Unauthorized Access : : The Crisis in Online Privacy and Security / / Robert Sloan.

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Abingdon, Oxon, United Kingdom : : Taylor & Francis,, 2014.
Year of Publication:2014
Language:English
Physical Description:1 online resource (398 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993598303404498
ctrlnum (CKB)5710000000124330
(NjHacI)995710000000124330
(EXLCZ)995710000000124330
collection bib_alma
record_format marc
spelling Sloan, Robert, author.
Unauthorized Access : The Crisis in Online Privacy and Security / Robert Sloan.
Unauthorized Access
Abingdon, Oxon, United Kingdom : Taylor & Francis, 2014.
1 online resource (398 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on publisher supplied metadata and other sources.
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors-two renowned experts on computer security and law-explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.
Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 Introduction; Chapter 2 An Explanation of the Internet, Computers, and Data Mining; Chapter 3 Norms and Markets; Chapter 4 Informational Privacy: The General Theory; Chapter 5 Informational Privacy: Norms and Value Optimality; Chapter 6 Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 Software Vulnerabilities: Creating Best Practices; Chapter 8 Computers and Networks: Attack and Defense; Chapter 9 Malware, Norms, and ISPs Chapter 10 Malware: Creating a Best Practices NormChapter 11 Tracking, Contracting, and Behavioral Advertising; Chapter 12 From One-Sided Chicken to Value Optimal Norms; Back Cover.
Computer security.
Privacy, Right of.
Data protection.
language English
format eBook
author Sloan, Robert,
spellingShingle Sloan, Robert,
Unauthorized Access : The Crisis in Online Privacy and Security /
Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 Introduction; Chapter 2 An Explanation of the Internet, Computers, and Data Mining; Chapter 3 Norms and Markets; Chapter 4 Informational Privacy: The General Theory; Chapter 5 Informational Privacy: Norms and Value Optimality; Chapter 6 Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 Software Vulnerabilities: Creating Best Practices; Chapter 8 Computers and Networks: Attack and Defense; Chapter 9 Malware, Norms, and ISPs Chapter 10 Malware: Creating a Best Practices NormChapter 11 Tracking, Contracting, and Behavioral Advertising; Chapter 12 From One-Sided Chicken to Value Optimal Norms; Back Cover.
author_facet Sloan, Robert,
author_variant r s rs
author_role VerfasserIn
author_sort Sloan, Robert,
title Unauthorized Access : The Crisis in Online Privacy and Security /
title_sub The Crisis in Online Privacy and Security /
title_full Unauthorized Access : The Crisis in Online Privacy and Security / Robert Sloan.
title_fullStr Unauthorized Access : The Crisis in Online Privacy and Security / Robert Sloan.
title_full_unstemmed Unauthorized Access : The Crisis in Online Privacy and Security / Robert Sloan.
title_auth Unauthorized Access : The Crisis in Online Privacy and Security /
title_alt Unauthorized Access
title_new Unauthorized Access :
title_sort unauthorized access : the crisis in online privacy and security /
publisher Taylor & Francis,
publishDate 2014
physical 1 online resource (398 pages)
contents Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 Introduction; Chapter 2 An Explanation of the Internet, Computers, and Data Mining; Chapter 3 Norms and Markets; Chapter 4 Informational Privacy: The General Theory; Chapter 5 Informational Privacy: Norms and Value Optimality; Chapter 6 Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 Software Vulnerabilities: Creating Best Practices; Chapter 8 Computers and Networks: Attack and Defense; Chapter 9 Malware, Norms, and ISPs Chapter 10 Malware: Creating a Best Practices NormChapter 11 Tracking, Contracting, and Behavioral Advertising; Chapter 12 From One-Sided Chicken to Value Optimal Norms; Back Cover.
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.878 S563 42014
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 320 - Political science
dewey-ones 323 - Civil & political rights
dewey-full 323.4302854678
dewey-sort 3323.4302854678
dewey-raw 323.4302854678
dewey-search 323.4302854678
work_keys_str_mv AT sloanrobert unauthorizedaccessthecrisisinonlineprivacyandsecurity
AT sloanrobert unauthorizedaccess
status_str n
ids_txt_mv (CKB)5710000000124330
(NjHacI)995710000000124330
(EXLCZ)995710000000124330
carrierType_str_mv cr
is_hierarchy_title Unauthorized Access : The Crisis in Online Privacy and Security /
_version_ 1787553521057398786
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02913nam a2200301 i 4500</leader><controlfield tag="001">993598303404498</controlfield><controlfield tag="005">20230627054934.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230627s2014 enk o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5710000000124330</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995710000000124330</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995710000000124330</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.878</subfield><subfield code="b">.S563 2014</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">323.4302854678</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sloan, Robert,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Unauthorized Access :</subfield><subfield code="b">The Crisis in Online Privacy and Security /</subfield><subfield code="c">Robert Sloan.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Unauthorized Access </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Abingdon, Oxon, United Kingdom :</subfield><subfield code="b">Taylor &amp; Francis,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (398 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors-two renowned experts on computer security and law-explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 Introduction; Chapter 2 An Explanation of the Internet, Computers, and Data Mining; Chapter 3 Norms and Markets; Chapter 4 Informational Privacy: The General Theory; Chapter 5 Informational Privacy: Norms and Value Optimality; Chapter 6 Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 Software Vulnerabilities: Creating Best Practices; Chapter 8 Computers and Networks: Attack and Defense; Chapter 9 Malware, Norms, and ISPs Chapter 10 Malware: Creating a Best Practices NormChapter 11 Tracking, Contracting, and Behavioral Advertising; Chapter 12 From One-Sided Chicken to Value Optimal Norms; Back Cover.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-06 03:32:43 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-05-13 19:27:32 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338638930004498&amp;Force_direct=true</subfield><subfield code="Z">5338638930004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338638930004498</subfield></datafield></record></collection>