Golumbic | Fighting Terror Online | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 178 Seiten

Golumbic Fighting Terror Online

The Convergence of Security, Technology, and the Law
1. Auflage 2007
ISBN: 978-0-387-73578-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

The Convergence of Security, Technology, and the Law

E-Book, Englisch, 178 Seiten

ISBN: 978-0-387-73578-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror. It identifies the threats, the security needs, and the issues unique to this environment. The book examines whether the characteristics of this environment require new legal solutions, or whether existing solutions are sufficient. Three areas of online activity are identified that require reexamination: security, monitoring, and propaganda.

Martin Charles Golumbic is Professor of Computer Science and Director of the Caesarea Edmond Benjamin de Rothschild Foundation Institute for Interdisciplinary Applications of Computer Science at the University of Haifa. He is the editor of the book 'Advances in Artificial Intelligence, Natural Language and Knowledge-based Systems' (Springer, 1990), the author of the book 'Algorithmic Graph Theory and Perfect Graphs' (second edition, Elsevier 2004), coauthor of a second book 'Tolerance Graphs' (Cambridge University Press, 2004), and the founding editor-in-chief of the journal series 'Annals of Mathematics and Artificial Intelligence' (Springer). Professor Golumbic received his Ph.D. in mathematics from Columbia University in 1975, and has previously held positions at New York University, Bell Laboratories, IBM Israel and Bar-Ilan University as well as visiting positions at Université de Paris, the Weizmann Institute of Science, and Ecole Polytechnique Fédérale de Lausanne. He has given guest lectures in 15 states in the U.S.A. and in 20 other countries, and he was elected as a Fellow of the European Artificial Intelligence society ECCAI in 2005.

Golumbic Fighting Terror Online jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Foreword;5
2;Preface;7
3;Acknowledgments;8
4;Contents;10
5;Introduction;13
5.1;Global Wars in a Global Information Environment;13
5.2;The Decline of the State;16
5.3;The Comeback of the State;18
5.4;Balancing Wars through the Law;20
5.5;Digital Law;22
5.6;The Law of DigitalWars;24
5.7;An Outline of the Book;24
6;The Balance Between Security and Civil Rights;26
6.1;1.1 Mapping the Threats: Preventing Physical and Virtual Terrorist Attacks;27
6.2;1.2 Designing Policies to Address New Security Threats;29
6.2.1;1.2.1 Information Warfare;30
6.2.2;1.2.2 Data Security;33
6.2.3;1.2.3 Gathering Information and Surveillance;35
6.2.4;1.2.4 Regulation of Encryption Products;39
6.2.5;1.2.5 Terror Propaganda;41
6.3;1.3 Preserving Civil Liberties;48
6.3.1;1.3.1 The Right to Privacy;49
6.3.2;1.3.2 Freedom of Expression;55
6.3.3;1.3.3 Enforcement;60
6.4;1.4 Electronic Commerce and Innovation;67
6.4.1;1.4.1 Ramifications for Research and Development;67
6.4.2;1.4.2 Encryption Regulation and Electronic Commerce;69
7;The Legal Situation: Prevention and Enforcement in the Information Age;73
7.1;2.1 The International Scene ;74
7.1.1;2.1.1 Protection of the Right to Privacy;74
7.1.2;2.1.2 International Regulation for Protection of Personal Data;75
7.1.3;2.1.3 International Regulation of Encryption Products;78
7.1.4;2.1.4 International Regulation of Decryption Products;78
7.2;2.2 The United States ;79
7.2.1;2.2.1 Protection of the Right to Privacy;79
7.2.2;2.2.2 Protection of the Freedom of Speech;84
7.2.3;2.2.3 American Regulation of Encryption Products;90
7.2.4;2.2.4 American Regulation of Decryption Products;95
7.3;2.3 The European Union;98
7.3.1;2.3.1 Protection of the Right to Privacy;99
7.3.2;2.3.2 EU Regulation of Encryption;105
7.3.3;2.3.3 EU Regulation of Copyright;109
7.4;2.4 Other Countries ;112
7.4.1;2.4.1 Britain;112
7.4.2;2.4.2 Canada;114
7.4.3;2.4.3 Australia;115
8;The Legal Framework in Israel;116
8.1;3.1 The Right to Privacy;116
8.1.1;3.1.1 Search and Seizure;117
8.1.2;3.1.2 Secret Monitoring in Israeli Law;119
8.2;3.2 Freedom of Speech;128
8.2.1;3.2.1 Liability of Service Providers;128
8.2.2;3.2.2 Enforcement of Hacking Prohibitions;131
8.3;3.3 Israeli Regulation of Encryption;133
8.3.1;3.3.1 The Framework of the Legal Arrangements up to 1998;134
8.3.2;3.3.2 The Framework of the Legal Arrangements After 1998;137
8.4;3.4 Freedom of Occupation;141
8.5;3.5 Property Rights;144
9;Technological Issues;146
9.1;4.1 What is Encryption? The Technological Basis;146
9.2;4.2 The Basic Principle of Encryption: Letter Replacement;148
9.3;4.3 Symmetrical Encryption;148
9.4;4.4 Asymmetrical Encryption: Public Key and Private Key ;150
9.4.1;4.4.1 The RSA Encryption Method;150
9.4.2;4.4.2 Analysis of the RSA Method;151
9.5;4.5 How is Information Gathered on the Internet?;155
9.5.1;4.5.1 General Background;155
9.5.2;4.5.2 Means of Collecting Information and Monitoring the Internet;157
9.5.3;4.5.3 Collection of information on the server or the PC;161
10;Recommendations: Is There a Need for New Regulations?;164
10.1;5.1 The Existing System’s Suitability for the Internet;164
10.2;5.2 Implementing Existing Legal Regulations for the Internet;165
10.3;5.3 Protecting the Right to Privacy;166
10.4;5.4 The Liability of Internet Service Providers;168
10.5;5.5 Regulating Encryption Products to Protect Freedom of Occupation and Property Rights;169
11;Concluding Remarks;174
12;Name Index;177
13;Subject Index;180



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.