Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
The Ethics of Cybersecurity
~
Loi, Michele.
The Ethics of Cybersecurity
Record Type:
Language materials, printed : Monograph/item
Title/Author:
The Ethics of Cybersecurity/ edited by Markus Christen, Bert Gordijn, Michele Loi.
other author:
Christen, Markus.
Description:
XVII, 384 p. 19 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Engineering ethics. -
Online resource:
https://doi.org/10.1007/978-3-030-29053-5
ISBN:
9783030290535
The Ethics of Cybersecurity
The Ethics of Cybersecurity
[electronic resource] /edited by Markus Christen, Bert Gordijn, Michele Loi. - 1st ed. 2020. - XVII, 384 p. 19 illus.online resource. - The International Library of Ethics, Law and Technology,211875-0044 ;. - The International Library of Ethics, Law and Technology,14.
Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion.
Open Access
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
ISBN: 9783030290535
Standard No.: 10.1007/978-3-030-29053-5doiSubjects--Topical Terms:
598516
Engineering ethics.
LC Class. No.: TA157-158.3
Dewey Class. No.: 601
The Ethics of Cybersecurity
LDR
:03787nam a22004455i 4500
001
1023733
003
DE-He213
005
20200704024614.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030290535
$9
978-3-030-29053-5
024
7
$a
10.1007/978-3-030-29053-5
$2
doi
035
$a
978-3-030-29053-5
050
4
$a
TA157-158.3
072
7
$a
HPQ
$2
bicssc
072
7
$a
PHI005000
$2
bisacsh
072
7
$a
QDTQ
$2
thema
072
7
$a
TB
$2
thema
082
0 4
$a
601
$2
23
245
1 4
$a
The Ethics of Cybersecurity
$h
[electronic resource] /
$c
edited by Markus Christen, Bert Gordijn, Michele Loi.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XVII, 384 p. 19 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
The International Library of Ethics, Law and Technology,
$x
1875-0044 ;
$v
21
505
0
$a
Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion.
506
0
$a
Open Access
520
$a
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
650
0
$a
Engineering ethics.
$3
598516
650
0
$a
Mass media.
$3
556421
650
0
$a
Law.
$3
671705
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Engineering Ethics.
$3
1106354
650
2 4
$a
IT Law, Media Law, Intellectual Property.
$3
1209939
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Privacy.
$3
575491
700
1
$a
Christen, Markus.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1021246
700
1
$a
Gordijn, Bert.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
786578
700
1
$a
Loi, Michele.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1319747
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030290528
776
0 8
$i
Printed edition:
$z
9783030290542
776
0 8
$i
Printed edition:
$z
9783030290559
830
0
$a
The International Library of Ethics, Law and Technology,
$x
1875-0044 ;
$v
14
$3
1257573
856
4 0
$u
https://doi.org/10.1007/978-3-030-29053-5
912
$a
ZDB-2-REP
912
$a
ZDB-2-SXPR
912
$a
ZDB-2-SOB
950
$a
Religion and Philosophy (SpringerNature-41175)
950
$a
Philosophy and Religion (R0) (SpringerNature-43725)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login