|
|
|
|
LEADER |
03003nma a2200661 u 4500 |
001 |
EB001987958 |
003 |
EBX01000000000000001150860 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210512 ||| eng |
020 |
|
|
|a 978-3-030-29053-5
|
020 |
|
|
|a 9783030290535
|
100 |
1 |
|
|a Christen, Markus
|
245 |
0 |
0 |
|a The Ethics of Cybersecurity
|h Elektronische Ressource
|
260 |
|
|
|b Springer Nature
|c 2020
|
300 |
|
|
|a 1 electronic resource (384 p.)
|
653 |
|
|
|a Crime & criminology
|
653 |
|
|
|a ethics and the internet
|
653 |
|
|
|a cyberwars
|
653 |
|
|
|a Entertainment & media law
|
653 |
|
|
|a Entertainment & media law / bicssc
|
653 |
|
|
|a the cybersecurity landscape
|
653 |
|
|
|a Computer crime, cybercrime
|
653 |
|
|
|a Privacy & data protection / bicssc
|
653 |
|
|
|a Ethics & moral philosophy / bicssc
|
653 |
|
|
|a Moral Philosophy and Applied Ethics
|
653 |
|
|
|a Ethics & moral philosophy
|
653 |
|
|
|a ethical and unethical hacking
|
653 |
|
|
|a cyberpeace
|
653 |
|
|
|a cybersecurity ethics
|
653 |
|
|
|a Technology: general issues
|
653 |
|
|
|a cybersecurity in healthcare
|
653 |
|
|
|a Engineering Ethics
|
653 |
|
|
|a Crime & criminology / bicssc
|
653 |
|
|
|a sollutions to cybercrime
|
653 |
|
|
|a IT Law, Media Law, Intellectual Property
|
653 |
|
|
|a Cybercrime
|
653 |
|
|
|a Privacy
|
653 |
|
|
|a models of cybersecurity
|
653 |
|
|
|a Privacy & data protection
|
700 |
1 |
|
|a Gordijn, Bert
|
700 |
1 |
|
|a Loi, Michele
|
700 |
1 |
|
|a Christen, Markus
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b DOAB
|a Directory of Open Access Books
|
490 |
0 |
|
|a The International Library of Ethics, Law and Technology
|
500 |
|
|
|a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/
|
028 |
5 |
0 |
|a 10.1007/978-3-030-29053-5
|
856 |
4 |
2 |
|u https://directory.doabooks.org/handle/20.500.12854/64049
|z DOAB: description of the publication
|
856 |
4 |
0 |
|u https://library.oapen.org/bitstream/20.500.12657/47324/1/9783030290535.pdf
|7 0
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 170
|
082 |
0 |
|
|a 610
|
082 |
0 |
|
|a 100
|
082 |
0 |
|
|a 364
|
082 |
0 |
|
|a 600
|
082 |
0 |
|
|a 620
|
082 |
0 |
|
|a 340
|
520 |
|
|
|a This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
|