Table of Contents Part I Considering the Typical User Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication Permissions and Privacy Privacy and Tracking Part II Considering the Malicious User A Framework for Analysis Attackers’ Accounts Environmentally and Politically Conscious Crypto Part III Designing Solutions Based on Typical and Malicious Users So…
This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…
Terdapat bibliografi dan indeks. Table of contents: Ch. 1. Code is law Ch. 2. Four puzzles from cyberspace Ch. 3. Is-ism : is the way it is the way it must be? Ch. 4. Architectures of control Ch. 5. Regulating code Ch. 6. Cyberspaces Ch. 7. What things regulate Ch. 8. The limits in open code Ch. 9. Translation Ch. 10. Intellectual property Ch. 11. Privacy Ch. 12. Free speech Ch.…
Terdapat bibliografi dan indeks. Table of contents: Pt.1 Regulability Code is law Four puzzles from cyberspace Is-Ism Architectures of control Regulating code Pt.2 Code and other regulation Cyberspaces What things regulate Thhe limits in open source Pt.3 Applications Translation Intellectual property Privacy Free speech Interlude Sovereignty Pt.4…
Contents: Ch. I - History and definitions Ch. II - U.S. legal basis of privacy Ch. III - International privacy Ch. IV - Current privacy challenges, developing technologies & future trends.
Terdapat bibliografi dan indeks. Table of contents: 1 - Privacy: philosophical dimensions of the literature 2 - Social distance and the veil 3 - The origins of modern claims to privacy 4 - The right to privacy [the implicit made explicit] 5 - Privacy [a legal analysis] 6 - Privacy as an aspect of human dignity: an answer to Dean Prosser 7 - Privacy [a moral analysis] 8 - Privacy, fre…
Table of contents: 1. Introduction 2. The rise of the digital dossier 3. Kafka and Orwell : reconceptualizing information privacy 4. The problems of information privacy law 5. The limits of market-based solutions 6. Architecture and the protection of privacy 7. The problem of public records 8. Access and aggregation : rethinking privacy and transparency 9. Government information gathe…
Contents: 1. Introduction Information privacy, technology, and the law Information privacy law : origins and types Perspectives on privacy 2. Privasi and law enforcement The Fourth Amendment and emerging technology Federal electronic surveillance law Digital searches and seizures National security and foreign intelligence 3. Privacy and goverenment records and d…
Table of Contents 1. New dimensions in privacy: communications technologies, media practices and law Andrew T. Kenyon and Megan Richardson 2. Privacy and freedom of speech Eric Barendt 3. Revisiting the American action for public disclosure of private facts Brian C. Murchison 4. The internet and the private life in Europe: risks and aspirations Yves Poullet and J. Marc Dinant 5. APEC's p…
Contents 1. Introduction 2. Electronic Information Networks 3. Privacy 4. Privacy Regulation in Europe 5. Privacy Regulation in the United States: The Public Sector 6. Privacy Regulation in the United States: The Private Sector 7. Electronic Privacy in the Twenty-First Century App. A. The European Union Directive A…