Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 333 trang
THÔNG TIN TÀI LIỆU
Cấu trúc
cover
page_r01
page_r02
page_r03
page_r04
page_r05
page_r06
page_r07
page_r08
page_r09
page_r10
page_r11
page_r12
page_r13
page_r14
page_z0001
page_z0002
page_z0003
page_z0004
page_z0005
page_z0006
page_z0007
page_z0008
page_z0009
page_z0010
page_z0011
page_z0012
page_z0013
page_z0014
page_z0015
page_z0016
page_z0017
page_z0018
page_z0020
page_z0021
page_z0023
page_z0024
page_z0025
page_z0026
page_z0027
page_z0028
page_z0029
page_z0030
page_z0031
page_z0032
page_z0033
page_z0034
page_z0035
page_z0036
page_z0037
page_z0038
page_z0039
page_z0040
page_z0041
page_z0042
page_z0043
page_z0044
page_z0045
page_z0046
page_z0047
page_z0048
page_z0049
page_z0050
page_z0051
page_z0052
page_z0053
page_z0054
page_z0055
page_z0056
page_z0057
page_z0058
page_z0059
page_z0060
page_z0061
page_z0062
page_z0063
page_z0064
page_z0065
page_z0066
page_z0067
page_z0068
page_z0069
page_z0070
page_z0071
page_z0072
page_z0073
page_z0074
page_z0075
page_z0076
page_z0077
page_z0078
page_z0079
page_z0080
page_z0081
page_z0082
page_z0083
page_z0084
page_z0085
page_z0086
page_z0087
page_z0088
page_z0089
page_z0090
page_z0091
page_z0092
page_z0093
page_z0094
page_z0095
page_z0096
page_z0097
page_z0098
page_z0099
page_z0100
page_z0101
page_z0102
page_z0103
page_z0104
page_z0105
page_z0106
page_z0107
page_z0108
page_z0109
page_z0110
page_z0111
page_z0112
page_z0113
page_z0114
page_z0115
page_z0116
page_z0117
page_z0118
page_z0119
page_z0120
page_z0121
page_z0122
page_z0123
page_z0124
page_z0125
page_z0126
page_z0127
page_z0128
page_z0129
page_z0130
page_z0131
page_z0132
page_z0133
page_z0134
page_z0135
page_z0136
page_z0137
page_z0138
page_z0139
page_z0140
page_z0141
page_z0142
page_z0143
page_z0144
page_z0145
page_z0146
page_z0147
page_z0148
page_z0149
page_z0150
page_z0151
page_z0152
page_z0153
page_z0154
page_z0155
page_z0156
page_z0157
page_z0158
page_z0159
page_z0160
page_z0161
page_z0162
page_z0163
page_z0164
page_z0165
page_z0166
page_z0167
page_z0168
page_z0169
page_z0170
page_z0171
page_z0172
page_z0173
page_z0174
page_z0175
page_z0176
page_z0177
page_z0178
page_z0179
page_z0180
page_z0181
page_z0182
page_z0183
page_z0184
page_z0185
page_z0186
page_z0187
page_z0188
page_z0189
page_z0190
page_z0191
page_z0192
page_z0193
page_z0194
page_z0195
page_z0196
page_z0197
page_z0198
page_z0199
page_z0200
page_z0201
page_z0202
page_z0203
page_z0204
page_z0205
page_z0206
page_z0207
page_z0208
page_z0209
page_z0210
page_z0211
page_z0212
page_z0213
page_z0214
page_z0215
page_z0216
page_z0217
page_z0218
page_z0219
page_z0220
page_z0221
page_z0222
page_z0223
page_z0224
page_z0225
page_z0226
page_z0227
page_z0228
page_z0229
page_z0230
page_z0231
page_z0232
page_z0233
page_z0234
page_z0235
page_z0236
page_z0237
page_z0238
page_z0239
page_z0240
page_z0241
page_z0242
page_z0243
page_z0244
page_z0245
page_z0246
page_z0247
page_z0248
page_z0249
page_z0250
page_z0251
page_z0252
page_z0253
page_z0254
page_z0255
page_z0256
page_z0257
page_z0258
page_z0259
page_z0260
page_z0261
page_z0262
page_z0263
page_z0264
page_z0265
page_z0266
page_z0267
page_z0268
page_z0269
page_z0270
page_z0271
page_z0272
page_z0273
page_z0274
page_z0275
page_z0276
page_z0277
page_z0278
page_z0279
page_z0280
page_z0281
page_z0282
page_z0283
page_z0284
page_z0285
page_z0286
page_z0287
page_z0288
page_z0289
page_z0290
page_z0291
page_z0292
page_z0293
page_z0294
page_z0295
page_z0296
page_z0297
page_z0298
page_z0299
page_z0300
page_z0301
page_z0302
page_z0303
page_z0304
page_z0305
page_z0306
page_z0307
page_z0308
page_z0309
page_z0310
page_z0311
page_z0312
page_z0313
page_z0314
page_z0315
page_z0316
page_z0317
page_z0318
page_z0319
page_z0320
Nội dung
[...]... the European Union Computer Security, 23, 40 0-4 12 Bellman, S., Johnson, E., & Lohse, G (2001) To opt-ın or opt-out? It depends on the question? Communications of the ACM, February, 2 5-2 7 Bellotti, V (1997) Design for privacy in multimedia computing and communications environment in technology and privacy: The new landscape P.E Agre & M Rotenberg, Eds Cambridge, MA: MIT Press, pp.6 3-9 8 Berghel, H (2001)... new era in the Australian Business Environment Information Management &Security, 11(2), 60 Organization for Economic Cooperation and Development (OECD) (1980) OECD guidelines on the protection of privacy and transborder flows of personal data [Online] Retrieved from: http://www.oecd.org/EN/document/(),,EN-document-4 3-1 -no-2 4-1 025 5-4 300.html P3P 1.0 (2003) A new standard in online privacy Retrieved... Web, looking for teaching materials in the intersection of computer security, policy, and privacy To my pleasant surprise, I came across Ming Chow’s course on Security,Privacy, and Politics in the Computer Age, an experimental course he was teaching at Tufts University, Boston Thrilled by this coincidence, I wrote to Ming and soon an exchange of e-mails followed I sounded the idea of jointly editing a... millenium IEEE Computer Magazine, 34(1), 13 3-1 34 Berghel, H (2002) Hijacking the Web – Cookies revisited – Continuing the dialogue on personal security and underlying privacy issues Communications of the ACM, April, 2 3-2 8 Business Week-Harris Poll (2000) Results printed in Business Week, March 20 Caloyannides, M (2003) Society cannot function without privacy IEEE Security &Privacy, 1(3), 8 4-8 6 Copyright... (pp 2 3-3 1) Baker, J (1991) Personal ınformation and privacy In J Warren, J Thorwaldson, and B Koball (Eds.), Proceedings of the First Conference on Computers, Freedom, and Privacy (pp 4 2-4 5) IEEE Computer Society Press: Los Alamitos, CA Bakos, J., & Brynjolfsson, E (1999) Bundling information goods: Pricing, profits, and efficiency Management Science, 45(12), 161 3-1 630 Baumer, D.B., Earp, J.B., & Poindexter,... Information Systems Management, 18(3), 1 7-2 5 Ishitani, L., Almeida, V., Meira, W., Jr (2003) Masks: Bringing anonymity and personalization together IEEE Security &Privacy, 1(3) Joss, M (2001) Do you need a CPO? ComputerUser, Retrieved June 1, 2001, from http://www.computeruser.com/articles/2006.1.2.0601.01.html Kolari, P., Ding, L., Shashidhara, G., Joshi, A., Finin, T., & Kagal, L (2005) Enhancing Web privacy... HTTP cookies: Standard, privacy and politics ACM Transactions on Internet Technology, 1(2), 15 1-1 98 Kruck, S.E., Gottovi, D., Moghadami, F., Broom, R., & Forcht, K.A (2002) Protecting personal privacy on the Internet Information Management &Security, 10(2) Lessig, L (1999) Code and other laws of cyberspace Basic Books Louis, Harris and Associates, Inc (1992) Harris-Equifax Consumer Privacy Survey Equifax... Cranor, L., & Reagle, J (1999) Privacy in e-commerce: Examining user scenarios and privacy preferences Proceedings of the ACM Conference on E-Commerce, Denver, CO Adkinson, W.F., Eisenach, J.A., & Lenard, T.M., (2002) Privacy online: A report on the ınformation practices and policies of commercial Web sites Washington, DC: Progress & Freedom Foundation Anton, A.I., Earp, J.B., Potts, C., & Alspaugh,... identity of the computer; however, there are also negative performance and reliability consequenses In addition, some specialized proxy servers can be used to intercept and alter information between client and server (Berghel, 2002) There are other technology-based solutions available for protecting privacy, including tools for filtering HTML allowing users to block certain URLs, anonymous re-mailers for... Inc., Atlanta, GA Martin, D., Smith R., Brittain, M., Fetch, I., & Wu, H., (2000) The privacy practices of Web browser extensions Communications of the ACM, February, 4 5-5 0 Mason, R (1986) Four ethical ıssues of the ınformation age MIS Quarterly, 10, 4-1 2 Mason, R., Ang, S., & Mason, F (2001) Privacy in the age of the Internet In G Dickson & G DeSantis (Eds.), Information technology and the future enterprise: . references and index. ISBN-13: 97 8-1 -5 990 4-8 0 4-8 (hardcover) ISBN-13: 97 8-1 -5 990 4-8 0 6-2 (e-book) 1. Computer security. 2. Computer networks Security measures. 3. Computer security Government. registered trademark. Library of Congress Cataloging-in-Publication Data Computer security, privacy, and politics : current issues, challenges and solutions / Ramesh Subramanian, editor. p. cm. . publisher. Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions Table of Contents Preface vi Section I Security and Privacy: Global Concepts Chapter I Web Privacy: Issues,