Regulating cyber technologies: privacy vs security
"Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber-world. New technologi...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New Jersey ; London ; Singapore ; Beijing ; Shanghai ; Hong Kong ; Taipei ; Chennai ; Tokyo
World Scientific
[2023]
|
Schlagworte: | |
Online-Zugang: | DE-706 Volltext |
Zusammenfassung: | "Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber-world. New technologies are generating both privacy and security issues involving anonymity, cross border transactions, virtual communications and assets, among others. This book is a collection of works by experts on cyber matters and legal considerations that need addressing in a timely manner. It comprises cross-disciplinary knowledge that is pooled to this end. Risk mitigation tools, including cyber risk management, data protection regulations, as well as ethical practice guidelines are reviewed in detail. The regulatory issues associated with new technologies along with emergent challenges in the field of cybersecurity that require improved regulatory frameworks are considered. We probe ethical, material, and enforcement threats, thus revealing the inadequacy of current legal practices. To address these shortcomings, we propose new regulatory privacy and security guidelines that can be implemented to deal with the new technologies and cyber matters" |
Beschreibung: | 1 Online-Ressource (XXXI, 344 Seiten) Illustration |
ISBN: | 9781800612860 |
DOI: | 10.1142/q0379 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049805819 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240801s2023 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781800612860 |9 9781800612860 | ||
024 | 7 | |a 10.1142/q0379 |2 doi | |
035 | |a (ZDB-124-WOP)9781800612860 | ||
035 | |a (OCoLC)1450746838 | ||
035 | |a (DE-599)BVBBV049805819 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-706 | ||
082 | 0 | |a 005.8 | |
245 | 1 | 0 | |a Regulating cyber technologies |b privacy vs security |c editor Nathalie Rébé |
264 | 1 | |a New Jersey ; London ; Singapore ; Beijing ; Shanghai ; Hong Kong ; Taipei ; Chennai ; Tokyo |b World Scientific |c [2023] | |
300 | |a 1 Online-Ressource (XXXI, 344 Seiten) |b Illustration | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a "Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber-world. New technologies are generating both privacy and security issues involving anonymity, cross border transactions, virtual communications and assets, among others. This book is a collection of works by experts on cyber matters and legal considerations that need addressing in a timely manner. It comprises cross-disciplinary knowledge that is pooled to this end. Risk mitigation tools, including cyber risk management, data protection regulations, as well as ethical practice guidelines are reviewed in detail. The regulatory issues associated with new technologies along with emergent challenges in the field of cybersecurity that require improved regulatory frameworks are considered. We probe ethical, material, and enforcement threats, thus revealing the inadequacy of current legal practices. To address these shortcomings, we propose new regulatory privacy and security guidelines that can be implemented to deal with the new technologies and cyber matters" | |
653 | 0 | |a Information technology / Management | |
653 | 0 | |a Computer security | |
653 | 0 | |a Database security | |
653 | 0 | |a Computer networks / Security measures | |
700 | 1 | |a Rébé, Nathalie |0 (DE-588)1202973825 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80061-285-3 |
856 | 4 | 0 | |u https://doi.org/10.1142/q0379 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-124-WOP | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035146326 | |
966 | e | |u https://doi.org/10.1142/q0379 |l DE-706 |p ZDB-124-WOP |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1806596456774107136 |
---|---|
adam_text | |
any_adam_object | |
author2 | Rébé, Nathalie |
author2_role | edt |
author2_variant | n r nr |
author_GND | (DE-588)1202973825 |
author_facet | Rébé, Nathalie |
building | Verbundindex |
bvnumber | BV049805819 |
collection | ZDB-124-WOP |
ctrlnum | (ZDB-124-WOP)9781800612860 (OCoLC)1450746838 (DE-599)BVBBV049805819 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1142/q0379 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV049805819</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240801s2023 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800612860</subfield><subfield code="9">9781800612860</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1142/q0379</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-124-WOP)9781800612860</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1450746838</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049805819</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Regulating cyber technologies</subfield><subfield code="b">privacy vs security</subfield><subfield code="c">editor Nathalie Rébé</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Jersey ; London ; Singapore ; Beijing ; Shanghai ; Hong Kong ; Taipei ; Chennai ; Tokyo</subfield><subfield code="b">World Scientific</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXXI, 344 Seiten)</subfield><subfield code="b">Illustration</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber-world. New technologies are generating both privacy and security issues involving anonymity, cross border transactions, virtual communications and assets, among others. This book is a collection of works by experts on cyber matters and legal considerations that need addressing in a timely manner. It comprises cross-disciplinary knowledge that is pooled to this end. Risk mitigation tools, including cyber risk management, data protection regulations, as well as ethical practice guidelines are reviewed in detail. The regulatory issues associated with new technologies along with emergent challenges in the field of cybersecurity that require improved regulatory frameworks are considered. We probe ethical, material, and enforcement threats, thus revealing the inadequacy of current legal practices. To address these shortcomings, we propose new regulatory privacy and security guidelines that can be implemented to deal with the new technologies and cyber matters"</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information technology / Management</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rébé, Nathalie</subfield><subfield code="0">(DE-588)1202973825</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80061-285-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1142/q0379</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-124-WOP</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035146326</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1142/q0379</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-124-WOP</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049805819 |
illustrated | Not Illustrated |
indexdate | 2024-08-06T00:37:20Z |
institution | BVB |
isbn | 9781800612860 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035146326 |
oclc_num | 1450746838 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XXXI, 344 Seiten) Illustration |
psigel | ZDB-124-WOP |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | World Scientific |
record_format | marc |
spelling | Regulating cyber technologies privacy vs security editor Nathalie Rébé New Jersey ; London ; Singapore ; Beijing ; Shanghai ; Hong Kong ; Taipei ; Chennai ; Tokyo World Scientific [2023] 1 Online-Ressource (XXXI, 344 Seiten) Illustration txt rdacontent c rdamedia cr rdacarrier "Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber-world. New technologies are generating both privacy and security issues involving anonymity, cross border transactions, virtual communications and assets, among others. This book is a collection of works by experts on cyber matters and legal considerations that need addressing in a timely manner. It comprises cross-disciplinary knowledge that is pooled to this end. Risk mitigation tools, including cyber risk management, data protection regulations, as well as ethical practice guidelines are reviewed in detail. The regulatory issues associated with new technologies along with emergent challenges in the field of cybersecurity that require improved regulatory frameworks are considered. We probe ethical, material, and enforcement threats, thus revealing the inadequacy of current legal practices. To address these shortcomings, we propose new regulatory privacy and security guidelines that can be implemented to deal with the new technologies and cyber matters" Information technology / Management Computer security Database security Computer networks / Security measures Rébé, Nathalie (DE-588)1202973825 edt Erscheint auch als Druck-Ausgabe 978-1-80061-285-3 https://doi.org/10.1142/q0379 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Regulating cyber technologies privacy vs security |
title | Regulating cyber technologies privacy vs security |
title_auth | Regulating cyber technologies privacy vs security |
title_exact_search | Regulating cyber technologies privacy vs security |
title_full | Regulating cyber technologies privacy vs security editor Nathalie Rébé |
title_fullStr | Regulating cyber technologies privacy vs security editor Nathalie Rébé |
title_full_unstemmed | Regulating cyber technologies privacy vs security editor Nathalie Rébé |
title_short | Regulating cyber technologies |
title_sort | regulating cyber technologies privacy vs security |
title_sub | privacy vs security |
url | https://doi.org/10.1142/q0379 |
work_keys_str_mv | AT rebenathalie regulatingcybertechnologiesprivacyvssecurity |