![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Dieses Lehrbuch behandelt im ersten Teil schwerpunktmassig technische Massnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewahrleistung von Anonymitat im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen UEberblick uber gangige Verfahren des Identitatsmanagements (z. B. OpenID Connect) und die in elektronischen Ausweisdokumenten (z. B. im Personalausweis) verwendeten Sicherheitsmassnahmen. Die Datenschutz-Garantien der vermittelten Ansatze werden im Detail behandelt. Im Bereich des World Wide Web erfahrt der Leser, wo die Probleme aus Sicht des Datenschutzes liegen und wie diese Lucken geschlossen werden koennen. Anonyme Bezahlverfahren und eine Untersuchung von Bitcoin runden den technischen Teil des Buches ab. Der Leser lernt Ansatze aus der Praxis kennen, um so je nach Anforderungen in der Systementwicklung das passende Verfahren auswahlen zu koennen. Im zweiten Teil werden die Grundlagen des Datenschutzrechts behandelt. Denn technische Massnahmen sollen unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im Datenschutzrecht koennen technische Massnahmen nicht richtig implementiert werden. Zum besseren Verstandnis erfolgt ein UEberblick uber die Rechtsordnung insgesamt, in die das Datenschutzrecht eingeordnet wird. Betrachtet werden die europaische und die verfassungsrechtliche Dimension des Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der Datenschutz-Grundverordnung. Dabei werden auch besonders haufig vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das Webtracking eroertert. Beispielhaft werden datenschutzrechtliche Falle bearbeitet.
Computers and computer networking provide major benefits to modern society, yet the growing costs of malicious cyber activities and cybersecurity itself diminish these benefits. Advances in cybersecurity are urgently needed to preserve the Internets growing social and economic benefits by thwarting adversaries and strengthening public trust of cyber systems. On December 18, 2014 the President signed into law the Cybersecurity Enhancement Act of 2014. This law requires the National Science and Technology Council (NSTC) and the Networking and Information Technology Research and Development (NITRD) Program to develop and maintain a cybersecurity research and development (R&D) strategic plan (the Plan) using an assessment of risk to guide the overall direction of Federally-funded cybersecurity R&D. This plan satisfies that requirement and establishes the direction for the Federal R&D enterprise in cybersecurity science and technology (S&T) to preserve and expand the Internets wide-ranging benefits. This book reviews the strategy and implementation for research and development of federal cybersecurity.
U. S. critical infrastructures, such as financial institutions, commercial buildings, and energy production and transmission facilities, are systems and assets, whether physical or virtual, vital to the nations security, economy, and public health and safety. To secure these systems and assets, federal policy and the National Infrastructure Protection Plan (NIPP) establish responsibilities for federal agencies designated as Sector-specific agencies (SSAs), including leading, facilitating, or supporting the security and resilience programs and associated activities of their designated critical infrastructure sectors. The objectives of this book are to determine the extent to which SSAs have identified the significance of cyber risks to their respective sectors networks and industrial control systems; taken actions to mitigate cyber risks within their respective sectors; collaborated across sectors to improve cybersecurity; and established performance metrics to monitor improvements in their respective sectors.
Digitale Daten gelten sowohl als Quelle fur Wirtschaftswachstum, Innovation und Arbeitsplatze wie auch als Treiber der datenbasierten Reorganisation praktisch aller gesellschaftlichen Bereiche ("Datafizierung"). Die datenoekonomisch befeuerten Transformationsprozesse des Sozialen werfen dementsprechend vielfaltige Fragen auf: Welche Daten sollen von wem wie verwertbar sein? Wie lasst sich legitime Verfugungsmacht gestalten? Usw. Der Band behandelt diese Fragen aus interdisziplinarer Perspektive.
This book is a study of select issues and laws relating to privacy in the 21st century. Topics examined include an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA); background and issues related to the USA PATRIOT Act reauthorisation on government collection of private information; the United States v. Jones court case involving GPS monitoring, property and privacy; Fourth Amendment implications and legislative responses to drones in domestic surveillance operations; and the privacy and security concerns surrounding smart meter technology.
When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given their prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for up to five years and fines up to $250,000 (and up to $500,000 for organisations). This book provides an overview of federal law governing wiretapping and electronic eavesdropping and the procedures they establish for law enforcement and foreign intelligence gathering purposes. It also appends citations to state law and contains a bibliography of legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). This book consists of public domain documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.
Data collected and distributed on the internet is generally free, non-exclusive, and non-rivalrous. Yet online data is often difficult to access. This book examines the infrastructure for collecting, storing, and distributing data to show how it is embedded behind intellectual property and technological barriers. It proposes that the EU introduce an access and transfer governance right to data that can work in tandem with data protection rules. Chapters explore the subject matter of this protection, potential rights holders and the scope of the protection, and exceptions and limitations under intellectual property law and competition law. Comprehensive and timely, Regulating Access and Transfer of Data, sets the foundations for a new legal system for our data-driven generation.
How we lost control of the internet-and how to win it back. The internet has become a battleground. Although it was unlikely to live up to the hype and hopes of the 1990s, only the most skeptical cynics could have predicted the World Wide Web as we know it today: commercial, isolating, and full of, even fueled by, bias. This was not inevitable. The Gentrification of the Internet argues that much like our cities, the internet has become gentrified, dominated by the interests of business and capital rather than the interests of the people who use it. Jessa Lingel uses the politics and debates of gentrification to diagnose the massive, systemic problems blighting our contemporary internet: erosions of privacy and individual ownership, small businesses wiped out by wealthy corporations, the ubiquitous paywall. But there are still steps we can take to reclaim the heady possibilities of the early internet. Lingel outlines actions that internet activists and everyday users can take to defend and secure more protections for the individual and to carve out more spaces of freedom for the people-not businesses-online.
The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the tenth annual International Conference on Computers, Privacy and Data Protection, CPDP 2017, held in Brussels in January 2017. The book explores Directive 95/46/EU and the GDPR moving from a market framing to a 'treaty-base games frame', the GDPR requirements regarding machine learning, the need for transparency in automated decision-making systems to warrant against wrong decisions and protect privacy, the riskrevolution in EU data protection law, data security challenges of Industry 4.0, (new) types of data introduced in the GDPR, privacy design implications of conversational agents, and reasonable expectations of data protection in Intelligent Orthoses. This interdisciplinary book was written while the implications of the General Data Protection Regulation 2016/679 were beginning to become clear. It discusses open issues, and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in computers, privacy and data protection.
This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990. This book will be of interest to students of IT law as well as to sociologists and criminologists, and those who have a professional concern with preventing computer misuse and fraud.
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information. |
You may like...
Cyber Security and Threats - Concepts…
Information Reso Management Association
Hardcover
R9,416
Discovery Miles 94 160
Privacy and Security Policies in Big…
Sharvari Tamane, Vijender Kumar Solanki, …
Hardcover
R5,297
Discovery Miles 52 970
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R762
Discovery Miles 7 620
Hiding Behind the Keyboard - Uncovering…
Brett Shavers, John Bair
Paperback
R1,202
Discovery Miles 12 020
Intelligent Data Analysis for e-Learning…
Jorge Miguel, Santi Caballe, …
Paperback
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud
Paperback
|