Unauthorized Access
Proposal review
The Crisis in Online Privacy and Security
dc.contributor.author | Sloan, Robert H. | |
dc.contributor.author | Warner, Richard | |
dc.date.accessioned | 2020-09-21T13:37:14Z | |
dc.date.available | 2020-09-21T13:37:14Z | |
dc.date.issued | 2014 | |
dc.identifier | ONIX_20200921_9781439830147_40 | |
dc.identifier.uri | https://library.oapen.org/handle/20.500.12657/41680 | |
dc.description.abstract | Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. | |
dc.language | English | |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMK Games development and programming | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption | en_US |
dc.subject.other | CHOICE Highly Recommended Title | |
dc.subject.other | Data Preparation and Mining | |
dc.subject.other | IT Security | |
dc.subject.other | Cryptology | |
dc.subject.other | InfoSECURITY | |
dc.subject.other | SCI-TECH | |
dc.subject.other | COMPUTERSCIENCE | |
dc.subject.other | ITECH | |
dc.subject.other | INFORMATIONSCIENCE | |
dc.subject.other | STM | |
dc.subject.other | deep | |
dc.subject.other | defense | |
dc.subject.other | inspection | |
dc.subject.other | malware | |
dc.subject.other | norm | |
dc.subject.other | optimal | |
dc.subject.other | packet | |
dc.subject.other | perfect | |
dc.subject.other | software | |
dc.subject.other | vulnerabilities | |
dc.title | Unauthorized Access | |
dc.title.alternative | The Crisis in Online Privacy and Security | |
dc.type | book | |
oapen.identifier.doi | 10.1201/b15148 | |
oapen.relation.isPublishedBy | 7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb | |
oapen.imprint | CRC Press | |
oapen.pages | 398 | |
peerreview.anonymity | Single-anonymised | |
peerreview.id | bc80075c-96cc-4740-a9f3-a234bc2598f1 | |
peerreview.open.review | No | |
peerreview.publish.responsibility | Publisher | |
peerreview.review.stage | Pre-publication | |
peerreview.review.type | Proposal | |
peerreview.reviewer.type | Internal editor | |
peerreview.reviewer.type | External peer reviewer | |
peerreview.title | Proposal review | |
oapen.review.comments | Taylor & Francis open access titles are reviewed as a minimum at proposal stage by at least two external peer reviewers and an internal editor (additional reviews may be sought and additional content reviewed as required). |