Legal, Ethical & Social Aspects of IT Products

  • Internet Governance

    A Human Rights Perspective

    By Catherine Easton

    This book will provide critical insights into Internet governance through an in-depth examination of human rights law. The term Internet governance is used to describe the interlinked processes that steer the growth and development of the Internet. The Internet is unique as a user-generated,…

    Hardback – 2017-02-01 
    Routledge Research in Information Technology and E-Commerce Law

  • Social Networks as the New Frontier of Terrorism


    By Laura Scaife

    Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer- influencing the way…

    Hardback – 2017-01-23 
    Routledge Research in Information Technology and E-Commerce Law

  • Ethics and the Internal Auditor's Political Dilemma

    Tools and Techniques to Evaluate a Company's Ethical Culture

    By Lynn Fountain

    This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA…

    Paperback – 2017-01-06 
    Auerbach Publications
    Internal Audit and IT Audit

  • Information Security Management Systems

    A Novel Framework and Software as a Tool for Compliance with Information Security Standard

    By Heru Susanto, Mohammad Nabil Almunawar

    This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness…

    Hardback – 2016-12-31 
    Apple Academic Press

  • Real-World Electronic Voting

    Design, Analysis and Deployment

    Edited by Feng Hao, Peter Y. A. Ryan

    Real-world Electronic Voting captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting. This book explores recent innovations in both…

    Hardback – 2016-12-21 
    Auerbach Publications
    Series in Security, Privacy and Trust

  • The Data Protection Officer

    Profession, Rules, and Role

    By Paul Lambert

    The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and…

    Hardback – 2016-12-21 
    Auerbach Publications

  • Biometrics in a Data Driven World

    Trends, Technologies, and Challenges

    Edited by Sinjini Mitra, Mikhail Gofman

    Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of…

    Hardback – 2016-12-19 
    Chapman and Hall/CRC

  • Internal Audit Practice from A to Z

    By Patrick Onwura Nzechukwu

    This book addresses the practice of internal auditing using GAAS (Generally Accepted Auditing Standards), GAGAS (Generally Accepted Government Auditing Standards) and International Standards for the Professional Practice of Internal Auditing (Standards) as enunciated by the IIA. Unique in that it…

    Hardback – 2016-12-16 
    Auerbach Publications
    Internal Audit and IT Audit

  • The Routledge Handbook of Technology, Crime and Justice

    Edited by M. R. McGuire, Thomas J. Holt

    Technology has become increasingly important to both the function and our understanding of the justice process. Many forms of criminal behaviour are highly dependent upon technology, and crime control has become a predominantly technologically driven process - one where ‘traditional’ technological…

    Hardback – 2016-12-15 
    Routledge International Handbooks

  • Guide to Pairing-Based Cryptography

    Edited by Nadia El Mrabet, Marc Joye

    This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite…

    Hardback – 2016-12-13 
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Protecting Mobile Networks and Devices

    Challenges and Solutions

    Edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou

    This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking…

    Hardback – 2016-12-09 
    Auerbach Publications
    Series in Security, Privacy and Trust

  • Private Investigation and Homeland Security

    By Daniel J. Benny

    The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of…

    Hardback – 2016-12-09 
    CRC Press

Product Search