Socioeconomic and legal implications of electronic intrusion

"This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Politis, Dionysios., Kozyris, Phaedon J., Iglezakis, Ioannis, 1965-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 05027nam a2200685 a 4500
001 29874
003 IGIG
005 20100727175404.0
006 m e d
007 cr cn||||m|||a
008 100719s2009 paua fsb 001 0 eng d
010 # # |z 2008043297 
016 7 # |a 015118177  |2 Uk 
020 # # |a 9781605662053 (PDF) 
020 # # |a 1605662054 (PDF) 
020 # # |z 9781605662046 (hardcover) 
020 # # |z 1605662046 (hardcover) 
020 # # |z 9781616925000 (softcover) 
024 7 # |a 10.4018/978-1-60566-204-6  |2 doi 
035 # # |a (CaBNVSL)gtp00542348 
035 # # |a (OCoLC)707616585 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a HV6773  |b .S635 2009e 
082 0 4 |a 364.16/8  |2 22 
245 0 0 |a Socioeconomic and legal implications of electronic intrusion  |c [edited by] Dionysios Politis, Phaedon Kozyris, Ioannis Iglezakis.  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2009. 
300 # # |a electronic texts (xix, 367 p. : ill. (some col.)) :  |b digital files. 
504 # # |a Includes bibliographical references (p. 328-356) and index. 
505 0 # |a 1. The socioeconomic background of electronic crime / Maria Karyda -- 2. Intrusion in the sphere of personal communications / Judith Rauhofer -- 3. Criminal sanctions against electronic intrusion / Irini E. Vassilaki -- 4. Protecting identity without comprising privacy : privacy implications of identity protection / Ioannis Iglezakis -- 5. RFID technology and its impact on privacy : is society one step before the disappearance of personal data protection? / Tatiana-Eleni Sinodinou -- 6. How much is too much? : how marketing professionals can avoid violating privacy laws by understanding the privacy principles / Nicholas P. Robinson, Prescott C. Ensign -- 7. Navigating in Internet : privacy and the "transparent" individual / Christina Akrivopoulou, Aris Stylianou -- 8. Controlling electronic intrusion by unsolicited unwanted bulk spam : privacy vs. freedom of communication / Phaedon John Kozyris -- 9. Cyberproperty in the United States : trespass to chattels & new technology / Greg Lastowska -- 10. Digital forensics and the chain of custody to counter cybercrime / Andreas Mitrakas, Damián Zaitch -- 11. An analysis of privacy and security in the Zachman and federal enterprise architecture frameworks / Richard V. McCarthy -- 12. Surveillance in the 21st century : integration of law and technology / Pieter Kleve, Richard V. De Mulder, Kees van Noortwijk -- 
505 0 # |a 13. Designing light weight intrusion detection systems : non-negative matrix factorization approach / Václav Snášel, Jan Platoš, Pavel Krömer, Ajith Abraham -- 14. Data mining of personal information : a taste of the intrusion legacy with a sprinkling of semantic Web / Dionysios Politis -- 15. Surveillance of employees' electronic communications in the workplace : an employers' right to spy or an invasion to privacy? / Ioannis Iglezakis -- 16. Forensic watermarking for secure multimedia distribution / Farook Sattar, Dan Yu -- 17. Spam and advertisement : proposing a model for charging intrusion / Dionysios Politis -- 18. European e-signatures solutions on the basis of PKI authentication technology / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, Stergios P. Chochliouros, Konstantinos N. Voudouris -- 19. Security of alternative delivery channels in banking : issues and countermeasures / Manish Gupta, H. Raghav Rao, Shambhu Upadhyaya. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on July 19, 2010). 
650 # 0 |a Computer crimes  |x Social aspects. 
650 # 0 |a Computer crimes. 
650 # 0 |a Computer networks  |x Security measures. 
650 # 0 |a Consumer protection. 
650 # 0 |a SPAM (Electronic mail)  |x Law and legislation. 
650 # 0 |a Privacy, Right of. 
650 # 0 |a Identity theft. 
653 # # |a Cyberproperty 
653 # # |a Digital forensics 
653 # # |a Electronic crime 
653 # # |a Electronic intrusion 
653 # # |a Forensic watermarking 
653 # # |a Internet privacy 
653 # # |a Intrusion detection systems 
653 # # |a Privacy implications of identity protection 
653 # # |a Privacy laws and principles 
653 # # |a Surveillance 
653 # # |a Unsolicited unwanted bulk spam 
700 1 # |a Politis, Dionysios. 
700 1 # |a Kozyris, Phaedon J.  |q (Phaedon John) 
700 1 # |a Iglezakis, Ioannis,  |d 1965- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2008043297  |z 9781605662046  |z 1605662046 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-204-6  |z View fulltext via EzAccess