Handbook of research on cyber law, data protection, and privacy:
"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privacy...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2022.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privacy" |
Beschreibung: | 30 PDFs (390 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799886433 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00272191 | ||
003 | IGIG | ||
005 | 20220408134413.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 220409s2022 pau fob 001 0 eng d | ||
020 | |a 9781799886433 |q PDF | ||
020 | |z 9781799886419 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-7998-8641-9 |2 doi | |
035 | |a (CaBNVSL)slc00002472 | ||
035 | |a (OCoLC)1310045670 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a K564.C6 |b H26 2022eb | |
082 | 7 | |a 343.0999 |2 23 | |
245 | 0 | 0 | |a Handbook of research on cyber law, data protection, and privacy |c Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2022. | |
300 | |a 30 PDFs (390 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Principles of data privacy and security in a cyber world -- Chapter 2. Data access, privacy, protection methods, and challenges: a systematic literature review -- Chapter 3. Privacy and other legal concerns in the wake of deepfake technology: comparative study of India, US, and China -- Chapter 4. Social media and cyber security: investigating the risk in Nigeria -- Chapter 5. The European Union's proposed artificial intelligence legislation and the path ahead for Asian approaches to artifical intelligence -- Chapter 6. Blockchain technology in the agricultural supply chain: a case study of India -- Chapter 7. Gauging the scale of intertwinement: juggling between the use of biometric data and right to privacy -- Chapter 8. Cybersquatting: need for protection of domain names in the realm of cyberspace -- Chapter 9. Evolution of cryptocurrency: analysing the utility, legality, and regulatory framework in India -- Chapter 10. Cryptocurrency: a detailed study -- Chapter 11. Blockchain technology efficiently managing information and cyber security -- Chapter 12. The cryptocurrency "pump-and-dump": social media and legal and ethical ambiguity -- Chapter 13. Considerations for blockchain-based online dispute resolution -- Chapter 14. A decade in pixels: analyzing incidents of state-sponsored surveillance from the last decade -- Chapter 15. A Survey on privacy-preserving data publishing models for big data -- Chapter 16. Critical appraisal of challenges to online consumer fissures in information technology law in India -- Chapter 17. OTT platforms and their distributorship agreement with content makers: a study from the perspective of competition law and policy in India and other jurisdictions -- Chapter 18. Mapping the changing contours of electronic evidence in India -- Chapter 19. The vulnerability of children in cyberspace -- Chapter 20. Artificial intelligence: the need of the hour. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privacy" | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 04/09/2022). | ||
650 | 0 | |a Computer crimes |x Law and legislation. | |
650 | 0 | |a Data protection |x Law and legislation. | |
650 | 0 | |a Internet |x Law and Legislation. | |
700 | 1 | |a Agarwal, Aarushi, |e editor. | |
700 | 1 | |a Dewani, Nisha Dhanraj, |e editor. | |
700 | 1 | |a Khan, Shaharyar Asaf, |e editor. | |
700 | 1 | |a Khan, Zubair Ahmed, |e editor. | |
700 | 1 | |a Sharma, Mamta, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1799886417 |z 9781799886419 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8641-9 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00272191 |
---|---|
_version_ | 1816797085698097152 |
adam_text | |
any_adam_object | |
author2 | Agarwal, Aarushi Dewani, Nisha Dhanraj Khan, Shaharyar Asaf Khan, Zubair Ahmed Sharma, Mamta |
author2_role | edt edt edt edt edt |
author2_variant | a a aa n d d nd ndd s a k sa sak z a k za zak m s ms |
author_facet | Agarwal, Aarushi Dewani, Nisha Dhanraj Khan, Shaharyar Asaf Khan, Zubair Ahmed Sharma, Mamta |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | K - Law |
callnumber-label | K564 |
callnumber-raw | K564.C6 H26 2022eb |
callnumber-search | K564.C6 H26 2022eb |
callnumber-sort | K 3564 C6 H26 42022EB |
callnumber-subject | K - General Law |
collection | ZDB-98-IGB |
contents | Chapter 1. Principles of data privacy and security in a cyber world -- Chapter 2. Data access, privacy, protection methods, and challenges: a systematic literature review -- Chapter 3. Privacy and other legal concerns in the wake of deepfake technology: comparative study of India, US, and China -- Chapter 4. Social media and cyber security: investigating the risk in Nigeria -- Chapter 5. The European Union's proposed artificial intelligence legislation and the path ahead for Asian approaches to artifical intelligence -- Chapter 6. Blockchain technology in the agricultural supply chain: a case study of India -- Chapter 7. Gauging the scale of intertwinement: juggling between the use of biometric data and right to privacy -- Chapter 8. Cybersquatting: need for protection of domain names in the realm of cyberspace -- Chapter 9. Evolution of cryptocurrency: analysing the utility, legality, and regulatory framework in India -- Chapter 10. Cryptocurrency: a detailed study -- Chapter 11. Blockchain technology efficiently managing information and cyber security -- Chapter 12. The cryptocurrency "pump-and-dump": social media and legal and ethical ambiguity -- Chapter 13. Considerations for blockchain-based online dispute resolution -- Chapter 14. A decade in pixels: analyzing incidents of state-sponsored surveillance from the last decade -- Chapter 15. A Survey on privacy-preserving data publishing models for big data -- Chapter 16. Critical appraisal of challenges to online consumer fissures in information technology law in India -- Chapter 17. OTT platforms and their distributorship agreement with content makers: a study from the perspective of competition law and policy in India and other jurisdictions -- Chapter 18. Mapping the changing contours of electronic evidence in India -- Chapter 19. The vulnerability of children in cyberspace -- Chapter 20. Artificial intelligence: the need of the hour. |
ctrlnum | (CaBNVSL)slc00002472 (OCoLC)1310045670 |
dewey-full | 343.0999 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.0999 |
dewey-search | 343.0999 |
dewey-sort | 3343.0999 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04124nam a2200481 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00272191</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20220408134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">220409s2022 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799886433</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799886419</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-8641-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00002472</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1310045670</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">K564.C6</subfield><subfield code="b">H26 2022eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">343.0999</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on cyber law, data protection, and privacy </subfield><subfield code="c">Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">30 PDFs (390 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Principles of data privacy and security in a cyber world -- Chapter 2. Data access, privacy, protection methods, and challenges: a systematic literature review -- Chapter 3. Privacy and other legal concerns in the wake of deepfake technology: comparative study of India, US, and China -- Chapter 4. Social media and cyber security: investigating the risk in Nigeria -- Chapter 5. The European Union's proposed artificial intelligence legislation and the path ahead for Asian approaches to artifical intelligence -- Chapter 6. Blockchain technology in the agricultural supply chain: a case study of India -- Chapter 7. Gauging the scale of intertwinement: juggling between the use of biometric data and right to privacy -- Chapter 8. Cybersquatting: need for protection of domain names in the realm of cyberspace -- Chapter 9. Evolution of cryptocurrency: analysing the utility, legality, and regulatory framework in India -- Chapter 10. Cryptocurrency: a detailed study -- Chapter 11. Blockchain technology efficiently managing information and cyber security -- Chapter 12. The cryptocurrency "pump-and-dump": social media and legal and ethical ambiguity -- Chapter 13. Considerations for blockchain-based online dispute resolution -- Chapter 14. A decade in pixels: analyzing incidents of state-sponsored surveillance from the last decade -- Chapter 15. A Survey on privacy-preserving data publishing models for big data -- Chapter 16. Critical appraisal of challenges to online consumer fissures in information technology law in India -- Chapter 17. OTT platforms and their distributorship agreement with content makers: a study from the perspective of competition law and policy in India and other jurisdictions -- Chapter 18. Mapping the changing contours of electronic evidence in India -- Chapter 19. The vulnerability of children in cyberspace -- Chapter 20. Artificial intelligence: the need of the hour.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privacy"</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/09/2022).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Law and Legislation.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Aarushi,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dewani, Nisha Dhanraj,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Shaharyar Asaf,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Zubair Ahmed,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharma, Mamta,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799886417</subfield><subfield code="z">9781799886419</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8641-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00272191 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:58Z |
institution | BVB |
isbn | 9781799886433 |
language | English |
oclc_num | 1310045670 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 30 PDFs (390 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on cyber law, data protection, and privacy Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2022. 30 PDFs (390 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Principles of data privacy and security in a cyber world -- Chapter 2. Data access, privacy, protection methods, and challenges: a systematic literature review -- Chapter 3. Privacy and other legal concerns in the wake of deepfake technology: comparative study of India, US, and China -- Chapter 4. Social media and cyber security: investigating the risk in Nigeria -- Chapter 5. The European Union's proposed artificial intelligence legislation and the path ahead for Asian approaches to artifical intelligence -- Chapter 6. Blockchain technology in the agricultural supply chain: a case study of India -- Chapter 7. Gauging the scale of intertwinement: juggling between the use of biometric data and right to privacy -- Chapter 8. Cybersquatting: need for protection of domain names in the realm of cyberspace -- Chapter 9. Evolution of cryptocurrency: analysing the utility, legality, and regulatory framework in India -- Chapter 10. Cryptocurrency: a detailed study -- Chapter 11. Blockchain technology efficiently managing information and cyber security -- Chapter 12. The cryptocurrency "pump-and-dump": social media and legal and ethical ambiguity -- Chapter 13. Considerations for blockchain-based online dispute resolution -- Chapter 14. A decade in pixels: analyzing incidents of state-sponsored surveillance from the last decade -- Chapter 15. A Survey on privacy-preserving data publishing models for big data -- Chapter 16. Critical appraisal of challenges to online consumer fissures in information technology law in India -- Chapter 17. OTT platforms and their distributorship agreement with content makers: a study from the perspective of competition law and policy in India and other jurisdictions -- Chapter 18. Mapping the changing contours of electronic evidence in India -- Chapter 19. The vulnerability of children in cyberspace -- Chapter 20. Artificial intelligence: the need of the hour. Restricted to subscribers or individual electronic text purchasers. "This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privacy" Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 04/09/2022). Computer crimes Law and legislation. Data protection Law and legislation. Internet Law and Legislation. Agarwal, Aarushi, editor. Dewani, Nisha Dhanraj, editor. Khan, Shaharyar Asaf, editor. Khan, Zubair Ahmed, editor. Sharma, Mamta, editor. IGI Global, publisher. Print version: 1799886417 9781799886419 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8641-9 Volltext |
spellingShingle | Handbook of research on cyber law, data protection, and privacy Chapter 1. Principles of data privacy and security in a cyber world -- Chapter 2. Data access, privacy, protection methods, and challenges: a systematic literature review -- Chapter 3. Privacy and other legal concerns in the wake of deepfake technology: comparative study of India, US, and China -- Chapter 4. Social media and cyber security: investigating the risk in Nigeria -- Chapter 5. The European Union's proposed artificial intelligence legislation and the path ahead for Asian approaches to artifical intelligence -- Chapter 6. Blockchain technology in the agricultural supply chain: a case study of India -- Chapter 7. Gauging the scale of intertwinement: juggling between the use of biometric data and right to privacy -- Chapter 8. Cybersquatting: need for protection of domain names in the realm of cyberspace -- Chapter 9. Evolution of cryptocurrency: analysing the utility, legality, and regulatory framework in India -- Chapter 10. Cryptocurrency: a detailed study -- Chapter 11. Blockchain technology efficiently managing information and cyber security -- Chapter 12. The cryptocurrency "pump-and-dump": social media and legal and ethical ambiguity -- Chapter 13. Considerations for blockchain-based online dispute resolution -- Chapter 14. A decade in pixels: analyzing incidents of state-sponsored surveillance from the last decade -- Chapter 15. A Survey on privacy-preserving data publishing models for big data -- Chapter 16. Critical appraisal of challenges to online consumer fissures in information technology law in India -- Chapter 17. OTT platforms and their distributorship agreement with content makers: a study from the perspective of competition law and policy in India and other jurisdictions -- Chapter 18. Mapping the changing contours of electronic evidence in India -- Chapter 19. The vulnerability of children in cyberspace -- Chapter 20. Artificial intelligence: the need of the hour. Computer crimes Law and legislation. Data protection Law and legislation. Internet Law and Legislation. |
title | Handbook of research on cyber law, data protection, and privacy |
title_auth | Handbook of research on cyber law, data protection, and privacy |
title_exact_search | Handbook of research on cyber law, data protection, and privacy |
title_full | Handbook of research on cyber law, data protection, and privacy Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors. |
title_fullStr | Handbook of research on cyber law, data protection, and privacy Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors. |
title_full_unstemmed | Handbook of research on cyber law, data protection, and privacy Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors. |
title_short | Handbook of research on cyber law, data protection, and privacy |
title_sort | handbook of research on cyber law data protection and privacy |
topic | Computer crimes Law and legislation. Data protection Law and legislation. Internet Law and Legislation. |
topic_facet | Computer crimes Law and legislation. Data protection Law and legislation. Internet Law and Legislation. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8641-9 |
work_keys_str_mv | AT agarwalaarushi handbookofresearchoncyberlawdataprotectionandprivacy AT dewaninishadhanraj handbookofresearchoncyberlawdataprotectionandprivacy AT khanshaharyarasaf handbookofresearchoncyberlawdataprotectionandprivacy AT khanzubairahmed handbookofresearchoncyberlawdataprotectionandprivacy AT sharmamamta handbookofresearchoncyberlawdataprotectionandprivacy AT igiglobal handbookofresearchoncyberlawdataprotectionandprivacy |