Buch, Englisch, 214 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 4616 g
Ethical, Legal and Political Challenges
Buch, Englisch, 214 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 4616 g
ISBN: 978-1-4471-4762-6
Verlag: Springer
Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Sozialwissenschaften Politikwissenschaft Politische Kultur Menschenrechte, Bürgerrechte
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
Weitere Infos & Material
Preface.- Section 1 – New Strategic Cybersecurity.- Between War & Peace: Considering the Statecraft of Cyberspace.- Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps.- Section 2 – New Regulatory Cybersecurity.- Duties of Care on the Internet.- The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R).- Data Insecurity: Scams, Blags & Scalawags.- Section 3 – New Technological Cybersecurity.- Content Analysis in the Digital Age: Tools, Functions, and Implications for Security.- Secure Products Using Inherent Features.- Assistant-based Reconstruction of Believed Destroyed Shredded Documents.- In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains.