You are previewing Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions.
O'Reilly logo
Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions

Book Description

"The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism-all of these have a profound effect on our daily computing operations and habits, with major political and social implications.

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this reference source compiles high quality, timely content on such cutting-edge topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy."

Table of Contents

  1. Copyright
  2. Preface
    1. Organization of the Book
  3. Acknowledgment
  4. I. Security and Privacy: Global Concepts
    1. I. Web Privacy: Issues, Legislations, and Technological Challenges
      1. Abstract
      2. Introduction
      3. Privacy Transition Stages
      4. Web User Privacy Concerns
      5. Privacy Protection Laws
      6. Privacy and Technology
      7. Web Privacy Enhancing Technologies
      8. The Platform for Privacy Preferences (P3P)
      9. The Future of the P3P Standard Success
      10. The Present Scenario of P3P Implementation
      11. Conclusion
      12. Acknowledgment
      13. References
  5. II. Privacy, Nations, and Laws
    1. II. Is It Safe to Talk, Yet? The Evolution of Electronic Privacy Law
      1. Abstract
      2. Introduction
      3. Origins of the "Right to Be Let Alone"
      4. Early Legal Responses to Electronic Invention
      5. A Survey of Pre-September 11, 2001 Technological and Privacy Law Developments
      6. Post September 11, 2001 E-Privacy in the United States
      7. The Other 50 Variables: State Privacy Laws
      8. Emerging Challenges
      9. Summary and Conclusion
      10. References
    2. III. Assessing the Impact of Governmental Regulations on the IT Industry: A Neo Institutional Theory Perspective
      1. Abstract
      2. Introduction
      3. Background
      4. Governmental Regulations
        1. Sarbanes-Oxley Act (SOX)
        2. Impact on the Information Systems Domain
      5. Health Insurance Portability and Accountability Act (HIPAA) of 1996
        1. Impact on the Information Systems Domain
      6. USA Patriot Act
        1. Impact on the Information Systems Domain
      7. Gramm-Leach Bliley
        1. Impact on the Information Systems Domain
      8. Discussion: Institutional Perspective of the IT Phenomenon
      9. Conclusion
      10. References
    3. A. Appendix A: Major Regulations Effecting IT and the Year Passed (1995-2005)
    4. IV. The Impact of the UK Human Rights Act 1998 on Privacy Protection in the Workplace
      1. Abstract
      2. Introduction
      3. Privacy
        1. Privacy as an Intrinsic Value
        2. Privacy as an Instrumental Value
        3. The Notion of Privacy in the Data Protection Act 1998 and Regulations of Investigatory Powers Act 2000
          1. Privacy in the Data Protection Act 1998
          2. Privacy in the Regulations of Investigatory Powers Act 2000
        4. Privacy in the Human Rights Act 1998
        5. HRA 1998 Case Law
        6. HRA 1998 and other National Law
      4. Conclusion
      5. References
      6. Statutes (in Chronological Order)
      7. Cases
  6. III. Privacy and Technology
    1. V. Privacy Preserving Data Mining: Taxonomy of Existing Techniques
      1. Abstract
      2. Introduction
      3. An Overview of Privacy
        1. Privacy Preserving Data Mining (PPDM): Background and Techniques
      4. Data Hiding
        1. Data Perturbation
        2. Distributed Data Mining (DDM)
        3. Data Anonymization
        4. Rule Hiding
      5. Future Trends
      6. References
      7. Endnotes
    2. VI. Rational Concerns about Biometric Technology: Security and Privacy
      1. Abstract
      2. Introduction
      3. Background
      4. Special Nature of Biometric Technology and Biometric Data
        1. The "Bio" Nature of Biometric Data and Biometric Technology
        2. Genetic and Health Related Data
        3. Relative Uniqueness, Universality, and Stability
        4. The Automatic Nature of Biometric Data and Biometric Technology
        5. Fuzzy Unicode of Individual
        6. Possible Linking and Tracking
      5. Privacy and Biometric Technology
        1. Information Privacy and Biometric Technology
        2. Unnecessary Collection
        3. Unauthorised Collection
        4. Unauthorised Use: Function Creep
        5. Loss of Anonymity
        6. Physical Privacy and Biometric Technology
      6. Property Rights: A Worthwhile Protection Measure?
      7. Security and Biometric Technology
        1. Technology Limitations
        2. Misconceptions of Biometric Technology
        3. Security Problems Posed by Biometric Technology
      8. Future Trends and Conclusion
      9. References
      10. Endnotes
    3. VII. Business Cases for Privacy-Enhancing Technologies
      1. Abstract
      2. Introduction
      3. Trust and Distrust
      4. Privacy Strategy
        1. Concepts
        2. Privacy-Sensitive Business Processes
      5. Technology's Role
        1. The PITs
        2. Pseudo-PETs
        3. Counter-PITs
        4. Savage PETs
        5. Gentle PETs
      6. Business Cases for PETs
        1. Concepts
        2. Application
          1. Ways to Work with PETs
          2. Benefits
          3. Costs and Other Disbenefits
          4. Risks
          5. The Net Effect
      7. Conclusion
      8. Acknowledgment
      9. References
  7. IV. Privacy and Organizations
    1. VIII. Privacy through Security: Policy and Practice in a Small-Medium Enterprise
      1. Abstract
      2. Introduction
      3. Privacy as a Business Issue
      4. Security Policy and Practice in SMEs
        1. Security Management Policies
        2. Security Technologies
      5. Case Study
        1. Company Background: ABC Awards
        2. Systems
      6. Organizational Issues: Policy and Practice
        1. Manage Business and Security Risks
        2. Total Cost of Ownership
        3. Least Privilege Access
        4. End User Education
      7. Technical Issues: Policy and Practice
        1. Security Policies
        2. External Resources
        3. Defence in Depth
        4. Monitoring of Systems
      8. Conclusion
      9. References
    2. IX. Privacy and Security: Where do they fit into the Enterprise Architecture Framework?
      1. Abstract
      2. Introduction
      3. Enterprise Architecture
        1. Enterprise Architecture Framework Core Components
        2. Security and Enterprise Architecture Frameworks
      4. Zachman Framework
      5. Public Sector Enterprise Architecture
        1. Federal Enterprise Architecture Framework
        2. Privacy and Security in the Federal Model
      6. Conclusion
      7. References
    3. X. Information Systems Security: A Survey of Canadian Executives
      1. Abstract
      2. Introduction
      3. Literature Review
        1. Information and Knowledge
        2. Resource Based View of the Firm
        3. Information Security
        4. Intellectual Capital
        5. Research Model and Questions
        6. Survey Design
        7. Sample
        8. Survey Administration
        9. Results
        10. Statistical Analyses
          1. Importance of Regular Security Audits
          2. Nature of Security Threats
        11. Support for the Research Model
        12. Industry Differences
        13. Management Implications
        14. Research Implications
          1. Limitations
          2. Recommendations for Future Research
      4. References
      5. Appendix A: CEO and CIO Surveys: Questionnaire Items by Construct
      6. Appendix B: Instrument Refinement
        1. Card Sorting Exercise
          1. Card Sorters
          2. Analysis Procedures
          3. Results
        2. Questionnaire Item Sorting Instructions
      7. Endnotes
  8. V. Security and Privacy: Emerging Issues
    1. XI. Emerging Technologies, Emerging Privacy Issues
      1. Abstract
      2. Background
      3. New Technologies Challenge Personal Information Privacy (PIP)
        1. RFID
      4. Global Positioning Systems
      5. Smart Motes
        1. Threats
        2. Invisibility
        3. Data Aggregation
        4. Individual Tracking and Profiling
        5. Theft
        6. Data Corruption, and Infrastructure Threats
        7. Health Threats
        8. Solutions
        9. Corporate Self-Regulation
        10. Legislation
          1. Legal Protection
        11. Technical Controls
        12. Assessment of Control Effectiveness
      6. Conclusion
      7. References
      8. Endnotes
    2. XII. Digital Democracy: Democracy in the Light of Information and Communication Technology
      1. Abstract
      2. Introduction
      3. Definition of Tele-Democracy
      4. Perspectives in Tele-Democracy
      5. Driving Forces
        1. Citizens
        2. Technology
        3. Communities
        4. Politicians/Government
        5. Global Politics
      6. Recent Practices
        1. Government Information Dissemination
        2. Universal Accesses and Distance Learning
        3. Electronic Town Meeting
      7. Issues in Tele-Democracy
        1. Social Issues
        2. Privacy Issues
        3. Security Issues
      8. Issues in 2008
      9. Future of Democracy
      10. Conclusion
      11. References
    3. XIII. Trust Modeling and Management: From Social Trust to Digital Trust
      1. Abstract
      2. Introduction
      3. Background
        1. Perception of Trust Concept (from Social Trust towards Digital Trust)
        2. Trust Modeling Technology (Modeling Trust in a Digital Approach)
        3. Mechanisms for Trust Management (Applying and Deploying Trust Models)
        4. Trust Evaluation Mechanisms (Methodologies for Trust Decision)
      4. Digital Management of Trust
        1. Issues, Controversies and Problems
        2. Solutions and Recommendations
        3. Limitations and Further Discussion
      5. Future Trends
        1. An Integrated "Soft Trust" and "Hard Trust" Solution
        2. Autonomic Trust Management
        3. Cross-Domain Benefit
      6. Conclusion
      7. References
    4. XIV. Security, Privacy, and Politics in Higher Education
      1. Abstract
      2. Introduction
      3. Background
      4. Technology
      5. Policy
      6. External Environment
      7. Synergy
      8. Future Trends
      9. Conclusion
      10. References
  9. About the Contributors