Legal, Ethical & Social Aspects of IT Products

  • Measurable and Composable Security, Privacy, and Dependability

    The SHIELD Methodology

    Edited by Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria

    With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the SPD requirements raised from existing and future IoT and M2M systems. On this baseline, it proposes a new approach to embedded systems SPD, the SHIELD philosophy, that relies on an…

    Hardback – 2018-01-09 
    CRC Press

  • Information Security Management Systems

    A Novel Framework and Software as a Tool for Compliance with Information Security Standard

    By Heru Susanto, Mohammad Nabil Almunawar

    This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness…

    Hardback – 2017-12-15 
    Apple Academic Press

  • A Socio-Legal Study of Hacking

    Breaking and Remaking Law and Technology

    By Michael Anthony C. Dizon

    The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital…

    Hardback – 2017-12-08 
    Routledge
    Law, Science and Society

  • The Politics of Data Transfer

    Transatlantic Conflict and Cooperation over Data Privacy

    By Yuko Suda

    In this book, Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States. She argues that the Safe…

    Hardback – 2017-12-06 
    Routledge
    Routledge Studies in Global Information, Politics and Society

  • Big Data Analytics with Applications in Insider Threat Detection

    By Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan

    Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to…

    Hardback – 2017-12-05 
    Auerbach Publications

  • Death and Digital Media

    By Michael Arnold, Martin Gibbs, Tamara Kohn, James Meese, Bjorn Nansen

    Death and Digital Media provides a critical overview of how people mourn, commemorate and interact with the dead through digital media. It maps the historical and shifting landscape of digital death, considering a wide range of social, commercial and institutional responses to technological…

    Paperback – 2017-12-05 
    Routledge

  • Valuing Data

    An Open Framework

    By Dewey E. Ray

    Data has value, but our accounting methods do not give data a monetary value, and as a result, business executives lack the necessary information to make the most effective decisions about how to best manage and leverage this valuable asset. This book presents a straight-forward, well-researched,…

    Hardback – 2017-11-22 
    Taylor & Francis

  • Supply Chain Risk Management

    Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

    By Ken Sigler, Dan Shoemaker, Anne Kohnke

    The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply…

    Paperback – 2017-11-13 
    Auerbach Publications
    Internal Audit and IT Audit

  • Ethics and Security Automata

    Policy and Technical Challenges of the Robotic Use of Force

    By Sean Welsh

    Can security automata (robots and AIs) make moral decisions to apply force on humans correctly? If they can make such decisions, ought they be used to do so? Will security automata increase or decrease aggregate risk to humans? What regulation is appropriate? Addressing these important issues this…

    Hardback – 2017-11-10 
    Routledge
    Emerging Technologies, Ethics and International Affairs

  • Fraud Hotlines

    Design, Performance, and Assessment

    By Chelsea A. Binns

    This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the performance of fraud hotlines.…

    Hardback – 2017-11-08 
    Auerbach Publications

  • The Future of Internet Policy

    Edited by Peter Decherney, Victor Pickard

    All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across…

    Paperback – 2017-11-05 
    Routledge

  • Anti-Spam Techniques Based on Artificial Immune System

    By Ying Tan

    Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial…

    Paperback – 2017-11-01 
    CRC Press

Product Search