Socioeconomic and legal implications of electronic intrusion

"This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Politis, Dionysios., Kozyris, Phaedon J., Iglezakis, Ioannis, 1965-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Subjects:
Online Access:View fulltext via EzAccess
Table of Contents:
  • 1. The socioeconomic background of electronic crime / Maria Karyda
  • 2. Intrusion in the sphere of personal communications / Judith Rauhofer
  • 3. Criminal sanctions against electronic intrusion / Irini E. Vassilaki
  • 4. Protecting identity without comprising privacy : privacy implications of identity protection / Ioannis Iglezakis
  • 5. RFID technology and its impact on privacy : is society one step before the disappearance of personal data protection? / Tatiana-Eleni Sinodinou
  • 6. How much is too much? : how marketing professionals can avoid violating privacy laws by understanding the privacy principles / Nicholas P. Robinson, Prescott C. Ensign
  • 7. Navigating in Internet : privacy and the "transparent" individual / Christina Akrivopoulou, Aris Stylianou
  • 8. Controlling electronic intrusion by unsolicited unwanted bulk spam : privacy vs. freedom of communication / Phaedon John Kozyris
  • 9. Cyberproperty in the United States : trespass to chattels & new technology / Greg Lastowska
  • 10. Digital forensics and the chain of custody to counter cybercrime / Andreas Mitrakas, Damián Zaitch
  • 11. An analysis of privacy and security in the Zachman and federal enterprise architecture frameworks / Richard V. McCarthy
  • 12. Surveillance in the 21st century : integration of law and technology / Pieter Kleve, Richard V. De Mulder, Kees van Noortwijk
  • 13. Designing light weight intrusion detection systems : non-negative matrix factorization approach / Václav Snášel, Jan Platoš, Pavel Krömer, Ajith Abraham
  • 14. Data mining of personal information : a taste of the intrusion legacy with a sprinkling of semantic Web / Dionysios Politis
  • 15. Surveillance of employees' electronic communications in the workplace : an employers' right to spy or an invasion to privacy? / Ioannis Iglezakis
  • 16. Forensic watermarking for secure multimedia distribution / Farook Sattar, Dan Yu
  • 17. Spam and advertisement : proposing a model for charging intrusion / Dionysios Politis
  • 18. European e-signatures solutions on the basis of PKI authentication technology / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, Stergios P. Chochliouros, Konstantinos N. Voudouris
  • 19. Security of alternative delivery channels in banking : issues and countermeasures / Manish Gupta, H. Raghav Rao, Shambhu Upadhyaya.