Unauthorized Access : : The Crisis in Online Privacy and Security / / Robert Sloan.

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Abingdon, Oxon, United Kingdom : : Taylor & Francis,, 2014.
Year of Publication:2014
Language:English
Physical Description:1 online resource (398 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02913nam a2200301 i 4500
001 993598303404498
005 20230627054934.0
006 m o d
007 cr |||||||||||
008 230627s2014 enk o 000 0 eng d
035 |a (CKB)5710000000124330 
035 |a (NjHacI)995710000000124330 
035 |a (EXLCZ)995710000000124330 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
050 4 |a TK5105.878  |b .S563 2014 
082 0 4 |a 323.4302854678  |2 23 
100 1 |a Sloan, Robert,  |e author. 
245 1 0 |a Unauthorized Access :  |b The Crisis in Online Privacy and Security /  |c Robert Sloan. 
246 |a Unauthorized Access  
264 1 |a Abingdon, Oxon, United Kingdom :  |b Taylor & Francis,  |c 2014. 
300 |a 1 online resource (398 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on publisher supplied metadata and other sources. 
520 |a Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors-two renowned experts on computer security and law-explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security. 
505 0 |a Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 Introduction; Chapter 2 An Explanation of the Internet, Computers, and Data Mining; Chapter 3 Norms and Markets; Chapter 4 Informational Privacy: The General Theory; Chapter 5 Informational Privacy: Norms and Value Optimality; Chapter 6 Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 Software Vulnerabilities: Creating Best Practices; Chapter 8 Computers and Networks: Attack and Defense; Chapter 9 Malware, Norms, and ISPs Chapter 10 Malware: Creating a Best Practices NormChapter 11 Tracking, Contracting, and Behavioral Advertising; Chapter 12 From One-Sided Chicken to Value Optimal Norms; Back Cover. 
650 0 |a Computer security. 
650 0 |a Privacy, Right of. 
650 0 |a Data protection. 
906 |a BOOK 
ADM |b 2023-07-06 03:32:43 Europe/Vienna  |f system  |c marc21  |a 2023-05-13 19:27:32 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338638930004498&Force_direct=true  |Z 5338638930004498  |b Available  |8 5338638930004498