Unauthorized access : the crisis in online privacy and security
(Book)

Book Cover
Published:
Boca Raton, FL : CRC Press, Taylor & Francis Group, [2014].
Format:
Book
Physical Desc:
xxiii, 374 pages ; 24 cm.
Status:
ASU Main (3rd floor)
TK5105.878 .S59 2014
Copies
Location
Call Number
Status
ASU Main (3rd floor)
TK5105.878 .S59 2014
On Shelf
Citations
APA Citation (style guide)

Sloan, R. H., & Warner, R. (2014). Unauthorized access: the crisis in online privacy and security. Boca Raton, FL: CRC Press, Taylor & Francis Group.

Chicago / Turabian - Author Date Citation (style guide)

Sloan, Robert H and Richard Warner. 2014. Unauthorized Access: The Crisis in Online Privacy and Security. Boca Raton, FL: CRC Press, Taylor & Francis Group.

Chicago / Turabian - Humanities Citation (style guide)

Sloan, Robert H and Richard Warner, Unauthorized Access: The Crisis in Online Privacy and Security. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2014.

MLA Citation (style guide)

Sloan, Robert H., and Richard Warner. Unauthorized Access: The Crisis in Online Privacy and Security. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2014. Print.

Note! Citation formats are based on standards as of July 2010. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
Description

"Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors--two renowned experts on computer security and law--explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security." -- Publisher's description.

Also in This Series
More Like This
More Details
Language:
English
ISBN:
9781439830130, 1439830134

Notes

General Note
"A Chapman & Hall book"--Title page.
Bibliography
Includes bibliographical references and index.
Description
"Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors--two renowned experts on computer security and law--explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security." -- Publisher's description.
More Copies In Prospector
Loading Prospector Copies...
Staff View
Grouped Work ID:
4fecf445-a554-d7c5-e719-25a647c45fa3
Go To Grouped Work
Last File Modification Time Oct 10, 2018 04:44:01 AM
Last Grouped Work Modification Time Oct 10, 2018 01:06:21 AM

MARC Record

LEADER04363cam a2200565 i 4500
001ocn449890392
003OCoLC
00520140628043556.0
008130205t20142014flua     b    001 0 eng  
010 |a 2013003387
0167 |a 016107224 |2 Uk
020 |a 9781439830130 |q (alkaline paper)
020 |a 1439830134 |q (alkaline paper)
035 |a (OCoLC)449890392
040 |a DLC |b eng |e rda |c DLC |d YDX |d BTCTA |d YDXCP |d UKMGB |d OCLCO |d OCLCF |d CDX |d PUL |d IAD |d ZLM |d CLZ
042 |a pcc
049 |a CLZA
05000 |a TK5105.878 |b .S59 2014
08200 |a 323.4/302854678 |2 23
1001 |a Sloan, Robert H. |0 http://id.loc.gov/authorities/names/n2002012680.
24510 |a Unauthorized access : |b the crisis in online privacy and security / |c Robert H. Sloan and Richard Warner.
264 1 |a Boca Raton, FL : |b CRC Press, Taylor & Francis Group, |c [2014]
264 4 |c ©2014.
300 |a xxiii, 374 pages ; |c 24 cm.
336 |a text |2 rdacontent.
337 |a unmediated |2 rdamedia.
338 |a volume |2 rdacarrier.
500 |a "A Chapman & Hall book"--Title page.
504 |a Includes bibliographical references and index.
5052 |a Introduction -- An Explanation of the Internet, Computers, and Data Mining -- Norms and Markets -- Informational Privacy: The General Theory -- Informational Privacy: Norms and Value Optimality -- Software Vulnerabilities and the Low-Priced Software Norm -- Software Vulnerabilities: Creating Best Practices -- Computers and Networks: Attack and Defense -- Malware, Norms, and ISPs -- Malware: Creating a Best Practices Norm -- Tracking, Contracting, and Behavioral Advertising -- From One-Sided Chicken to Value Optimal Norms.
520 |a "Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors--two renowned experts on computer security and law--explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security." -- Publisher's description.
650 0 |a Internet |x Moral and ethical aspects. |0 http://id.loc.gov/authorities/subjects/sh2008124051.
650 0 |a Privacy, Right of. |0 http://id.loc.gov/authorities/subjects/sh85107029.
650 0 |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862.
650 0 |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859.
650 7 |a Computer security. |2 fast |0 (OCoLC)fst00872484.
650 7 |a Data protection. |2 fast |0 (OCoLC)fst00887958.
650 7 |a Internet |x Moral and ethical aspects. |2 fast |0 (OCoLC)fst01766714.
650 7 |a Privacy, Right of. |2 fast |0 (OCoLC)fst01077444.
7001 |a Warner, Richard, |d 1946- |0 http://id.loc.gov/authorities/names/n79115892.
907 |a .b4231706x |b multi |c - |d 140609 |e 180403
998 |a as |a (2)ws |b 140628 |c m |d a |e - |f eng |g flu |h 0 |i 0
948 |a MARCIVE August, 2017
948 |a MARCIVE extract Aug 5, 2017
994 |a C0 |b CLZ
995 |a Loaded with m2btab.ltiac in 2017.08
989 |a TK5105.878 .S59 2014 |d as |b 1010002124664 |e 03-26-2015 13:25 |f  - - |g - |h 1 |i 0 |j 18 |k 140628 |l $0.00 |m  |n 03-26-2015 13:26 |o - |p 111 |q 111 |t 0 |x 0 |1 .i84535957
989 |a TK5105.878 |r .S59 2014 |d wsst |b 1170003456372 |e  - - |f  - - |g - |h 0 |i 0 |j 18 |k 140609 |l $0.00 |m  |n  - - |o - |p 0 |q 0 |t 0 |x 0 |1 .i84353661
908 |a .o21076789
988 |a .o21076789 |c 1 |j wsst |f b |k a |x 140609 |y 140609 |z  |3 - |l wsst