Nature
of the Internet: Packet-Switched Network
17
Knd-to-End Principle and the Stupid Network
19
A More Technical View
22
Horizontal View: One Home s LAN to the Backbone
22
Vertical View: Internet Protocol Suite
24
Internet Layer
25
Transport Layer
26
Application Layer
28
I low
t
lie Layers Work
loget
lier:
Packet Encapsulation
28
Numerical Addresses to Names: DNS
30
Putting It All
Loget
her
30
PRIMHK ON COMPUTERS
Л
Basic Elements of a Computer
33
Operating Systems
38
PRIMER ON DATA, DATABASES, AND DATA MINING
40
Data and Their Representation
40
Databases
43
Information Extraction or Data Mining
43
NOTES AND REFERENCES
48
FURTHER READING
49
Chapter
3 ■
Norms and Markets
53
INTRODUCTION
53
NORMS DEFINED
53
The Examples
53
The Definition
54
Why People Conform to Norms
54
Ought or Self-Interest?
55
How Do Norms Get Started?
55
COORDINATION NORMS
56
Examples
56
Definition of a Coordination Norm
58
Contents ■ ix
Conformity to Coordination Norms
58
Self-Perpetuating Inappropriate Norms
59
VALUE OPTIMAL NORMS
59
Justification and Optimality
59
Lack of Value Optimality: An Example
60
Why Does Value Optimality Matter?
61
A Terminological Point and an Example
61
We Are Playing without a Helmet
61
Inappropriate Norms versus No Norms
62
NORMS AND MARKETS
63
Detecting Norm Violations
64
Norm-Violation Detectors versus Norm-Inconsistent Sellers
65
Sellers Inability to Discriminate
65
The Profit-Maximizing Strategy
65
Perfect Competition
66
Perfect Competition or Close to It Will Force Sellers
Compliance
67
NORMS AND GAME THEORY
67
Coordination Problems
68
Equilibria
70
Value Optimality
71
NOTES AND REFERENCES
72
FURTHER READING
73
Chapter
4 -
Informational Privacy: The General Theory
75
INTRODUCTION
75
PERSONALLY IDENTIFIABLE: A DISTINCTION WITHOUT
(MUCH OF) A DIFFERENCE
76
THE REQUIREMENT OF FREE AND INFORMED CONSENT
78
PROBLEMS WITH NOTICE AND CHOICE
79
Notice and Choice Does Not Ensure Informed Consent
80
Notice and Choice Cannot Possibly Ensure Informed Consent
80
Notice and Choice Aims at the Wrong Target
81
x
■ Contents
INFORMATIONAL NORMS
82
Role-Appropriate Informational Norms as Coordination
Norms
84
ENSURING FREE AND INFORMED CONSENT
86
Informed Consent
86
Free Consent
87
Ihe Argument
Ihat
Consent Is Not Free
87
Rad
in s Requirements Almost Fulfilled
88
But What about Contracts?
89
THE IDEAL OF NORM COMPLETENESS
89
Two Ways
ti) Fall
Short
90
1
low Norms Can Cease to Be Value Optimal
90
NOTES AND REFERENCES
91
FURTHER READING
92
Chapter
5 ■
Informational Privacy: Norms and Value
Optimally
95
INTRODUCTION
95
DIRECT MARKETING: RETAILERS AS INFORMATION
BROKERS
96
Retailers as Information Brokers
97
Role-Appropriate Information Processing Norms
98
Retailers as Information Brokers Norm
99
The Norm Is Not Value Optimal
100
An Objection
101
A Consequence
102
INFORMATION AGGREGATORS
103
The Current Norm and Its Problems
106
Beyond Lack of Control
107
THE HEALTH INSURANCE INDUSTRY
107
The Norm
108
The Health Insurance Norm Is Not Value Optimal
109
Contents ■ xi
MORE EXAMPLES
109
Cookies
110
Cookies and Targeted Advertising 111
The Resort to the Illusion of Consent
112
Cloud Computing
113
Unresolved Questions and the Resort to Notice and Choice
115
Social Networking Sites
115
Blurring the Line
117
More Blurring of the Line
118
lhe
Resort to Notice and Choice
119
COLLABORATE OR RESIST?
119
NOTES AND REFERENCES
120
FURTHER READING
122
Chapter
6 -
Software Vulnerabilities and the Low-Priced
Software Norm
125
INTRODUCTION
125
WHAT BUYERS DEMAND
126
Vulnerability-Exacerbating Features of the Software Market
127
Negative Externality and Ways to Cure It
129
STRICT LIABILITY
130
NEGLIGENCE
132
Vulnerability-Reducing Practices for Software Development
134
Negligence Liability Will Not Lead to Adoption of Better
Practices
135
Why Developers Must Know How Much to Invest in
Reducing Vulnerabilities
137
Consequences of Not Knowing How Much to Invest in
Vulnerability Reduction
137
PRODUCT LIABILITY FOR DEFECTIVE DESIGN
138
THE STATUTORY ALTERNATIVE
139
WE ARE TRAPPED AND ONLY LEGAL REGULATION WILL
RELEASE US
139
xii ■ Contents
THREE EXAMPLES CDF VALUE OPTIMAL PRODUCT-RISK
NORMS
141
lhe
Fitness Norm
141
The Negligent Design/Manufacture Norm
142
lhe
Best Loss-Avoider Norm
145
A Key Feature: Norm-Implemented Trade-
oí
Гѕ
145
TLIE
LOW-PRICED SOFTWARE NORM
146
Fitness, Negligent Design/Manufacture, and Best Loss
Avoider
147
Ihe Low-Priced Software Norm Is Not Value Optimal
149
WE NEED TO CREATE A VALUE OPTIMAL NORM BUT
WHAT SHOULD IT BE?
150
NOTES AND REFERENCES
15
I
FURTHER READING
152
Сплртьк
7 >
Software Vulnerabilities: Creating Best
Practices
157
INTRODUCTION
157
BEST PRACTICES DEFINED
157
BEST PRACTICES FOR SOFTWARE DEVELOPMENT
160
To Some Extent : An Important Qualification
161
CREATING THE BEST PRACTICES SOFTWARE NORM
162
Defining Best Practices
165
Statutory and Regulatory Options for Defining Best
Practices
166
Norm Creation in Ideal Markets
168
Real-Wo rid Markets: Lack of Market Power, No Barriers to
Entry or Exit, and Zero Transaction Costs
169
Five out of Six
170
The Perfect Information Barrier
170
NORM CREATION IN REAL MARKETS
171
What Markets Should We Regulate?
173
Should We Worry about a Lemons Market?
175
Contents ■ xiii
UNAUTHORIZED
ACCESS:
BEYOND
SOFTWARE
VULNERABILITIES
177
NOTES
AND REFERENCES
177
FURTHER READING
178
Chapter
8 -
Computers and Networks: Attack and
____________
Defense
____________________________________
1_81_
INTRODUCTION
181
TYPES OF DOORS
182
Gates (Outermost Doors)
183
Doors into Our Computers
184
Unintended Doors
185
Zero-Day Attacks
186
The CIA Triad
186
ATTACKS ON AVAILABILITY
187
ATTACKING CONFIDENTIALITY: HANGING OUT IN THE
NEIGHBORHOOD
189
Packet Sniffing
190
Session Hijacking
191
ATTACKS ON AUTHENTICATION
192
Password Cracking
193
ATTACKS ON INTEGRITY
194
Secret Doors
194
Unintended Doors: Software and Hardware Vulnerabilities
195
Unwanted Doors: Web Server Vulnerabilities
196
Doors We Are Tricked into Opening
201
MULTIPLYING, ELIMINATING, AND LOCKING DOORS
206
Multiplying Doors
207
Eliminating Doors
207
Locking Doors
208
POSTING GUARDS
209
Authentication
210
Firewalls
210
xiv ■
С
ontonts
Intrusion Detection and Prevention Services
213
LOCKING AND GUARDING DOORS IS
MARD
AND WE
DO A I OOK JOB
214
Unlocked Doors We
Doni
Know About
214
Doors We Don t Realize We Should Lock
215
Limitations on Guards
215
SHOULD
ISľS
LOCK DOORS AND (I IKK
CRLDLNLIAI S^
2 17
NOILS AND Rl
Ił KINCLS
217
I
URLI
HR
Rl
ADING. 2
ľ)
Οιλιίικ ()
■
Malwarc Norms, and ISPs
221
INTRODUCTION
221
A MAI WAR! DLLIN1T1ON
222
Malware
and Lack of Consent
223
Doni
We Just Mean Illegal,
orat
Least Harmful?
224
Making Kspecially Objectionable More Precise
225
Are Tracking Cookies Mahvare?
227
THE
MALWARE ZOO 228
Viruses and Worms
229
Trojans
231
Rootkits
231
Bots
and Botnets
233
Spyware
235
The Latest Trend
235
WHY END-USER DEFENSES ARE SO WEAK
236
The Limits of Detection
236
Poor Use of Poor Tools
237
The ISP Alternative
239
THE END-USER-LOCATED
ANTIVIRUS NORM 240
Importance of Network Neutrality
241
Home-User-Located Antimalware Defense Is Not Value
Optimal
242
Contents ■ xv
FIRE PREVENTION AND PUBLIC HEALTH
243
COMPARE
MALWARE 244
IS BETTER PROTECTION WORTH VIOLATING NETWORK
NEUTRALITY?
245
The Risk to Privacy
245
The Risk to Free Expression
246
THE VALUE OPTIMAL NORM SOLUTION
247
NOTES AND REFERENCES
247
FURTHER READING
249
Chapter
10 . Malware:
Creating a Best Practices Norm
251
INTRODUCTION
251
CURRENT BEST PRACTICES FOR ISP
MALWARE
DEFENSE
251
Sample Current Technical Best Practices
252
The Other Categories of ISP (Best?) Practices
256
Why Current Best Practices Are Not All That We Need
257
AN ADDITIONAL WRINKLE: THE DEFINITION OF
MALWARE
IS NOT FULLY SETTLED
260
DEFINING COMPREHENSIVE BEST PRACTICES
261
Definitional Issues
261
CREATING THE NORM
262
Norm Creation in Perfectly Competitive Markets
262
No Market Power, No Entry/Exit Barriers, and No
Transaction Costs
264
The Perfect Knowledge Barrier
264
NORM CREATION IN REAL MARKETS
265
No Worry about Lemons Market
266
THE END-TO-END AND NETWORK NEUTRALITY
PRINCIPLES
267
HAS OUR FOCUS BEEN TOO NARROW?
268
WAS OUR FOCUS TOO NARROW IN ANOTHER WAY?
270
NOTES AND REFERENCES
270
FURTHER READING
272
xvi ■
Contents
Chapter
11 -
Tracking, Contracting, and Behavioral
Advertising
273
INTRODUCTION
273
BEHAVIORAL ADVERTISING AND THE ONLINE
ADVERTISING ECOSYSTEM
275
HOW WEBSITES GAIN INFORMATION ABOUT YOU:
STRAIGHTFORWARD METHODS
277
You Identify Yourself Using a Login ID
277
Websites Know Your IP Number
278
Cookies: A Deeper Dive into the Technology
279
Making a Signature 1 out of Browser, OS, Fonts Installed, etc.
283
OTHER WAYS OF GETTING YOUR ONLINE
INFORMATION
284
WHAT IS WRONG WITH BEHAVIORAL ADVERTISING?
285
Lack of Choice for Buyers
285
Acquiescence via Contract
286
Fixing What Is Broken
287
THE SECOND-ORDER CONTRACTUAL NORM
288
Compatibility
290
Are We Right?
292
HOW THE NORM ARISES IN IDEAL MARKETS
293
REAL MARKETS: HOW THE COORDINATION NORM
ARISES
294
Buyers
294
Sellers
296
How Contracting Can Go Wrong
298
THE LACK OF CONSENT TO PAY-WITH-DATA
EXCHANGES
298
NOTES AND REFERENCES
300
FURTHER READING
301
Chapter
12 >
From One-Sided Chicken to Value Optimal
Norms
303
INTRODUCTION
303
Contents ■ xvii
CHICKEN WITH CARS
303
THE PAY-WITH-DATA GAME OF ONE-SIDED CHICKEN
305
Buyers Preferences
306
Sellers Preferences
307
One-Sided Chicken
308
Escaping One-Sided Chicken
308
NORM CREATION IN PERFECTLY COMPETITIVE
MARKETS
309
Approximation
lo
Perfect Competition in Pay-with-Data
Exchanges
309
Approximation
tí)
Perfect Information in the Real World
312
NORM CREATION IN THE REAL MARKET
313
Buyers Will Use Blocking Technologies
313
Advertising Revenue Will Decline
314
Sellers Will Conform More Closely to Buyers Preferences
314
Norms? Yes. Value Optimal? Yes, but.
.. 315
DOES FACEBOOK PLAY ONE-SIDED CHICKEN?
316
As Goes Facebook, So Goes Google?
317
DO-NOT-TRACK INITIATIVES
318
MORE BUYER POWER APPROACHES TO NORM
GENERATION
320
Mobile Apps
320
Cloud Computing
322
Summary of Our Norm-Generation Strategies So Far
322
TWO VERSIONS OF THE BEST PRACTICES STATUTE
APPROACH
323
PRISONER S DILEMMA
325
Information Aggregators
325
A Classic Prisoner s Dilemma
326
Prisoner s Dilemma for Business Buyers
328
How Many Players Are in This Game Anyway?
329
Trust and Commitment
331
xviii ■ Contents
THE NEED FOR TRUST
334
Retailers as Information Brokers
334
Health Insurance
337
Kmployer Hiring
338
Beyond Buying and Selling
339
IF WE FAIL TO CREATE NORMS
340
THE BIG DATA FUTURE
341
APPENDIX:
A CÌAME
THEORETIC ANALYSIS OF
FACEBOOK S PRIVACY SETTINGS
344
NOTES AND REFERENCES
349
FURTHER READING
352
INDEX, 35.S
|
any_adam_object | 1 |
author | Sloan, Robert H. Warner, Richard |
author_GND | (DE-588)1041857918 |
author_facet | Sloan, Robert H. Warner, Richard |
author_role | aut aut |
author_sort | Sloan, Robert H. |
author_variant | r h s rh rhs r w rw |
building | Verbundindex |
bvnumber | BV041186501 |
classification_rvk | SR 850 ST 277 |
ctrlnum | (OCoLC)859374217 (DE-599)BVBBV041186501 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01707nam a2200433 c 4500</leader><controlfield tag="001">BV041186501</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131118 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130725s2013 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439830130</subfield><subfield code="c">pbk</subfield><subfield code="9">9781-4398-3013-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859374217</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041186501</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M382</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sloan, Robert H.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1041857918</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Unauthorized access</subfield><subfield code="b">the crisis in online privacy and security</subfield><subfield code="c">Robert H. Sloan ; Richard Warner</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIII, 374 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Warner, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026161672&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026161672</subfield></datafield></record></collection> |
id | DE-604.BV041186501 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:41:35Z |
institution | BVB |
isbn | 9781439830130 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026161672 |
oclc_num | 859374217 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M382 |
owner_facet | DE-473 DE-BY-UBG DE-M382 |
physical | XXIII, 374 S. Ill. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | CRC Press |
record_format | marc |
spelling | Sloan, Robert H. Verfasser (DE-588)1041857918 aut Unauthorized access the crisis in online privacy and security Robert H. Sloan ; Richard Warner Boca Raton [u.a.] CRC Press 2013 XXIII, 374 S. Ill. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Internet / Moral and ethical aspects Privacy, Right of Computer security Data protection Ethik Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s DE-604 Warner, Richard Verfasser aut Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026161672&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Sloan, Robert H. Warner, Richard Unauthorized access the crisis in online privacy and security Internet / Moral and ethical aspects Privacy, Right of Computer security Data protection Ethik Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011134-9 |
title | Unauthorized access the crisis in online privacy and security |
title_auth | Unauthorized access the crisis in online privacy and security |
title_exact_search | Unauthorized access the crisis in online privacy and security |
title_full | Unauthorized access the crisis in online privacy and security Robert H. Sloan ; Richard Warner |
title_fullStr | Unauthorized access the crisis in online privacy and security Robert H. Sloan ; Richard Warner |
title_full_unstemmed | Unauthorized access the crisis in online privacy and security Robert H. Sloan ; Richard Warner |
title_short | Unauthorized access |
title_sort | unauthorized access the crisis in online privacy and security |
title_sub | the crisis in online privacy and security |
topic | Internet / Moral and ethical aspects Privacy, Right of Computer security Data protection Ethik Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Internet / Moral and ethical aspects Privacy, Right of Computer security Data protection Ethik Computersicherheit Datenschutz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026161672&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT sloanroberth unauthorizedaccessthecrisisinonlineprivacyandsecurity AT warnerrichard unauthorizedaccessthecrisisinonlineprivacyandsecurity |