ebook img

Unauthorized access: the crisis in online privacy and security PDF

381 Pages·2013·22.07 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Unauthorized access: the crisis in online privacy and security

Computer Science Law and Technology S UnaUThOrized lo a n • aCCeSS W a r n e r The Crisis in Online Privacy and Security U n Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues a pertaining to online privacy and security. Requiring no technical or legal expertise, the U book explains complicated concepts in clear, straightforward language. T The authors—two renowned experts on computer security and law—explore the well- h established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and O informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel r situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. i z Features • Explains how to respond to the increasing unauthorized access to online e information d • Describes sophisticated technological, economic, legal, and public policy issues in plain English • Examines the crucial link between informational privacy and information a security • Offers concrete suggestions for developing social norms needed to protect C informational privacy and ensure adequate information security • Provides a practical framework in which ethical and legal issues about privacy C and security can be effectively addressed e Bridging the gap among computer scientists, economists, lawyers, and public policy S makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex S concerns that arise in the context of online privacy and security. K11474 ISBN: 978-1-4398-3013-0 90000 9 781439 830130 K11474_COVER_final.indd 1 6/10/13 12:00 PM UnaUThOrized aCCeSS ––––––––––––––––––––––––––––––––––––––––––––––––– The Crisis in Online Privacy and Security UnaUThOrized aCCeSS ––––––––––––––––––––––––––––––––––––––––––––––––– The Crisis in Online Privacy and Security robert h. Sloan • richard Warner CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2014 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20130208 International Standard Book Number-13: 978-1-4398-3014-7 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents at a Glance Preface, xix Acknowledgments, xxi Authors, xxiii Chapter 1 ◾ I ntroduction 1 Chapter 2 ◾ A n Explanation of the Internet, Computers, and Data Mining 13 Chapter 3 ◾ N orms and Markets 53 Chapter 4 ◾ I nformational Privacy: The General Theory 75 Chapter 5 ◾ I nformational Privacy: Norms and Value Optimality 95 Chapter 6 ◾ S oftware Vulnerabilities and the Low-Priced Software Norm 125 Chapter 7 ◾ S oftware Vulnerabilities: Creating Best Practices 157 Chapter 8 ◾ C omputers and Networks: Attack and Defense 181 Chapter 9 ◾ M alware, Norms, and ISPs 221 v © 2010 Taylor & Francis Group, LLC vi   ◾   Contents at a Glance Chapter 10 ◾ M alware: Creating a Best Practices Norm 251 Chapter 11 ◾ T racking, Contracting, and Behavioral Advertising 273 Chapter 12 ◾ F rom One-Sided Chicken to Value Optimal Norms 303 © 2010 Taylor & Francis Group, LLC Contents Preface, xix Acknowledgments, xxi Authors, xxiii Chapter 1 ◾ I ntroduction 1 INTRODUCTION 1 THE GOOD, THE BAD, AND THE IN BETWEEN 2 The Good 2 The Bad 2 The In Between 3 MAKING TRADE-OFFS 4 VALUES 7 Profit-Motive-Driven Businesses 8 POLITICS 9 TODAY AND TOMORROW: WEB 1.0, 2.0, 3.0 10 A LOOK AHEAD 11 NOTES AND REFERENCES 11 FURTHER READING 12 Chapter 2 ◾ A n Explanation of the Internet, Computers, and Data Mining 13 INTRODUCTION 13 PRIMER ON THE INTERNET 13 History 15 vii © 2010 Taylor & Francis Group, LLC viii   ◾   Contents Nature of the Internet: Packet-Switched Network 17 End-to-End Principle and the “Stupid” Network 19 A More Technical View 22 Horizontal View: One Home’s LAN to the Backbone 22 Vertical View: Internet Protocol Suite 24 Internet Layer 25 Transport Layer 26 Application Layer 28 How the Layers Work Together: Packet Encapsulation 28 Numerical Addresses to Names: DNS 30 Putting It All Together 30 PRIMER ON COMPUTERS 31 Basic Elements of a Computer 33 Operating Systems 38 PRIMER ON DATA, DATABASES, AND DATA MINING 40 Data and Their Representation 40 Databases 43 Information Extraction or Data Mining 43 NOTES AND REFERENCES 48 FURTHER READING 49 Chapter 3 ◾ N orms and Markets 53 INTRODUCTION 53 NORMS DEFINED 53 The Examples 53 The Definition 54 Why People Conform to Norms 54 Ought or Self-Interest? 55 How Do Norms Get Started? 55 COORDINATION NORMS 56 Examples 56 Definition of a Coordination Norm 58 © 2010 Taylor & Francis Group, LLC

Description:
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.