|
|
|
|
LEADER |
05027nam a2200685 a 4500 |
001 |
29874 |
003 |
IGIG |
005 |
20100727175404.0 |
006 |
m e d |
007 |
cr cn||||m|||a |
008 |
100719s2009 paua fsb 001 0 eng d |
010 |
# |
# |
|z 2008043297
|
016 |
7 |
# |
|a 015118177
|2 Uk
|
020 |
# |
# |
|a 9781605662053 (PDF)
|
020 |
# |
# |
|a 1605662054 (PDF)
|
020 |
# |
# |
|z 9781605662046 (hardcover)
|
020 |
# |
# |
|z 1605662046 (hardcover)
|
020 |
# |
# |
|z 9781616925000 (softcover)
|
024 |
7 |
# |
|a 10.4018/978-1-60566-204-6
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00542348
|
035 |
# |
# |
|a (OCoLC)707616585
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HV6773
|b .S635 2009e
|
082 |
0 |
4 |
|a 364.16/8
|2 22
|
245 |
0 |
0 |
|a Socioeconomic and legal implications of electronic intrusion
|c [edited by] Dionysios Politis, Phaedon Kozyris, Ioannis Iglezakis.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2009.
|
300 |
# |
# |
|a electronic texts (xix, 367 p. : ill. (some col.)) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references (p. 328-356) and index.
|
505 |
0 |
# |
|a 1. The socioeconomic background of electronic crime / Maria Karyda -- 2. Intrusion in the sphere of personal communications / Judith Rauhofer -- 3. Criminal sanctions against electronic intrusion / Irini E. Vassilaki -- 4. Protecting identity without comprising privacy : privacy implications of identity protection / Ioannis Iglezakis -- 5. RFID technology and its impact on privacy : is society one step before the disappearance of personal data protection? / Tatiana-Eleni Sinodinou -- 6. How much is too much? : how marketing professionals can avoid violating privacy laws by understanding the privacy principles / Nicholas P. Robinson, Prescott C. Ensign -- 7. Navigating in Internet : privacy and the "transparent" individual / Christina Akrivopoulou, Aris Stylianou -- 8. Controlling electronic intrusion by unsolicited unwanted bulk spam : privacy vs. freedom of communication / Phaedon John Kozyris -- 9. Cyberproperty in the United States : trespass to chattels & new technology / Greg Lastowska -- 10. Digital forensics and the chain of custody to counter cybercrime / Andreas Mitrakas, Damián Zaitch -- 11. An analysis of privacy and security in the Zachman and federal enterprise architecture frameworks / Richard V. McCarthy -- 12. Surveillance in the 21st century : integration of law and technology / Pieter Kleve, Richard V. De Mulder, Kees van Noortwijk --
|
505 |
0 |
# |
|a 13. Designing light weight intrusion detection systems : non-negative matrix factorization approach / Václav Snášel, Jan Platoš, Pavel Krömer, Ajith Abraham -- 14. Data mining of personal information : a taste of the intrusion legacy with a sprinkling of semantic Web / Dionysios Politis -- 15. Surveillance of employees' electronic communications in the workplace : an employers' right to spy or an invasion to privacy? / Ioannis Iglezakis -- 16. Forensic watermarking for secure multimedia distribution / Farook Sattar, Dan Yu -- 17. Spam and advertisement : proposing a model for charging intrusion / Dionysios Politis -- 18. European e-signatures solutions on the basis of PKI authentication technology / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, Stergios P. Chochliouros, Konstantinos N. Voudouris -- 19. Security of alternative delivery channels in banking : issues and countermeasures / Manish Gupta, H. Raghav Rao, Shambhu Upadhyaya.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on July 19, 2010).
|
650 |
# |
0 |
|a Computer crimes
|x Social aspects.
|
650 |
# |
0 |
|a Computer crimes.
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Consumer protection.
|
650 |
# |
0 |
|a SPAM (Electronic mail)
|x Law and legislation.
|
650 |
# |
0 |
|a Privacy, Right of.
|
650 |
# |
0 |
|a Identity theft.
|
653 |
# |
# |
|a Cyberproperty
|
653 |
# |
# |
|a Digital forensics
|
653 |
# |
# |
|a Electronic crime
|
653 |
# |
# |
|a Electronic intrusion
|
653 |
# |
# |
|a Forensic watermarking
|
653 |
# |
# |
|a Internet privacy
|
653 |
# |
# |
|a Intrusion detection systems
|
653 |
# |
# |
|a Privacy implications of identity protection
|
653 |
# |
# |
|a Privacy laws and principles
|
653 |
# |
# |
|a Surveillance
|
653 |
# |
# |
|a Unsolicited unwanted bulk spam
|
700 |
1 |
# |
|a Politis, Dionysios.
|
700 |
1 |
# |
|a Kozyris, Phaedon J.
|q (Phaedon John)
|
700 |
1 |
# |
|a Iglezakis, Ioannis,
|d 1965-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2008043297
|z 9781605662046
|z 1605662046
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-204-6
|z View fulltext via EzAccess
|