id |
oapen-20.500.12657-41680
|
record_format |
dspace
|
spelling |
oapen-20.500.12657-416802020-12-23T13:37:56Z Unauthorized Access Sloan, Robert H. Warner, Richard CHOICE Highly Recommended Title Data Preparation and Mining IT Security Cryptology InfoSECURITY SCI-TECH COMPUTERSCIENCE ITECH INFORMATIONSCIENCE STM deep defense inspection malware norm optimal packet perfect software vulnerabilities bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMK Games development & programming bic Book Industry Communication::U Computing & information technology::UN Databases::UNF Data mining bic Book Industry Communication::U Computing & information technology::UR Computer security bic Book Industry Communication::U Computing & information technology::UR Computer security::URY Data encryption Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. 2020-09-21T13:37:14Z 2020-09-21T13:37:14Z 2014 book ONIX_20200921_9781439830147_40 https://library.oapen.org/handle/20.500.12657/41680 eng application/pdf n/a 9781439830147.pdf https://www.taylorfrancis.com/books/9780429093791 Taylor & Francis CRC Press 10.1201/b15148 10.1201/b15148 7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb CRC Press 398 open access
|
institution |
OAPEN
|
collection |
DSpace
|
language |
English
|
description |
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security.
|
title |
9781439830147.pdf
|
spellingShingle |
9781439830147.pdf
|
title_short |
9781439830147.pdf
|
title_full |
9781439830147.pdf
|
title_fullStr |
9781439830147.pdf
|
title_full_unstemmed |
9781439830147.pdf
|
title_sort |
9781439830147.pdf
|
publisher |
Taylor & Francis
|
publishDate |
2020
|
url |
https://www.taylorfrancis.com/books/9780429093791
|
_version_ |
1771297515708088320
|