Description |
1 online resource (381 pages) |
Contents |
Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 -- Introduction; Chapter 2 -- An Explanation of the Internet, Computers, and Data Mining; Chapter 3 -- Norms and Markets; Chapter 4 -- Informational Privacy: The General Theory; Chapter 5 -- Informational Privacy: Norms and Value Optimality; Chapter 6 -- Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 -- Software Vulnerabilities: Creating Best Practices; Chapter 8 -- Computers and Networks: Attack and Defense; Chapter 9 -- Malware, Norms, and ISPs |
|
Chapter 10 -- Malware: Creating a Best Practices NormChapter 11 -- Tracking, Contracting, and Behavioral Advertising; Chapter 12 -- From One-Sided Chicken to Value Optimal Norms; Back Cover |
Summary |
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors-two renowned experts on computer security and law-explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Internet -- Moral and ethical aspects
|
|
Privacy, Right of.
|
|
Computer security
|
|
Data protection.
|
|
Computer security
|
|
Data protection
|
|
Internet -- Moral and ethical aspects
|
|
Privacy, Right of
|
Form |
Electronic book
|
ISBN |
9781439830147 |
|
1439830142 |
|
9781439830130 |
|
1439830134 |
|