語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The Ethics of Cybersecurity
~
Loi, Michele.
The Ethics of Cybersecurity
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
The Ethics of Cybersecurity/ edited by Markus Christen, Bert Gordijn, Michele Loi.
其他作者:
Loi, Michele.
面頁冊數:
XVII, 384 p. 19 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Privacy. -
電子資源:
https://doi.org/10.1007/978-3-030-29053-5
ISBN:
9783030290535
The Ethics of Cybersecurity
The Ethics of Cybersecurity
[electronic resource] /edited by Markus Christen, Bert Gordijn, Michele Loi. - 1st ed. 2020. - XVII, 384 p. 19 illus.online resource. - The International Library of Ethics, Law and Technology,211875-0044 ;. - The International Library of Ethics, Law and Technology,14.
Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion.
Open Access
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
ISBN: 9783030290535
Standard No.: 10.1007/978-3-030-29053-5doiSubjects--Topical Terms:
575491
Privacy.
LC Class. No.: TA157-158.3
Dewey Class. No.: 601
The Ethics of Cybersecurity
LDR
:03787nam a22004455i 4500
001
1023733
003
DE-He213
005
20200704024614.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030290535
$9
978-3-030-29053-5
024
7
$a
10.1007/978-3-030-29053-5
$2
doi
035
$a
978-3-030-29053-5
050
4
$a
TA157-158.3
072
7
$a
HPQ
$2
bicssc
072
7
$a
PHI005000
$2
bisacsh
072
7
$a
QDTQ
$2
thema
072
7
$a
TB
$2
thema
082
0 4
$a
601
$2
23
245
1 4
$a
The Ethics of Cybersecurity
$h
[electronic resource] /
$c
edited by Markus Christen, Bert Gordijn, Michele Loi.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XVII, 384 p. 19 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
The International Library of Ethics, Law and Technology,
$x
1875-0044 ;
$v
21
505
0
$a
Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion.
506
0
$a
Open Access
520
$a
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
650
2 4
$a
Privacy.
$3
575491
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
IT Law, Media Law, Intellectual Property.
$3
1209939
650
1 4
$a
Engineering Ethics.
$3
1106354
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Law.
$3
671705
650
0
$a
Mass media.
$3
556421
650
0
$a
Engineering ethics.
$3
598516
700
1
$a
Loi, Michele.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1319747
700
1
$a
Gordijn, Bert.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
786578
700
1
$a
Christen, Markus.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1021246
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030290528
776
0 8
$i
Printed edition:
$z
9783030290542
776
0 8
$i
Printed edition:
$z
9783030290559
830
0
$a
The International Library of Ethics, Law and Technology,
$x
1875-0044 ;
$v
14
$3
1257573
856
4 0
$u
https://doi.org/10.1007/978-3-030-29053-5
912
$a
ZDB-2-REP
912
$a
ZDB-2-SXPR
912
$a
ZDB-2-SOB
950
$a
Religion and Philosophy (SpringerNature-41175)
950
$a
Philosophy and Religion (R0) (SpringerNature-43725)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入