Avoidance, Causes and Possible Cures
Buch, Englisch, 184 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 477 g
ISBN: 978-0-387-34589-5
Verlag: Springer US
While a plethora of books on identity theft exists, this professional book combines both technical and economic aspects, presented from the perspective of the identified individual. The book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and placing biometric security in an economically broken system, which results in a broken biometric system. The last chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status.
Zielgruppe
Computer Communication Networks, Data Structures, Cryptology and Information Theory, Data Encryption, Coding and Information Theory, Economics/Management Science, general, Economic Systems, Camp, Economics, Identity, Theft, Good name, value, privacy
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Business Application Unternehmenssoftware SAP
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftssysteme, Wirtschaftsstrukturen
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
Weitere Infos & Material
Identity in Economics, and in Context.- Modern Technological and Traditional Social Identities.- Identity Theft.- Who Owns You?.- Defeating the Greatest Masquerade.- Secrecy, Privacy, Identity.- Security and Privacy as Market Failures.- Trusting Code and Trusting Hardware.- Technologies of Identity.- Anonymous Identifiers.- Digital Signatures.- Strengths and Weaknesses of Biometrics.- Reputation.- Scenario I: Your Credentials Please.- Scenario II: Universal National Identifier.- Scenario III: Sets of attributes.- Scenario IV: Ubiquitous Identity Theft.- Closing.