Cargando…

The Secure Information Society Ethical, Legal and Political Challenges /

In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Krüger, Jörg (Editor ), Nickolay, Bertram (Editor ), Gaycken, Sandro (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Springer London : Imprint: Springer, 2013.
Edición:1st ed. 2013.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4471-4763-3
003 DE-He213
005 20220115215551.0
007 cr nn 008mamaa
008 121116s2013 xxk| s |||| 0|eng d
020 |a 9781447147633  |9 978-1-4471-4763-3 
024 7 |a 10.1007/978-1-4471-4763-3  |2 doi 
050 4 |a QA76.9.C66 
072 7 |a UBJ  |2 bicssc 
072 7 |a COM079000  |2 bisacsh 
072 7 |a UBJ  |2 thema 
082 0 4 |a 303.4834  |2 23 
245 1 4 |a The Secure Information Society  |h [electronic resource] :  |b Ethical, Legal and Political Challenges /  |c edited by Jörg Krüger, Bertram Nickolay, Sandro Gaycken. 
250 |a 1st ed. 2013. 
264 1 |a London :  |b Springer London :  |b Imprint: Springer,  |c 2013. 
300 |a X, 214 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Preface -- Section 1 - New Strategic Cybersecurity -- Between War & Peace: Considering the Statecraft of Cyberspace -- Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps -- Section 2 - New Regulatory Cybersecurity -- Duties of Care on the Internet -- The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R) -- Data Insecurity: Scams, Blags & Scalawags -- Section 3 - New Technological Cybersecurity -- Content Analysis in the Digital Age: Tools, Functions, and Implications for Security -- Secure Products Using Inherent Features -- Assistant-based Reconstruction of Believed Destroyed Shredded Documents -- In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains. 
520 |a In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead. 
650 0 |a Computers and civilization. 
650 0 |a Telecommunication. 
650 0 |a Technology-Philosophy. 
650 0 |a Economic development. 
650 0 |a Political science. 
650 1 4 |a Computers and Society. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Philosophy of Technology. 
650 2 4 |a Economic Development, Innovation and Growth. 
650 2 4 |a Political Science. 
700 1 |a Krüger, Jörg.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Nickolay, Bertram.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Gaycken, Sandro.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781447147640 
776 0 8 |i Printed edition:  |z 9781447158417 
776 0 8 |i Printed edition:  |z 9781447147626 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4471-4763-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)