Socioeconomic and legal implications of electronic intrusion
"This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher.
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2009.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- 1. The socioeconomic background of electronic crime / Maria Karyda
- 2. Intrusion in the sphere of personal communications / Judith Rauhofer
- 3. Criminal sanctions against electronic intrusion / Irini E. Vassilaki
- 4. Protecting identity without comprising privacy : privacy implications of identity protection / Ioannis Iglezakis
- 5. RFID technology and its impact on privacy : is society one step before the disappearance of personal data protection? / Tatiana-Eleni Sinodinou
- 6. How much is too much? : how marketing professionals can avoid violating privacy laws by understanding the privacy principles / Nicholas P. Robinson, Prescott C. Ensign
- 7. Navigating in Internet : privacy and the "transparent" individual / Christina Akrivopoulou, Aris Stylianou
- 8. Controlling electronic intrusion by unsolicited unwanted bulk spam : privacy vs. freedom of communication / Phaedon John Kozyris
- 9. Cyberproperty in the United States : trespass to chattels & new technology / Greg Lastowska
- 10. Digital forensics and the chain of custody to counter cybercrime / Andreas Mitrakas, Damián Zaitch
- 11. An analysis of privacy and security in the Zachman and federal enterprise architecture frameworks / Richard V. McCarthy
- 12. Surveillance in the 21st century : integration of law and technology / Pieter Kleve, Richard V. De Mulder, Kees van Noortwijk
- 13. Designing light weight intrusion detection systems : non-negative matrix factorization approach / Václav Snášel, Jan Platoš, Pavel Krömer, Ajith Abraham
- 14. Data mining of personal information : a taste of the intrusion legacy with a sprinkling of semantic Web / Dionysios Politis
- 15. Surveillance of employees' electronic communications in the workplace : an employers' right to spy or an invasion to privacy? / Ioannis Iglezakis
- 16. Forensic watermarking for secure multimedia distribution / Farook Sattar, Dan Yu
- 17. Spam and advertisement : proposing a model for charging intrusion / Dionysios Politis
- 18. European e-signatures solutions on the basis of PKI authentication technology / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, Stergios P. Chochliouros, Konstantinos N. Voudouris
- 19. Security of alternative delivery channels in banking : issues and countermeasures / Manish Gupta, H. Raghav Rao, Shambhu Upadhyaya.