Umfang:
1 online resource (xxiii, 354 pages)
ISBN:
9781439830147
,
1439830142
,
1439830134
,
9781439830130
,
9780429093791
,
0429093799
,
9781466548039
,
1466548037
,
9781138436923
,
1138436925
,
9781000218640
,
1000218643
,
9781299875692
,
1299875696
Inhalt:
Ch. 1. Introduction -- ch. 2. An explanation of the internet, computers, and data mining -- ch. 3. Norms and markets -- ch. 4. Informational privacy : the general theory -- ch. 5. Informational privacy : norms and value optimality -- ch. 6. Software vulnerabilities and the low-priced software norm -- ch. 7. Software vulnerabilities : creating best practices -- ch. 8. Computers and networks : attack and defense -- ch. 9. Malware, norms, and ISPs -- ch. 10. Malware : creating a best practices norm -- ch. 11. Tracking, contracting, and behavioral advertising -- ch. 12. From one-sided chicken to value optimal norms.
Inhalt:
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security.
Anmerkung:
Includes bibliographical references
Weitere Ausg.:
ISBN 9781439830130
Weitere Ausg.:
Erscheint auch als Druck-Ausgabe ISBN 9781439830130
Sprache:
Englisch
Schlagwort(e):
Electronic books