Feedback

X
Unauthorized Access

Unauthorized Access

and

en

0 Ungluers have Faved this Work
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 593 times via unglue.it ebook links.
  1. 431 - pdf (CC BY-NC-ND) at OAPEN Library.
  2. 162 - pdf (CC BY-NC-ND) at OAPEN Library.

Keywords

  • access
  • CHOICE Highly Recommended Title
  • Computer programming / software development
  • Computer security
  • COMPUTERSCIENCE
  • Computing & information technology
  • Crisis
  • cryptology
  • Data encryption
  • Data mining
  • Data Preparation and Mining
  • Data protection
  • Databases
  • Deep
  • Defense
  • Games development & programming
  • Government information
  • INFORMATIONSCIENCE
  • InfoSECURITY
  • inspection
  • IT Security
  • ITECH
  • Malware
  • Norm
  • Online
  • Online social networks
  • optimal
  • packet
  • perfect
  • privacy
  • Privacy, Right of
  • SCI-TECH
  • security
  • Software
  • STM
  • unauthorized
  • vulnerabilities

Links

DOI: 10.1201/b15148

Editions

edition cover
edition cover
edition cover

Share

Copy/paste this into your site: