Your Search Results

      • Trusted Partner
        Computing & IT
        March 2024

        The seven veils of privacy

        How our debates about privacy conceal its nature

        by Kieron O'Hara

        Privacy is one of the most contested concepts of our time. This book sets out a rigorous and comprehensive framework for understanding debates about privacy and our rights to it. Much of the conflict around privacy comes from a failure to recognise divergent perspectives. Some people argue about human rights, some about social conventions, others about individual preferences and still others about information and data processing. As a result, 'privacy' has become the focus of competing definitions, leading some to denounce the 'disarray' in the field. But as this book shows, disagreements about the role and value of privacy obscure a large amount of agreement on the topic. Privacy is not a technical term of law, cybersecurity or sociology, but a word in common use that adequately expresses a few simple and related ideas.

      • Trusted Partner
        Computing & IT
        July 2023

        The seven veils of privacy

        How our debates about privacy conceal its nature

        by Kieron O'Hara

        Privacy is one of the most contested concepts of our time. This book sets out a rigorous and comprehensive framework for understanding debates about privacy and our rights to it. Much of the conflict around privacy comes from a failure to recognise divergent perspectives. Some people argue about human rights, some about social conventions, others about individual preferences and still others about information and data processing. As a result, 'privacy' has become the focus of competing definitions, leading some to denounce the 'disarray' in the field. But as this book shows, disagreements about the role and value of privacy obscure a large amount of agreement on the topic. Privacy is not a technical term of law, cybersecurity or sociology, but a word in common use that adequately expresses a few simple and related ideas.

      • Computer security
        June 2013

        The True Cost of Information Security Breaches and Cyber Crime

        A Pocket Guide

        by Michael Krausz, John Walker

        This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.

      • Computer security
        June 2013

        The True Cost of Information Security Breaches and Cyber Crime

        A Pocket Guide

        by Michael Krausz, John Walker

        This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.

      • Computer security
        June 2013

        The True Cost of Information Security Breaches and Cyber Crime

        A Pocket Guide

        by Michael Krausz, John Walker

        This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.

      • Computer security
        August 2012

        Once More Unto the Breach

        Managing information security in an uncertain world

        by Andrea C Simmons

      • Computer security

        Application security in the ISO27001 Environment

        by Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan

        Application Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001. It does this in the context of a wider roll out of an information security management system (ISMS) that conforms to ISO/IEC 27001. Over 224 pages, they address a range of essential topics, including an introduction to ISO27001 and ISO27002, secure development lifecycles, threat profiling and security testing, and secure coding guidelines. As well as showing how to use ISO27001 to secure individual applications, the book demonstrates how to tackle this issue as part of the development and roll out of an organisation-wide Information Security Management System conforming to the Standard. Software packages are the conduits to critical business data, thus securing applications adequately is of the utmost importance. Thus you must order a copy of this book today, as it is the de-facto standard on application security in the ISO/IEC 27001 environment.   Key Features:   De-facto standard on application security in the ISO/IEC 27001 environment. Leads the reader step-by-step through all of the phases of how to secure software applications in the context of rolling out of an ISO/IEC 27001 ISMS. Demonstrates how to secure such mainstream applications as the Microsoft Office suite, SAP, Lotus Notes, Adobe applications, SAGE, Skype, and many other software applications.

      • Computer security
        March 2010

        Assessing Information Security

        Strategies, Tactics, Logic and Framework

        by Andrew A. Vladimirov

        What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. The human factor Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Fight Cybercrime Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy. Leadership Fighting cybercrime is about more than bureaucracy and compliance. Your company's approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company's information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime. Strategy Business is an intensely competitive environment. This is why so many executives enjoy the insights that the classics of military strategy, such as Clausewitz and Sun Tzu, provide on how to win. The authors of this book have drawn on Clausewitz in order to interpret the detailed knowledge of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

      • Computer security
        June 2014

        At the Nexus of Cybersecurity and Public Policy

        Some Basic Concepts and Issues

        by David Clark, Thomas Berson, and Herbert S. Lin, Editors; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council

        We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.

      • Computer security
        January 1989

        Scaling Up

        A Research Agenda for Software Engineering

        by Computer Science and Technology Board, National Research Council

        Large and growing opportunity costs are resulting from the inability to produce sophisticated, reliable software in a timely manner. Software engineering presents stubborn problems, but in this book, a group of experts suggest several constructive directions for research. Together, they support the need for greater interaction between researchers and practitioners and more aggressive efforts to share and reuse software engineering knowledge.

      • Computer security
        January 2001

        Principles and Practices for a Federal Statistical Agency

        Second Edition

        by Margaret E. Martin, Miron L. Straf, and Constance F. Citro, Editors; Committee on National Statistics, National Research Council

        Since 1992, the Committee on National Statistics (CNSTAT) has produced a book on principles and practices for a federal statistical agency, updating the document every 4 years to provide a current edition to newly appointed cabinet secretaries at the beginning of each presidential administration. This second edition presents and comments on three basic principles that statistical agencies must embody in order to carry out their mission fully: (1) They must produce objective data that are relevant to policy issues, (2) they must achieve and maintain credibility among data users, and (3) they must achieve and maintain trust among data providers. The book also discusses 11 important practices that are means for statistical agencies to live up to the four principles. These practices include a commitment to quality and professional practice and an active program of methodological and substantive research.

      • Computer security
        January 1993

        Private Lives and Public Policies

        Confidentiality and Accessibility of Government Statistics

        by George T. Duncan, Thomas B. Jabine, and Virginia A. de Wolf, Editors; Panel on Confidentiality and Data Access, National Research Council

        Americans are increasingly concerned about the privacy of personal data--yet we demand more and more information for public decision making. This volume explores the seeming conflicts between privacy and data access, an issue of concern to federal statistical agencies collecting the data, research organizations using the data, and individuals providing the data. A panel of experts offers principles and specific recommendations for managing data and improving the balance between needed government use of data and the privacy of respondents. The volume examines factors such as the growth of computer technology, that are making confidentiality an increasingly critical problem. The volume explores how data collectors communicate with data providers, with a focus on informed consent to use data, and describes the legal and ethical obligations data users have toward individual subjects as well as toward the agencies providing the data. In the context of historical practices in the United States, Canada, and Sweden, statistical techniques for protecting individuals' identities are evaluated in detail. Legislative and regulatory restraints on access to data are examined, including a discussion about their effects on research. This volume will be an important and thought-provoking guide for policymakers and agencies working with statistics as well as researchers and concerned individuals.

      • Computer security
        January 1994

        Health Data in the Information Age

        Use, Disclosure, and Privacy

        by Molla S. Donaldson and Kathleen N. Lohr, Editors; Committee on Regional Health Data Networks, Institute of Medicine

        Regional health care databases are being established around the country with the goal of providing timely and useful information to policymakers, physicians, and patients. But their emergence is raising important and sometimes controversial questions about the collection, quality, and appropriate use of health care data. Based on experience with databases now in operation and in development, Health Data in the Information Age provides a clear set of guidelines and principles for exploiting the potential benefits of aggregated health data--without jeopardizing confidentiality. A panel of experts identifies characteristics of emerging health database organizations (HDOs). The committee explores how HDOs can maintain the quality of their data, what policies and practices they should adopt, how they can prepare for linkages with computer-based patient records, and how diverse groups from researchers to health care administrators might use aggregated data. Health Data in the Information Age offers frank analysis and guidelines that will be invaluable to anyone interested in the operation of health care databases.

      • Computer security
        December 1999

        A Question of Balance

        Private Rights and the Public Interest in Scientific and Technical Databases

        by Committee for a Study on Promoting Access to Scientific and Technical Data for the Public Interest, National Research Council

        New legal approaches, such as the European Union's 1996 Directive on the Legal Protection of Databases, and other legal initiatives now being considered in the United States at the federal and state level, are threatening to compromise public access to scientific and technical data available through computerized databases. Lawmakers are struggling to strike an appropriate balance between the rights of database rights holders, who are concerned about possible commercial misappropriation of their products, and public-interest users of the data such as researchers, educators, and libraries. A Question of Balance examines this balancing act. The committee concludes that because database rights holders already enjoy significant legal, technical, and market-based protections, the need for statutory protection has not been sufficiently substantiated. Nevertheless, although the committee opposes the creation of any strong new protective measures, it recognizes that some additional limits against wholesale misappropriation of databases may be necessary. In particular, a new, properly scoped and focused U.S. statute might provide a reasonable alternative to the European Union's highly protectionistic database directive. Such legislation could then serve as a legal model for an international treaty in this area. The book recommends a number of guiding principles for such possible legislation, as well as related policy actions for the administration.

      • Computer security
        June 2003

        Protecting Participants and Facilitating Social and Behavioral Sciences Research

        by Constance F. Citro, Daniel R. Ilgen, and Cora B. Marrett, Editors, Panel on Institutional Review Boards, Surveys, and Social Science Research, National Research Council

        Institutional review boards (IRBs) are the linchpins of the protection systems that govern human participation in research. In recent years, high-profile cases have focused attention on the weaknesses of the procedures for protecting participants in medical research. The issues surrounding participants protection in the social, behavioral, and economic sciences may be less visible to the public eye, but they are no less important in ensuring ethical and responsible research. This report examines three key issues related to human participation in social, behavioral, and economic sciences research: (1) obtaining informed, voluntary consent from prospective participants: (2) guaranteeing the confidentiality of information collected from participants, which is a particularly challenging problem in social sciences research; and (3) using appropriate review procedures for “minimal-risk†research. Protecting Participants and Facilitating Social and Behavioral Sciences Research will be important to policy makers, research administrators, research sponsors, IRB members, and investigators. More generally, it contains important information for all who want to ensure the best protectionâ€"for participants and researchers alikeâ€"in the social, behavioral, and economic sciences.

      • Computer security
        March 2003

        Information Technology for Counterterrorism

        Immediate Actions and Future Possibilities

        by John L. Hennessy, David A. Patterson, and Herbert S. Lin, Editors, Committee on the Role of Information Technology in Responding to Terrorism, National Research Council

        Information technology (IT) is essential to virtually all of the nation’s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation’s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

      • Computer security
        October 2007

        Toward a Safer and More Secure Cyberspace

        by Seymour E. Goodman and Herbert S. Lin, Editors, Committee on Improving Cybersecurity Research in the United States, National Research Council

        Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation’s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.

      Subscribe to our

      newsletter