- The book attempts to outline a model for a general legal framework enshrining key principles of civil society (such as human rights, ethics) with cyberspace.
- release September 24, 2014
Archives ""
More Essential than Ever: The Fourth Amendment in the Twenty First Century
- Combining a detailed knowledge of specific cases with a deep grasp of Constitutional law, More Essential than Ever offers a sophisticated and thoughtful perspective on this important debate.
- release August 6, 2012
Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information
- Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset-its proprietary information-safe from cyber and physical compromise.
- release October 6, 2014
Unauthorized Access: The Crisis in Online Privacy and Security
- The authors—two renowned experts on computer security and law—explore the well-established connection between social norms, privacy, security, and technological structure.
- release July 15, 2013
Protection of Information and the Right to Privacy – A New Equilibrium?
- This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy.
- release May 19, 2014
Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century
- Challenged by rapidly developing privacy-invading technologies (PITs), this book provides a convincing set of potential policy recommendations and practical solutions for safeguarding both privacy and security. It shows that benefits such as public security do not necessarily come at the expense of privacy and liberty overall.
- release July 6, 2014
Privacy Impact Assessment
- The first book on privacy impact mechanisms, the authors provide a thorough and cogent introduction and analysis of this tool.
- release December 29, 2011
A World without Privacy: What Law Can and Should Do?
- The book considers several different understandings of privacy and provides examples of legal responses to the threats to privacy associated with new modalities of surveillance, the rise of digital technology, the excesses of the Bush and Obama administrations, and the continuing war on terror.
- release December 15, 2014
Dissecting the Hack: The F0rb1dd3n Network
- The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons.
- release July 15, 2010
Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace
- Computers and the Law provides readers with an introduction to the legal issues associated with computing. Assuming no knowledge of the law or computer science, this textbook offers undergraduates of all disciplines and professionals in the computing industry an understanding of basic legal principles and peculiarities associated with legal issues in cyberspace.
- release May 29, 2009