Security and Control of Information Technology in Society
North-Holland (Verlag)
978-0-444-81831-7 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
The misuse of information technology (IT) presents a major problem both for Western countries and for the developing world. Dependence on IT is widespread, in the operation and control of a range of social, industrial, commercial, governmental and regulatory processes. It carries with it, threats to personal privacy and freedom and brings new opportunities for criminal activity. These dangers have to be countered and controlled in a manner which balances the great benefits which IT undoubtedly brings. Very careful consideration has to be given to determine the most effective methods of control and regulation of IT. So clarifies Martin Wasik, Professor of Law at Manchester University in his foreword to this book.The publication provides a forum for consideration of the current situation - of what has been done, and of what should be done henceforth, to reduce the misuse of IT. It aims to offer an understanding of threats to IT security and the risks to people and organisations arising from these threats. It also discusses the legal prescriptions required to counteract the threats and to deal with the risks. Further, it establishes the need for close collaboration between legal and technical specialists in the formalisation of remedies. Individual papers examine different aspects of the problem areas and the wide diversity of input from specialists across the world indicates the international significance both of the subject matter and of the book itself.
The conference in perspective (R. Sizer, L. Yngström). Plate 1. The debate. Foreword (H. Kaspersen). Foreword (M. Wasik). Is international law on security of information systems emerging? (B. de Schutter, B. Spruyt). Privacy and computing: a cultural perspective (R. Lunheim, G. Sindre). Protection of the proprietary information of organisations in the Asia-Pacific region (M. Jackson). On the cutting edge between privacy and security (R. Ketelaar, S. Fischer-Hübner). The day at St. Petersburg (S. Fischer-Hübner). Information Technology versus security in Russia (E.A. Musaev). The current state of INFOSEC legislation (A.P. Kurilo). OECD Guidelines for the Security of Information Systems (R. Hackworth). Preparation of specialists in the area of information technology security (A.A. Malyuk et al.). Preparing system security policies (P. White). A method of detecting and eradicating known and unknown viruses (D.Y. Mostovoy). Recent development in information technology security evaluation - the need for evaluation criteria for multilateral security (K. Rannenberg). Design for security functions of chipcard software (K. Dippel). Symbiosis among IT security standards, policies and criteria (M.D. Abrams). Education in IT security at bachelor and master levels using a systemic-holistic approach (L. Yngström). Utopians, cyberpunks, players and other computer criminals: deterrence and the law (L.F. Young). Computer crime in Slovakia (J. Drgonec, J. Vyskoč). The SBC model as a conceptual framework for reporting IT crimes (S. Kowalski). Plate 2. Making a point of law. Organisational Aspects. List of Attendees. WG9.6 Members.
Erscheint lt. Verlag | 17.2.1994 |
---|---|
Reihe/Serie | IFIP Transactions A: Computer Science and Technology |
Zusatzinfo | 2 plates |
Sprache | englisch |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-444-81831-6 / 0444818316 |
ISBN-13 | 978-0-444-81831-7 / 9780444818317 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich