Legal, Ethical & Social Aspects of IT Products

  • Big Data Analytics with Applications in Insider Threat Detection

    By Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan

    Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to…

    Hardback – 2017-12-05 
    Auerbach Publications

  • Death and Digital Media

    By Michael Arnold, Martin Gibbs, Tamara Kohn, James Meese, Bjorn Nansen

    Death and Digital Media provides a critical overview of how people mourn, commemorate and interact with the dead through digital media. It maps the historical and shifting landscape of digital death, considering a wide range of social, commercial and institutional responses to technological…

    Paperback – 2017-12-05 
    Routledge

  • The Politics of Data Transfer

    Transatlantic Conflict and Cooperation over Data Privacy

    By Yuko Suda

    In this book, Yuko Suda examines the Safe Harbor debate, the Passenger Name Record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States. She argues that the Safe…

    Hardback – 2017-12-05 
    Routledge
    Routledge Studies in Global Information, Politics and Society

  • Valuing Data

    An Open Framework

    By Dewey E. Ray

    Data has value, but our accounting methods do not give data a monetary value, and as a result, business executives lack the necessary information to make the most effective decisions about how to best manage and leverage this valuable asset. This book presents a straight-forward, well-researched,…

    Hardback – 2017-11-22 
    Taylor & Francis

  • Supply Chain Risk Management

    Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

    By Anne Kohnke, Ken Sigler, Dan Shoemaker

    The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply…

    Paperback – 2017-11-17 
    Auerbach Publications
    Internal Audit and IT Audit

  • Collaborative Cyber Threat Intelligence

    Detecting and Responding to Advanced Cyber Attacks on National Level

    Edited by Florian Skopik

    Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to…

    Hardback – 2017-11-13 
    Auerbach Publications

  • Cybersecurity Ethics

    An Introduction

    By Mary Manjikian

    This new textbook offers an accessible introduction to the topic of cybersecurity ethics. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks – virtue ethics, utilitarian ethics and communitarian…

    Paperback – 2017-11-07 
    Routledge

  • The Future of Internet Policy

    Edited by Peter Decherney, Victor Pickard

    All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across…

    Paperback – 2017-11-05 
    Routledge

  • Anti-Spam Techniques Based on Artificial Immune System

    By Ying Tan

    Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial…

    Paperback – 2017-11-01 
    CRC Press

  • Study Guide for TOGAF 9.1 Certifications

    By B. V. Kumar

    This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who are keen in getting themselves certified in ‘The TOGAF Foundation Certification’ and ‘The TOGAF Certified Certification’ will find this book useful. The contents of the book…

    Hardback – 2017-10-31 
    Chapman and Hall/CRC

  • Ethics and Security Automata

    Policy and Technical Challenges of the Robotic Use of Force

    By Sean Welsh

    Can security automata (robots and AIs) make moral decisions to apply force on humans correctly? If they can make such decisions, ought they be used to do so? Will security automata increase or decrease aggregate risk to humans? What regulation is appropriate? Addressing these important issues this…

    Hardback – 2017-10-31 
    Routledge
    Emerging Technologies, Ethics and International Affairs

  • Cybercrime and Digital Forensics

    An Introduction, 2nd Edition

    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of…

    Paperback – 2017-10-30 
    Routledge

Product Search