The Secure Information Society: Ethical, Legal and Political Challenges

Author:   Jörg Krüger ,  Bertram Nickolay ,  Sandro Gaycken
Publisher:   Springer London Ltd
Edition:   2013 ed.
ISBN:  

9781447158417


Pages:   214
Publication Date:   14 December 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $290.37 Quantity:  
Add to Cart

Share |

The Secure Information Society: Ethical, Legal and Political Challenges


Add your own review!

Overview

In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.

Full Product Details

Author:   Jörg Krüger ,  Bertram Nickolay ,  Sandro Gaycken
Publisher:   Springer London Ltd
Imprint:   Springer London Ltd
Edition:   2013 ed.
Dimensions:   Width: 15.50cm , Height: 1.20cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9781447158417


ISBN 10:   1447158415
Pages:   214
Publication Date:   14 December 2014
Audience:   College/higher education ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Preface.- Section 1 – New Strategic Cybersecurity.- Between War & Peace: Considering the Statecraft of Cyberspace.- Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps.- Section 2 – New Regulatory Cybersecurity.- Duties of Care on the Internet.- The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R).- Data Insecurity: Scams, Blags & Scalawags.- Section 3 – New Technological Cybersecurity.- Content Analysis in the Digital Age: Tools, Functions, and Implications for Security.- Secure Products Using Inherent Features.- Assistant-based Reconstruction of Believed Destroyed Shredded Documents.- In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains.

Reviews

Brad Reid, Lipscomb University, Nashville, TN, USA Excerpts from full review posted May 24 2013 to Computing Reviews [Review #: CR141243] Readers seeking insight into the relationship between society s use of information and information technology will find useful content Interdisciplinary dialogue is necessary, and the collection contributes to the conversation. The book adds to the available knowledge on ethical, legal, and political issues connected to secure information, and will be beneficial to multiple constituencies.


Brad Reid, Lipscomb University, Nashville, TN, USAExcerpts from full review posted May 24 2013 to Computing Reviews [Review #: CR141243]Readers seeking insight into the relationship between society's use of information and information technology will find useful content... Interdisciplinary dialogue is necessary, and the collection contributes to the conversation. The book adds to the available knowledge on ethical, legal, and political issues connected to secure information, and will be beneficial to multiple constituencies.


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List