Security and law: legal and ethical aspects of public security, cyber security and critical Iinfrastructure security
Security and law against the backdrop of technological development. Few people doubt the importance of the security of a state, its society and its organizations, institutions and individuals, as an unconditional basis for personal and societal flourishing. Equally, few people would deny being conce...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Intersentia
2019
|
Schlagworte: | |
Online-Zugang: | BSB01 UBG01 Volltext |
Zusammenfassung: | Security and law against the backdrop of technological development. Few people doubt the importance of the security of a state, its society and its organizations, institutions and individuals, as an unconditional basis for personal and societal flourishing. Equally, few people would deny being concerned by the often occurring conflicts between security and other values and fundamental freedoms and rights, such as individual autonomy or privacy for example. While the search for a balance between these public values is far from new, ICT and data-driven technologies have undoubtedly given it a new impulse. These technologies have a complicated and multifarious relationship with security. This book combines theoretical discussions of the concepts at stake and case studies following the relevant developments of ICT and data-driven technologies. Part I sets the scene by considering definitions of security. Part II questions whether and, if so, to what extent the law has been able to regulate the use of ICT and data-driven technologies as a means to maintain, protect or raise security, in search of a balance between security and other public values, such as privacy and equality. Part III investigates the regulatory means that can be leveraged by the law-maker in attempts to secure products, organizations or entities in a technological and multiactor environment. Lastly, Part IV, discusses typical international and national aspects of ICT, security and the law |
Beschreibung: | Title from publisher's bibliographic system (viewed on 27 Jan 2020) |
Beschreibung: | 1 Online-Ressource (xv, 365 Seiten) |
ISBN: | 9781780688909 |
DOI: | 10.1017/9781780688909 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046442056 | ||
003 | DE-604 | ||
005 | 20200515 | ||
007 | cr|uuu---uuuuu | ||
008 | 200226s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781780688909 |c Online |9 978-1-78068-890-9 | ||
024 | 7 | |a 10.1017/9781780688909 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781780688909 | ||
035 | |a (OCoLC)1142736883 | ||
035 | |a (DE-599)BVBBV046442056 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-473 | ||
082 | 0 | |a 345/.0268 | |
245 | 1 | 0 | |a Security and law |b legal and ethical aspects of public security, cyber security and critical Iinfrastructure security |c Anton Vedder, Jessica Schroers, Charlotte Ducuing, Peggy Valcke (eds.) |
264 | 1 | |a Cambridge |b Intersentia |c 2019 | |
300 | |a 1 Online-Ressource (xv, 365 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 27 Jan 2020) | ||
520 | |a Security and law against the backdrop of technological development. Few people doubt the importance of the security of a state, its society and its organizations, institutions and individuals, as an unconditional basis for personal and societal flourishing. Equally, few people would deny being concerned by the often occurring conflicts between security and other values and fundamental freedoms and rights, such as individual autonomy or privacy for example. While the search for a balance between these public values is far from new, ICT and data-driven technologies have undoubtedly given it a new impulse. These technologies have a complicated and multifarious relationship with security. This book combines theoretical discussions of the concepts at stake and case studies following the relevant developments of ICT and data-driven technologies. Part I sets the scene by considering definitions of security. Part II questions whether and, if so, to what extent the law has been able to regulate the use of ICT and data-driven technologies as a means to maintain, protect or raise security, in search of a balance between security and other public values, such as privacy and equality. Part III investigates the regulatory means that can be leveraged by the law-maker in attempts to secure products, organizations or entities in a technological and multiactor environment. Lastly, Part IV, discusses typical international and national aspects of ICT, security and the law | ||
650 | 4 | |a Computer security / Law and legislation | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Vedder, Anton |d ca. 20./21. Jh. |0 (DE-588)1205401105 |4 edt | |
700 | 1 | |a Valcke, Peggy |d 1973- |0 (DE-588)1203155409 |4 edt | |
700 | 1 | |a Ducuing, Charlotte |d ca. 20./21. Jh. |0 (DE-588)1205402950 |4 edt | |
700 | 1 | |a Schroers, Jessica |d ca. 20./21. Jh. |0 (DE-588)1205402578 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-78068-889-3 |
856 | 4 | 0 | |u https://doi.org/10.1017/9781780688909 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031854092 | ||
966 | e | |u https://doi.org/10.1017/9781780688909 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/9781780688909 |l UBG01 |p ZDB-20-CBO |q UBG_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181001562226688 |
---|---|
any_adam_object | |
author2 | Vedder, Anton ca. 20./21. Jh Valcke, Peggy 1973- Ducuing, Charlotte ca. 20./21. Jh Schroers, Jessica ca. 20./21. Jh |
author2_role | edt edt edt edt |
author2_variant | a v av p v pv c d cd j s js |
author_GND | (DE-588)1205401105 (DE-588)1203155409 (DE-588)1205402950 (DE-588)1205402578 |
author_facet | Vedder, Anton ca. 20./21. Jh Valcke, Peggy 1973- Ducuing, Charlotte ca. 20./21. Jh Schroers, Jessica ca. 20./21. Jh |
building | Verbundindex |
bvnumber | BV046442056 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9781780688909 (OCoLC)1142736883 (DE-599)BVBBV046442056 |
dewey-full | 345/.0268 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 345 - Criminal law |
dewey-raw | 345/.0268 |
dewey-search | 345/.0268 |
dewey-sort | 3345 3268 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
doi_str_mv | 10.1017/9781780688909 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03654nmm a2200505zc 4500</leader><controlfield tag="001">BV046442056</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200515 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200226s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780688909</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-78068-890-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/9781780688909</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781780688909</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1142736883</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046442056</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">345/.0268</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and law</subfield><subfield code="b">legal and ethical aspects of public security, cyber security and critical Iinfrastructure security</subfield><subfield code="c">Anton Vedder, Jessica Schroers, Charlotte Ducuing, Peggy Valcke (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Intersentia</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 365 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 27 Jan 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security and law against the backdrop of technological development. Few people doubt the importance of the security of a state, its society and its organizations, institutions and individuals, as an unconditional basis for personal and societal flourishing. Equally, few people would deny being concerned by the often occurring conflicts between security and other values and fundamental freedoms and rights, such as individual autonomy or privacy for example. While the search for a balance between these public values is far from new, ICT and data-driven technologies have undoubtedly given it a new impulse. These technologies have a complicated and multifarious relationship with security. This book combines theoretical discussions of the concepts at stake and case studies following the relevant developments of ICT and data-driven technologies. Part I sets the scene by considering definitions of security. Part II questions whether and, if so, to what extent the law has been able to regulate the use of ICT and data-driven technologies as a means to maintain, protect or raise security, in search of a balance between security and other public values, such as privacy and equality. Part III investigates the regulatory means that can be leveraged by the law-maker in attempts to secure products, organizations or entities in a technological and multiactor environment. Lastly, Part IV, discusses typical international and national aspects of ICT, security and the law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Law and legislation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vedder, Anton</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="0">(DE-588)1205401105</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Valcke, Peggy</subfield><subfield code="d">1973-</subfield><subfield code="0">(DE-588)1203155409</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ducuing, Charlotte</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="0">(DE-588)1205402950</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schroers, Jessica</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="0">(DE-588)1205402578</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-78068-889-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/9781780688909</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031854092</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781780688909</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781780688909</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBG_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046442056 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:44:43Z |
institution | BVB |
isbn | 9781780688909 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031854092 |
oclc_num | 1142736883 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG |
owner_facet | DE-12 DE-473 DE-BY-UBG |
physical | 1 Online-Ressource (xv, 365 Seiten) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO UBG_PDA_CBO |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Intersentia |
record_format | marc |
spelling | Security and law legal and ethical aspects of public security, cyber security and critical Iinfrastructure security Anton Vedder, Jessica Schroers, Charlotte Ducuing, Peggy Valcke (eds.) Cambridge Intersentia 2019 1 Online-Ressource (xv, 365 Seiten) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 27 Jan 2020) Security and law against the backdrop of technological development. Few people doubt the importance of the security of a state, its society and its organizations, institutions and individuals, as an unconditional basis for personal and societal flourishing. Equally, few people would deny being concerned by the often occurring conflicts between security and other values and fundamental freedoms and rights, such as individual autonomy or privacy for example. While the search for a balance between these public values is far from new, ICT and data-driven technologies have undoubtedly given it a new impulse. These technologies have a complicated and multifarious relationship with security. This book combines theoretical discussions of the concepts at stake and case studies following the relevant developments of ICT and data-driven technologies. Part I sets the scene by considering definitions of security. Part II questions whether and, if so, to what extent the law has been able to regulate the use of ICT and data-driven technologies as a means to maintain, protect or raise security, in search of a balance between security and other public values, such as privacy and equality. Part III investigates the regulatory means that can be leveraged by the law-maker in attempts to secure products, organizations or entities in a technological and multiactor environment. Lastly, Part IV, discusses typical international and national aspects of ICT, security and the law Computer security / Law and legislation Computersicherheit (DE-588)4274324-2 gnd rswk-swf Recht (DE-588)4048737-4 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Informationstechnik (DE-588)4026926-7 s Recht (DE-588)4048737-4 s DE-604 Vedder, Anton ca. 20./21. Jh. (DE-588)1205401105 edt Valcke, Peggy 1973- (DE-588)1203155409 edt Ducuing, Charlotte ca. 20./21. Jh. (DE-588)1205402950 edt Schroers, Jessica ca. 20./21. Jh. (DE-588)1205402578 edt Erscheint auch als Druck-Ausgabe 978-1-78068-889-3 https://doi.org/10.1017/9781780688909 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security and law legal and ethical aspects of public security, cyber security and critical Iinfrastructure security Computer security / Law and legislation Computersicherheit (DE-588)4274324-2 gnd Recht (DE-588)4048737-4 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4048737-4 (DE-588)4026926-7 |
title | Security and law legal and ethical aspects of public security, cyber security and critical Iinfrastructure security |
title_auth | Security and law legal and ethical aspects of public security, cyber security and critical Iinfrastructure security |
title_exact_search | Security and law legal and ethical aspects of public security, cyber security and critical Iinfrastructure security |
title_full | Security and law legal and ethical aspects of public security, cyber security and critical Iinfrastructure security Anton Vedder, Jessica Schroers, Charlotte Ducuing, Peggy Valcke (eds.) |
title_fullStr | Security and law legal and ethical aspects of public security, cyber security and critical Iinfrastructure security Anton Vedder, Jessica Schroers, Charlotte Ducuing, Peggy Valcke (eds.) |
title_full_unstemmed | Security and law legal and ethical aspects of public security, cyber security and critical Iinfrastructure security Anton Vedder, Jessica Schroers, Charlotte Ducuing, Peggy Valcke (eds.) |
title_short | Security and law |
title_sort | security and law legal and ethical aspects of public security cyber security and critical iinfrastructure security |
title_sub | legal and ethical aspects of public security, cyber security and critical Iinfrastructure security |
topic | Computer security / Law and legislation Computersicherheit (DE-588)4274324-2 gnd Recht (DE-588)4048737-4 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | Computer security / Law and legislation Computersicherheit Recht Informationstechnik |
url | https://doi.org/10.1017/9781780688909 |
work_keys_str_mv | AT vedderanton securityandlawlegalandethicalaspectsofpublicsecuritycybersecurityandcriticaliinfrastructuresecurity AT valckepeggy securityandlawlegalandethicalaspectsofpublicsecuritycybersecurityandcriticaliinfrastructuresecurity AT ducuingcharlotte securityandlawlegalandethicalaspectsofpublicsecuritycybersecurityandcriticaliinfrastructuresecurity AT schroersjessica securityandlawlegalandethicalaspectsofpublicsecuritycybersecurityandcriticaliinfrastructuresecurity |