Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham, Switzerland :Springer Open,
    UID:
    almafu_BV046305647
    Format: 1 Online-Ressource (xvii, 384 Seiten).
    ISBN: 978-3-030-29053-5
    Series Statement: The international library of ethics, law and technology volume 21
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-29052-8
    Language: English
    Subjects: Philosophy
    RVK:
    Keywords: Computersicherheit ; Ethik ; Aufsatzsammlung ; Aufsatzsammlung ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Christen, Markus 1969-
    Author information: Gordijn, Bert 1965-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    almahu_9949348546202882
    Format: 1 online resource (384)
    Edition: 1st ed. 2020.
    Series Statement: The International Library of Ethics, Law and Technology, 21
    Content: This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
    Note: Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion. , English.
    Additional Edition: ISBN 3-030-29052-2
    Additional Edition: ISBN 3-030-29053-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9948573750202882
    Format: XVII, 384 p. 19 illus. , online resource.
    Edition: 1st ed. 2020.
    ISBN: 9783030290535
    Series Statement: The International Library of Ethics, Law and Technology, 21
    Content: This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
    Note: Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 - Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 - Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783030290528
    Additional Edition: Printed edition: ISBN 9783030290542
    Additional Edition: Printed edition: ISBN 9783030290559
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham : Springer International Publishing AG
    UID:
    kobvindex_INTEBC6113544
    Format: 1 online resource (388 pages)
    Edition: 1st ed.
    ISBN: 9783030290535
    Series Statement: The International Library of Ethics, Law and Technology Series v.21
    Note: The Ethics of Cybersecurity -- Acronyms and Abbreviations -- Contents -- List of Figures -- List of Tables -- About the Contributors -- Chapter 1: Introduction -- 1.1 Explaining the Foundations -- 1.2 Outlining the Problems -- 1.3 Presenting Recommendations -- References -- Part I: Foundations -- Chapter 2: Basic Concepts and Models of Cybersecurity -- 2.1 Introduction -- 2.2 Threats -- 2.2.1 Information Security -- 2.2.2 Systems Security -- 2.2.3 Security Versus Safety -- 2.2.4 Security as Risk Management -- 2.3 Approaches for Attack and Defence -- 2.3.1 Attackers and Their Motives -- 2.3.2 Defences -- 2.3.3 Stages of an Intrusion -- 2.4 Threats and Solutions in Data Security -- 2.4.1 Unauthorised Disclosure of Information -- 2.4.2 Unauthorised Modification and Fabrication -- 2.4.3 The Benefits of Asymmetric Cryptography -- 2.4.4 Case Study: Secure HTTP -- 2.5 Malware Threats and Solutions -- 2.5.1 Propagation and Delivery -- 2.5.2 Payloads -- 2.5.3 Countermeasures -- 2.6 Threats and Solutions in Software Security -- 2.6.1 Case Study: Buffer Overflows -- 2.6.2 Case Study: SQL Injections -- 2.6.3 Finding and Handling Vulnerabilities -- 2.7 Threats and Solutions in Network Security -- 2.7.1 Case Study: Reconnaissance -- 2.7.2 Case Study: Perimeter Security Via Firewalls -- 2.7.3 Case Study: Denial of Service Attacks -- 2.7.4 Case Study: Network Intrusion Detection Systems -- 2.8 Continuous Testing -- 2.9 Conclusion -- References -- Chapter 3: Core Values and Value Conflicts in Cybersecurity: Beyond Privacy Versus Security -- 3.1 Introduction -- 3.2 Values and Value Clusters -- 3.2.1 What Are Values? -- 3.2.2 Value Clusters -- 3.3 Value Clusters in Cybersecurity -- 3.3.1 Security -- 3.3.2 Privacy -- 3.3.3 Fairness -- 3.3.4 Accountability -- 3.4 Value Conflicts in Cybersecurity -- 3.4.1 What Are Value Conflicts? , 3.4.2 Value Conflicts in Cybersecurity -- 3.4.2.1 Privacy Versus Security -- 3.4.2.2 Privacy Versus Fairness -- 3.4.2.3 Privacy Versus Accountability -- 3.4.2.4 Security Versus Accountability -- 3.4.2.5 Security Versus Fairness (and Democracy) -- 3.5 Conclusions: Beyond Security Versus Privacy -- References -- Chapter 4: Ethical Frameworks for Cybersecurity -- 4.1 Introduction -- 4.2 Principlism -- 4.3 Human Rights -- 4.4 From Principlism and Human Rights to the Ethics of Risk -- 4.5 Cybersecurity and the Ethics of Risk -- 4.5.1 Expected Utility Maximisation -- 4.5.2 The Maximin Rule -- 4.5.3 Deontological and Rights-Based Theories -- 4.5.4 Contractualism and Risk -- 4.6 Contextual Integrity -- 4.7 Conclusions -- References -- Chapter 5: Cybersecurity Regulation in the European Union: The Digital, the Critical and Fundamental Rights -- 5.1 Formulating Cybersecurity as a Policy Area and Its Objectives -- 5.2 A Virtuous But Vicious Circle of Regulation: From Cybersecurity Law to Policy and Vice Versa -- 5.3 Conceptualising Cybersecurity as a Policy Area Through Piecemeal Legislation and Policy -- 5.4 Principle of Conferral Limits the Scope of Cybersecurity -- 5.5 Remaining Challenges to an Effective Cybersecurity Legal Framework -- 5.5.1 Choice of Appropriate Regulatory Measures -- 5.5.2 Targeting the Right Addressees -- 5.5.3 The Long-Awaited Recast of Product Liability Directive, Pending -- 5.6 A Pressing Need to (Cyber)Secure EU Values and Interests -- 5.7 Concluding Remarks -- References -- Part II: Problems -- Chapter 6: A Care-Based Stakeholder Approach to Ethics of Cybersecurity in Business -- 6.1 Introduction -- 6.2 Ethical Issues in Cybersecurity -- 6.3 Gaps in the Literature on Ethics and Cybersecurity -- 6.4 Care-Based Stakeholder Theory -- 6.5 Ransomware Attacks -- 6.6 The Stakeholders and Their Interests -- 6.6.1 Shareholders , 6.6.2 Employees -- 6.6.3 The Local Community -- 6.6.4 Customers -- 6.6.5 Suppliers -- 6.6.6 Competitors -- 6.6.7 Hackers -- 6.6.8 General Public -- 6.7 Conflicts of Interests Between the Stakeholders -- 6.7.1 Grey Hats' Interests Versus the Other Named Stakeholders' Interests -- 6.7.2 Black Hats Interests Versus the Other Named Stakeholders' Interests -- 6.8 Responsibilities of Business -- References -- Chapter 7: Cybersecurity in Health Care -- 7.1 Introduction: The Value of Health -- 7.2 Principles, Moral Values and Technical Aims -- 7.2.1 Principlism as a Starting Point of Ethical Analysis -- 7.2.2 Technical Aims Mapping to Ethical Principles -- 7.2.3 Other Moral Values -- 7.3 Case Studies -- 7.3.1 Cardiac Pacemakers and Other Implantable Medical Devices -- 7.3.1.1 Brief Description of the Case -- 7.3.1.2 Conflicting Ethical Values -- 7.3.2 Electronic Health Card (eHC) in Germany and Elsewhere -- 7.3.2.1 Brief Description of the Case -- 7.3.2.2 Conflicting Ethical Values -- 7.3.3 Cybersecurity and Ethics in Health: A Tentative Summing-Up -- 7.4 Conclusion -- References -- Chapter 8: Cybersecurity of Critical Infrastructure -- 8.1 Introduction -- 8.2 Review of the Literature on Cybersecurity in the National Security Domain -- 8.2.1 Ethical Issues That Emerged in the Literature -- 8.2.2 Value Conflicts Identified in the Literature -- 8.2.3 The Gap in the Literature -- 8.3 Cybersecurity of Critical Infrastructure -- 8.3.1 Cybersecurity of Industrial Control Systems -- 8.3.2 AI and Cybersecurity of Critical Infrastructure -- 8.3.3 Value Conflicts in the Use of AI in Cybersecurity in the National Security Domain -- 8.4 Case Studies of Cybersecurity in the National Security Domain -- 8.4.1 Iranian Attack to the US Power Grid System (Counter-Measure to Stuxnet) -- 8.4.2 Hacking of Citizens' Telephone with Exodus -- 8.4.3 'Biased' Face Recognition Systems , 8.4.4 Government Buying Zero-Day Exploits -- 8.5 Conclusion -- References -- Chapter 9: Ethical and Unethical Hacking -- 9.1 Introduction -- 9.2 What Actually Is a 'Hacker'? -- 9.2.1 Hackers in the Early Days -- 9.2.2 Hackers in the 2000s -- 9.2.3 Modern Hackers -- 9.2.4 Today's Hackers -- 9.3 Towards a More Systematic Hackers' Classification -- 9.3.1 A First Taxonomy -- 9.3.2 A Second Taxonomy -- 9.3.3 Ethical Hacking -- 9.4 Is 'Ethical Hacking' Ethical? -- 9.4.1 Inethical, Unethical and Ethical Hacking -- 9.4.2 Competing Ethical Values -- 9.4.3 A Pragmatic Best Practice Approach -- 9.5 Conclusion -- References -- Chapter 10: Cybersecurity and the State -- 10.1 Introduction -- 10.2 Cybersecurity Strategies at the European Union Level -- 10.3 Cybersecurity Strategies at the National Level -- 10.4 The EU Data Protection Framework Addressing Cybersecurity -- 10.5 Tensions Between Cybersecurity and Data Protection -- 10.6 Recommended Realignment and Solution Approaches -- References -- Chapter 11: Freedom of Political Communication, Propaganda and the Role of Epistemic Institutions in Cyberspace -- 11.1 Introduction -- 11.2 Fake News, Hate Speech and Propaganda -- 11.3 Freedom of Communication, Truth and Liberal Democracy -- 11.4 Epistemic Institutions, Market-Based Social Media Platforms and Combating Propaganda -- 11.5 Conclusion -- References -- Chapter 12: Cybersecurity and Cyber Warfare: The Ethical Paradox of 'Universal Diffidence' -- 12.1 Introduction -- 12.2 Ethics and Individuals in the Cyber Domain -- 12.3 Ethics and Inter-State Relations in the Cyber Domain -- 12.4 Privacy, Vulnerability and the 'Internet of Things' -- 12.5 Our Own Worst Enemy -- References -- Chapter 13: Cyber Peace: And How It Can Be Achieved -- 13.1 Cyber Conflicts of Today -- 13.2 Cyber Peace -- 13.2.1 Current State of Cyber Peace , 13.2.2 How to Achieve a State of Stable Cyber Peace -- 13.3 Security and Resilience -- 13.4 Trust and Confidence -- 13.5 Roles and Responsibilities -- 13.5.1 Policy Makers -- 13.5.2 The Society -- 13.5.3 The Private Sector -- 13.5.4 The Individual -- 13.6 Conclusion -- References -- Part III: Recommendations -- Chapter 14: Privacy-Preserving Technologies -- 14.1 Introduction -- 14.1.1 Design Strategies -- 14.2 Identity, Authentication and Anonymity -- 14.2.1 Digital Signatures -- 14.2.1.1 Blind Signatures -- 14.2.1.2 Group Signatures -- 14.2.1.3 Identity-Based Signatures -- 14.2.1.4 Attribute-Based Signatures -- 14.2.2 Zero-Knowledge Proofs -- 14.2.3 Implicit Authentication -- 14.3 Private Communications -- 14.3.1 End-to-End Encryption -- 14.3.2 Anonymous Channels -- 14.4 Privacy-Preserving Computations -- 14.4.1 (Partially) Homomorphic Encryption -- 14.4.2 Multiparty Computation -- 14.5 Privacy in Databases -- 14.5.1 Respondent Privacy: Statistical Disclosure Control -- 14.5.2 Non-perturbative Masking -- 14.5.3 Perturbative Masking -- 14.5.4 Synthetic Microdata Generation -- 14.5.5 Privacy Models -- 14.5.5.1 k-Anonymity and Extensions -- 14.5.5.2 Differential Privacy -- 14.5.5.3 Permutation Model for Anonymisation -- 14.5.6 Redaction and Sanitisation of Documents -- 14.5.7 Data Stream Anonymisation -- 14.5.8 Owner Privacy: Privacy-Preserving Data Mining -- 14.5.9 User Privacy: Private Information Retrieval -- 14.6 Discrimination Prevention in Data Mining -- References -- Chapter 15: Best Practices and Recommendations for Cybersecurity Service Providers -- 15.1 Introduction: Dilemmas of Cybersecurity Service Providers -- 15.1.1 Example: Dealing with Governmental Malware -- 15.1.2 Dilemmas of Cybersecurity Service Providers -- 15.2 Domains for Policy Implementations -- 15.2.1 Customer Data Handling -- 15.2.2 Information About Breaches , 15.2.3 Threat Intelligence Activities
    Additional Edition: Print version Christen, Markus The Ethics of Cybersecurity Cham : Springer International Publishing AG,c2020 ISBN 9783030290528
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham, Switzerland :Springer Open,
    UID:
    edoccha_BV046305647
    Format: 1 Online-Ressource (xvii, 384 Seiten).
    ISBN: 978-3-030-29053-5
    Series Statement: The international library of ethics, law and technology volume 21
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-29052-8
    Language: English
    Subjects: Philosophy
    RVK:
    Keywords: Computersicherheit ; Ethik ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Christen, Markus 1969-
    Author information: Gordijn, Bert 1965-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cham, Switzerland :Springer Open,
    UID:
    edocfu_BV046305647
    Format: 1 Online-Ressource (xvii, 384 Seiten).
    ISBN: 978-3-030-29053-5
    Series Statement: The international library of ethics, law and technology volume 21
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-29052-8
    Language: English
    Subjects: Philosophy
    RVK:
    Keywords: Computersicherheit ; Ethik ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Christen, Markus 1969-
    Author information: Gordijn, Bert 1965-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    edocfu_9959251767102883
    Format: 1 online resource (384)
    Edition: 1st ed. 2020.
    Series Statement: The International Library of Ethics, Law and Technology, 21
    Content: This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
    Note: Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion. , English.
    Additional Edition: ISBN 3-030-29052-2
    Additional Edition: ISBN 3-030-29053-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    edoccha_9959251767102883
    Format: 1 online resource (384)
    Edition: 1st ed. 2020.
    Series Statement: The International Library of Ethics, Law and Technology, 21
    Content: This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
    Note: Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion. , English.
    Additional Edition: ISBN 3-030-29052-2
    Additional Edition: ISBN 3-030-29053-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783030205287?
Did you mean 9783030050528?
Did you mean 9783030200558?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages