Your Search Results

      • Trusted Partner
        Computing & IT
        July 2023

        The seven veils of privacy

        How our debates about privacy conceal its nature

        by Kieron O'Hara

        Privacy is one of the most contested concepts of our time. This book sets out a rigorous and comprehensive framework for understanding debates about privacy and our rights to it. Much of the conflict around privacy comes from a failure to recognise divergent perspectives. Some people argue about human rights, some about social conventions, others about individual preferences and still others about information and data processing. As a result, 'privacy' has become the focus of competing definitions, leading some to denounce the 'disarray' in the field. But as this book shows, disagreements about the role and value of privacy obscure a large amount of agreement on the topic. Privacy is not a technical term of law, cybersecurity or sociology, but a word in common use that adequately expresses a few simple and related ideas.

      • Trusted Partner
        Computing & IT
        July 2023

        The seven veils of privacy

        How our debates about privacy conceal its nature

        by Kieron O'Hara

        Privacy is one of the most contested concepts of our time. This book sets out a rigorous and comprehensive framework for understanding debates about privacy and our rights to it. Much of the conflict around privacy comes from a failure to recognise divergent perspectives. Some people argue about human rights, some about social conventions, others about individual preferences and still others about information and data processing. As a result, 'privacy' has become the focus of competing definitions, leading some to denounce the 'disarray' in the field. But as this book shows, disagreements about the role and value of privacy obscure a large amount of agreement on the topic. Privacy is not a technical term of law, cybersecurity or sociology, but a word in common use that adequately expresses a few simple and related ideas.

      • Computer security
        June 2013

        The True Cost of Information Security Breaches and Cyber Crime

        A Pocket Guide

        by Michael Krausz, John Walker

        This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.

      • Computer security
        June 2013

        The True Cost of Information Security Breaches and Cyber Crime

        A Pocket Guide

        by Michael Krausz, John Walker

        This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.

      • Computer security
        June 2013

        The True Cost of Information Security Breaches and Cyber Crime

        A Pocket Guide

        by Michael Krausz, John Walker

        This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.

      • Computer security
        August 2012

        Once More Unto the Breach

        Managing information security in an uncertain world

        by Andrea C Simmons

      • Computer security

        Application security in the ISO27001 Environment

        by Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan

        Application Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001. It does this in the context of a wider roll out of an information security management system (ISMS) that conforms to ISO/IEC 27001. Over 224 pages, they address a range of essential topics, including an introduction to ISO27001 and ISO27002, secure development lifecycles, threat profiling and security testing, and secure coding guidelines. As well as showing how to use ISO27001 to secure individual applications, the book demonstrates how to tackle this issue as part of the development and roll out of an organisation-wide Information Security Management System conforming to the Standard. Software packages are the conduits to critical business data, thus securing applications adequately is of the utmost importance. Thus you must order a copy of this book today, as it is the de-facto standard on application security in the ISO/IEC 27001 environment.   Key Features:   De-facto standard on application security in the ISO/IEC 27001 environment. Leads the reader step-by-step through all of the phases of how to secure software applications in the context of rolling out of an ISO/IEC 27001 ISMS. Demonstrates how to secure such mainstream applications as the Microsoft Office suite, SAP, Lotus Notes, Adobe applications, SAGE, Skype, and many other software applications.

      • Computer security
        March 2010

        Assessing Information Security

        Strategies, Tactics, Logic and Framework

        by Andrew A. Vladimirov

        What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. The human factor Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Fight Cybercrime Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy. Leadership Fighting cybercrime is about more than bureaucracy and compliance. Your company's approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company's information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime. Strategy Business is an intensely competitive environment. This is why so many executives enjoy the insights that the classics of military strategy, such as Clausewitz and Sun Tzu, provide on how to win. The authors of this book have drawn on Clausewitz in order to interpret the detailed knowledge of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

      • Computer security
        January 1993

        Private Lives and Public Policies

        Confidentiality and Accessibility of Government Statistics

        by George T. Duncan, Thomas B. Jabine, and Virginia A. de Wolf, Editors; Panel on Confidentiality and Data Access, National Research Council

        Americans are increasingly concerned about the privacy of personal data--yet we demand more and more information for public decision making. This volume explores the seeming conflicts between privacy and data access, an issue of concern to federal statistical agencies collecting the data, research organizations using the data, and individuals providing the data. A panel of experts offers principles and specific recommendations for managing data and improving the balance between needed government use of data and the privacy of respondents. The volume examines factors such as the growth of computer technology, that are making confidentiality an increasingly critical problem. The volume explores how data collectors communicate with data providers, with a focus on informed consent to use data, and describes the legal and ethical obligations data users have toward individual subjects as well as toward the agencies providing the data. In the context of historical practices in the United States, Canada, and Sweden, statistical techniques for protecting individuals' identities are evaluated in detail. Legislative and regulatory restraints on access to data are examined, including a discussion about their effects on research. This volume will be an important and thought-provoking guide for policymakers and agencies working with statistics as well as researchers and concerned individuals.

      • Computer security
        January 1994

        Health Data in the Information Age

        Use, Disclosure, and Privacy

        by Molla S. Donaldson and Kathleen N. Lohr, Editors; Committee on Regional Health Data Networks, Institute of Medicine

        Regional health care databases are being established around the country with the goal of providing timely and useful information to policymakers, physicians, and patients. But their emergence is raising important and sometimes controversial questions about the collection, quality, and appropriate use of health care data. Based on experience with databases now in operation and in development, Health Data in the Information Age provides a clear set of guidelines and principles for exploiting the potential benefits of aggregated health data--without jeopardizing confidentiality. A panel of experts identifies characteristics of emerging health database organizations (HDOs). The committee explores how HDOs can maintain the quality of their data, what policies and practices they should adopt, how they can prepare for linkages with computer-based patient records, and how diverse groups from researchers to health care administrators might use aggregated data. Health Data in the Information Age offers frank analysis and guidelines that will be invaluable to anyone interested in the operation of health care databases.

      • Computer security
        June 2014

        At the Nexus of Cybersecurity and Public Policy

        Some Basic Concepts and Issues

        by David Clark, Thomas Berson, and Herbert S. Lin, Editors; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council

        We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.

      • Computer security
        January 2001

        Principles and Practices for a Federal Statistical Agency

        Second Edition

        by Margaret E. Martin, Miron L. Straf, and Constance F. Citro, Editors; Committee on National Statistics, National Research Council

        Since 1992, the Committee on National Statistics (CNSTAT) has produced a book on principles and practices for a federal statistical agency, updating the document every 4 years to provide a current edition to newly appointed cabinet secretaries at the beginning of each presidential administration. This second edition presents and comments on three basic principles that statistical agencies must embody in order to carry out their mission fully: (1) They must produce objective data that are relevant to policy issues, (2) they must achieve and maintain credibility among data users, and (3) they must achieve and maintain trust among data providers. The book also discusses 11 important practices that are means for statistical agencies to live up to the four principles. These practices include a commitment to quality and professional practice and an active program of methodological and substantive research.

      • Computer security
        February 2016

        Privacy Research and Best Practices

        Summary of a Workshop for the Intelligence Community

        by Emily Grumbling, Rapporteur; Committee for a Workshop on Privacy for the Intelligence Community: Emerging Technologies, Academic and Industry Research, and Best Practices; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Academies of Sciences, Engineering, and Medicine

        Recent disclosures about the bulk collection of domestic phone call records and other signals intelligence programs have stimulated widespread debate about the implications of such practices for the civil liberties and privacy of Americans. In the wake of these disclosures, many have identified a need for the intelligence community to engage more deeply with outside privacy experts and stakeholders. At the request of the Office of the Director of National Intelligence, the National Academies of Sciences, Engineering, and Medicine convened a workshop to address the privacy implications of emerging technologies, public and individual preferences and attitudes toward privacy, and ethical approaches to data collection and use. This report summarizes discussions between experts from academia and the private sector and from the intelligence community on private sector best practices and privacy research results.

      • Computer security
        October 2004

        Summary of a Workshop on Software Certification and Dependability

        by Committee on Certifiably Dependable Software Systems, National Research Council

        Certification of critical software systems (e.g., for safety and security) is important to help ensure their dependability. Today, certification relies as much on evaluation of the software development process as it does on the system’s properties. While the latter are preferable, the complexity of these systems usually makes them extremely difficult to evaluate. To explore these and related issues, the National Coordination Office for Information technology Research and Development asked the NRC to undertake a study to assess the current state of certification in dependable systems. The study is in two phases: the first to frame the problem and the second to assess it. This report presents a summary of a workshop held as part of the first phase. The report presents a summary of workshop participants’ presentations and subsequent discussion. It covers, among other things, the strengths and limitations of process; new challenges and opportunities; experience to date; organization context; and cost-effectiveness of software engineering techniques. A consensus report will be issued upon completion of the second phase.

      • Computer security
        March 2002

        Cybersecurity Today and Tomorrow

        Pay Now or Pay Later

        by National Research Council

        This report reviews past NRC studies that have examined various dimensions of computer and network security and vulnerability and brings the results forward into the context of the current environment of security and vulnerability. The review includes work done since 1991, such as Computers at Risk (1991), Cryptography’s Role in Securing the Information Society (1996), For the Record: Protecting Electronic Health Information (1997), Trust in Cyberspace (1999), Continued Review of the Tax Systems Modernization of the Internal Revenue Service (1996), Realizing the Potential of C4I (1999), and Embedded, Everywhere (2001).

      • Computer security
        December 1999

        A Question of Balance

        Private Rights and the Public Interest in Scientific and Technical Databases

        by Committee for a Study on Promoting Access to Scientific and Technical Data for the Public Interest, National Research Council

        New legal approaches, such as the European Union's 1996 Directive on the Legal Protection of Databases, and other legal initiatives now being considered in the United States at the federal and state level, are threatening to compromise public access to scientific and technical data available through computerized databases. Lawmakers are struggling to strike an appropriate balance between the rights of database rights holders, who are concerned about possible commercial misappropriation of their products, and public-interest users of the data such as researchers, educators, and libraries. A Question of Balance examines this balancing act. The committee concludes that because database rights holders already enjoy significant legal, technical, and market-based protections, the need for statutory protection has not been sufficiently substantiated. Nevertheless, although the committee opposes the creation of any strong new protective measures, it recognizes that some additional limits against wholesale misappropriation of databases may be necessary. In particular, a new, properly scoped and focused U.S. statute might provide a reasonable alternative to the European Union's highly protectionistic database directive. Such legislation could then serve as a legal model for an international treaty in this area. The book recommends a number of guiding principles for such possible legislation, as well as related policy actions for the administration.

      • Computer security
        February 2009

        Beyond the HIPAA Privacy Rule

        Enhancing Privacy, Improving Health Through Research

        by Sharyl J. Nass, Laura A. Levit, and Lawrence O. Gostin, Editors; Committee on Health Research and the Privacy of Health Information: The HIPAA Privacy Rule; Institute of Medicine

        In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of federal standards now known as the HIPAA Privacy Rule. In its 2009 report, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research, the Institute of Medicine's Committee on Health Research and the Privacy of Health Information concludes that the HIPAA Privacy Rule does not protect privacy as well as it should, and that it impedes important health research.

      Subscribe to our

      newsletter