000 | 03128naaaa2200637uu 4500 | ||
---|---|---|---|
001 | https://directory.doabooks.org/handle/20.500.12854/64049 | ||
005 | 20220714180536.0 | ||
020 | _a978-3-030-29053-5 | ||
020 | _a9783030290535 | ||
024 | 7 |
_a10.1007/978-3-030-29053-5 _cdoi |
|
041 | 0 | _aEnglish | |
042 | _adc | ||
072 | 7 |
_aHPQ _2bicssc |
|
072 | 7 |
_aLNJ _2bicssc |
|
072 | 7 |
_aJKV _2bicssc |
|
072 | 7 |
_aURD _2bicssc |
|
100 | 1 |
_aChristen, Markus _4edt _966574 |
|
700 | 1 |
_aGordijn, Bert _4edt _966575 |
|
700 | 1 |
_aLoi, Michele _4edt _966576 |
|
700 | 1 |
_aChristen, Markus _4oth _966574 |
|
700 | 1 |
_aGordijn, Bert _4oth _966575 |
|
700 | 1 |
_aLoi, Michele _4oth _966576 |
|
245 | 1 | 0 | _aThe Ethics of Cybersecurity |
260 |
_bSpringer Nature _c2020 |
||
300 | _a1 electronic resource (384 p.) | ||
506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
520 | _aThis open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies. | ||
540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by/4.0/ _2cc _4https://creativecommons.org/licenses/by/4.0/ |
||
546 | _aEnglish | ||
650 | 7 |
_aEthics & moral philosophy _2bicssc _9867422 |
|
650 | 7 |
_aEntertainment & media law _2bicssc _992399 |
|
650 | 7 |
_aCrime & criminology _2bicssc _9879342 |
|
650 | 7 |
_aPrivacy & data protection _2bicssc _9984797 |
|
653 | _aEngineering Ethics | ||
653 | _aIT Law, Media Law, Intellectual Property | ||
653 | _aCybercrime | ||
653 | _aPrivacy | ||
653 | _aMoral Philosophy and Applied Ethics | ||
653 | _acybersecurity ethics | ||
653 | _athe cybersecurity landscape | ||
653 | _amodels of cybersecurity | ||
653 | _aethics and the internet | ||
653 | _acyberwars | ||
653 | _aethical and unethical hacking | ||
653 | _asollutions to cybercrime | ||
653 | _acyberpeace | ||
653 | _acybersecurity in healthcare | ||
653 | _aEthics & moral philosophy | ||
653 | _aTechnology: general issues | ||
653 | _aEntertainment & media law | ||
653 | _aCrime & criminology | ||
653 | _aComputer crime, cybercrime | ||
653 | _aPrivacy & data protection | ||
856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/47324/1/9783030290535.pdf _70 _zDOAB: download the publication |
856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/64049 _70 _zDOAB: description of the publication |
999 |
_c3000213 _d3000213 |