1. Trang chủ
  2. » Công Nghệ Thông Tin

computer security, privacy, & politics - current issues, challenges, & solutions

333 790 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 333
Dung lượng 3,95 MB

Nội dung

[...]... the European Union Computer Security, 23, 40 0-4 12 Bellman, S., Johnson, E., & Lohse, G (2001) To opt-ın or opt-out? It depends on the question? Communications of the ACM, February, 2 5-2 7 Bellotti, V (1997) Design for privacy in multimedia computing and communications environment in technology and privacy: The new landscape P.E Agre & M Rotenberg, Eds Cambridge, MA: MIT Press, pp.6 3-9 8 Berghel, H (2001)... new era in the Australian Business Environment Information Management & Security, 11(2), 60 Organization for Economic Cooperation and Development (OECD) (1980) OECD guidelines on the protection of privacy and transborder flows of personal data [Online] Retrieved from: http://www.oecd.org/EN/document/(),,EN-document-4 3-1 -no-2 4-1 025 5-4 300.html P3P 1.0 (2003) A new standard in online privacy Retrieved... Web, looking for teaching materials in the intersection of computer security, policy, and privacy To my pleasant surprise, I came across Ming Chow’s course on Security, Privacy, and Politics in the Computer Age, an experimental course he was teaching at Tufts University, Boston Thrilled by this coincidence, I wrote to Ming and soon an exchange of e-mails followed I sounded the idea of jointly editing a... millenium IEEE Computer Magazine, 34(1), 13 3-1 34 Berghel, H (2002) Hijacking the Web – Cookies revisited – Continuing the dialogue on personal security and underlying privacy issues Communications of the ACM, April, 2 3-2 8 Business Week-Harris Poll (2000) Results printed in Business Week, March 20 Caloyannides, M (2003) Society cannot function without privacy IEEE Security & Privacy, 1(3), 8 4-8 6 Copyright... (pp 2 3-3 1) Baker, J (1991) Personal ınformation and privacy In J Warren, J Thorwaldson, and B Koball (Eds.), Proceedings of the First Conference on Computers, Freedom, and Privacy (pp 4 2-4 5) IEEE Computer Society Press: Los Alamitos, CA Bakos, J., & Brynjolfsson, E (1999) Bundling information goods: Pricing, profits, and efficiency Management Science, 45(12), 161 3-1 630 Baumer, D.B., Earp, J.B., & Poindexter,... Information Systems Management, 18(3), 1 7-2 5 Ishitani, L., Almeida, V., Meira, W., Jr (2003) Masks: Bringing anonymity and personalization together IEEE Security & Privacy, 1(3) Joss, M (2001) Do you need a CPO? ComputerUser, Retrieved June 1, 2001, from http://www.computeruser.com/articles/2006.1.2.0601.01.html Kolari, P., Ding, L., Shashidhara, G., Joshi, A., Finin, T., & Kagal, L (2005) Enhancing Web privacy... HTTP cookies: Standard, privacy and politics ACM Transactions on Internet Technology, 1(2), 15 1-1 98 Kruck, S.E., Gottovi, D., Moghadami, F., Broom, R., & Forcht, K.A (2002) Protecting personal privacy on the Internet Information Management & Security, 10(2) Lessig, L (1999) Code and other laws of cyberspace Basic Books Louis, Harris and Associates, Inc (1992) Harris-Equifax Consumer Privacy Survey Equifax... Cranor, L., & Reagle, J (1999) Privacy in e-commerce: Examining user scenarios and privacy preferences Proceedings of the ACM Conference on E-Commerce, Denver, CO Adkinson, W.F., Eisenach, J.A., & Lenard, T.M., (2002) Privacy online: A report on the ınformation practices and policies of commercial Web sites Washington, DC: Progress & Freedom Foundation Anton, A.I., Earp, J.B., Potts, C., & Alspaugh,... identity of the computer; however, there are also negative performance and reliability consequenses In addition, some specialized proxy servers can be used to intercept and alter information between client and server (Berghel, 2002) There are other technology-based solutions available for protecting privacy, including tools for filtering HTML allowing users to block certain URLs, anonymous re-mailers for... Inc., Atlanta, GA Martin, D., Smith R., Brittain, M., Fetch, I., & Wu, H., (2000) The privacy practices of Web browser extensions Communications of the ACM, February, 4 5-5 0 Mason, R (1986) Four ethical ıssues of the ınformation age MIS Quarterly, 10, 4-1 2 Mason, R., Ang, S., & Mason, F (2001) Privacy in the age of the Internet In G Dickson & G DeSantis (Eds.), Information technology and the future enterprise: . references and index. ISBN-13: 97 8-1 -5 990 4-8 0 4-8 (hardcover) ISBN-13: 97 8-1 -5 990 4-8 0 6-2 (e-book) 1. Computer security. 2. Computer networks Security measures. 3. Computer security Government. registered trademark. Library of Congress Cataloging-in-Publication Data Computer security, privacy, and politics : current issues, challenges and solutions / Ramesh Subramanian, editor. p. cm. . publisher. Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions Table of Contents Preface vi Section I Security and Privacy: Global Concepts Chapter I Web Privacy: Issues,

Ngày đăng: 25/03/2014, 11:11

TỪ KHÓA LIÊN QUAN

w