Explore
Unauthorized Access
Robert H. Sloan and Richard Warner
2013-2017
0 Ungluers have
Faved this Work
Login to Fave
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 742 times via unglue.it ebook links.
- 566 - pdf (CC BY-NC-ND) at OAPEN Library.
- 176 - pdf (CC BY-NC-ND) at OAPEN Library.
Keywords
- access
- CHOICE Highly Recommended Title
- Computer programming / software development
- Computer security
- COMPUTERSCIENCE
- Computing & information technology
- Crisis
- cryptology
- Data encryption
- Data mining
- Data Preparation and Mining
- Data protection
- Databases
- Deep
- Defense
- Games development & programming
- Government information
- INFORMATIONSCIENCE
- InfoSECURITY
- inspection
- IT Security
- ITECH
- Malware
- Norm
- Online
- Online social networks
- optimal
- packet
- perfect
- privacy
- Privacy, Right of
- SCI-TECH
- security
- Software
- STM
- thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMK Games development and programming
- thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining
- unauthorized
- vulnerabilities