Fighting Terror Online

Fighting Terror Online

Martin Charles Golumbic

146,67 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2010
Materia
Política y gobierno
ISBN:
9781441925237
146,67 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

TABLE OF CONTENTS Foreword Acknowledgments Introduction Chapter One. The Balance between Security and Civil Rights 1.1 Mapping the Threats: Preventing Physical and Virtual Terrorist Attacks 1.2 Designing Policies to Address New Security Threats 1.2.1 Information warfare. 1.2.2 Data security. 1.2.3 Gathering information and surveillance. 1.2.4 Regulation of encryption products 1.2.5 Terror propaganda 1.3 Preserving Civil Liberties 1.3.1 The right to privacy 1.3.2 Freedom of expression 1.3.3 Enforcement. 1.4 Electronic Commerce and Innovation 1.4.1 Ramifications for research and development 1.4.2 Encryption regulation and electronic commerce Chapter Two. The Legal Situation: Prevention and Enforcement in the Information Age 2.1 The International Scene 2.1.1 Protection of the right to privacy 2.1.2 International regulation for protection of personal data 2.1.3 International regulation of encryption products 2.1.4 International regulation of decryption products 2.2 The United States 2.2.1 Protection of the right to privacy 2.2.2 Protection of the freedom of speech 2.2.3 American regulation of encryption products 2.2.4 American regulation of decryption products 2.3 The European Union 2.3.1 Protection of the right to privacy 2.3.2 EU regulation of encryption 2.3.3 EU regulation of copyright 2.4 Other Countries 2.4.1 Britain 2.4.2 Canada 2.4.3 Australia Chapter Three. Israel and Online Terrorism 3.1 The Right to Privacy 3.1.1 Search and seizure 3.1.2 Secret monitoring in Israeli law 3.2 Freedom of Speech 3.2.1 Liability of service providers 3.2.2 Enforcementof hacking prohibitions 3.3 Israeli Regulation of Encryption 3.3.1 The framework of the legal arrangements up to 1998 3.3.2 The framework of the legal arrangements after 1998 3.4 Freedom of Occupation 3.5 Property Rights Chapter Four. Technological Issues 4.1 What is Encryption? The Technological Basis 4.2 The Basic Principle of Encryption: Letter Replacement 4.3 Symmetrical Encryption 4.4 Asymmetrical Encryption: Public Key and Private Key 4.4.1 Analysis of the RSA method 4.5 How is Information Gathered on the Internet? 4.5.1 General background 4.5.2 Means of collecting information and monitoring the Internet 4.5.3 Collection of information on the server or the PC Chapter Five. Recommendations: Is There a Need for New Regulations? 5.1 The Existing System’s Suitability for the Internet 5.2 Implementing Existing Legal Regulations for the Internet 5.3 Protecting the Right to Privacy 5.4 Liability of Internet service providers 5.5 Regulating Encryption Products to Protect Freedom of Occupation and Property Rights Concluding Remarks

Artículos relacionados

  • How Great a Crime - to tell the truth
    Neil Kay / Steven Kay
    Joseph Gales was one of the all-time great Sheffielders – forget Joe Cocker, Jessica Ennis-Hill, Sean Bean or Michael Palin. These are all minnows compared to Joseph Gales – and their stories are boring besides that of the Galeses. The Galeses story has been forgotten and has not been brought together in one place before – it is not just something dredged up from history – an i...
    Disponible

    10,33 €

  • Fearful Majesty
    Benson Bobrick
    Ivan the Terrible - the name evokes the legend of a cruel and dangerously insane tyrant. Fearful Majesty explores that legend and exposes the man, his nature, and his time.This acclaimed biography of one of Russia’s most important and tyrannical rulers is not only a rich, readable biography, it is also surprisingly timely, revealing how many of the issues Russia faces today hav...
    Disponible

    19,27 €

  • Economic Optimization of Innovation & Risk
    Robert Shuler
    A Theory of Crash Rate for Private & Public Projects with Critical or non-Critical systems.Analyzing & managing risk has been a quest for 5000 years, and is essential to everything from water supplies, finance, and agriculture to computers and space travel. At last there is a quantitative theory and a simple equation that allows you to: - choose your failure rate - get there...
    Disponible

    13,02 €

  • The System
    Lincoln Steffens
    The 'muckraker' Lincoln Steffens dug deep into business criminality and political corruption in a powerful series of articles written for McClure's magazine. Establishment newspapers and 'System' politicians dismissed his work as just another example of the decrepit modern journalism that could never pass for genuine writing. But Steffens' dogged quest for truth and justice set...
    Disponible

    23,66 €

  • Digital Activism in Asia Reader
    The digital turn might as well be marked as an Asian turn. From flash-mobs in Taiwan to feminist mobilisations in India, from hybrid media strategies of Syrian activists to cultural protests in Thailand, we see the emergence of political acts that transform the citizen from being a beneficiary of change to becoming an agent of change. In co-shaping these changes, what the digit...
    Disponible

    22,19 €

  • The New Freedom
    Woodrow Wilson
    In 1912, Woodrow Wilson was the Democratic nominee for President of the United States. He campaigned against the Republican incumbent, William Howard Taft, and Taft’s predecessor, Theodore Roosevelt, who had split off from the Republican Party to form his own Progressive, or Bull Moose, Party. Much of the campaign focused on the US economy, particularly the candidates’ views of...
    Disponible

    8,67 €

Otros libros del autor

  • Fighting Terror Online
    Martin Charles Golumbic
    This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror. It identifies the threats, the security needs, and the issues unique to this environment. The book examines whether the characteristics of this environment require new legal solutions, or whether existing solutions...
    Disponible

    65,38 €