000 03817nam a22005415i 4500
001 978-1-4471-4763-3
003 DE-He213
005 20200421112035.0
007 cr nn 008mamaa
008 121116s2013 xxk| s |||| 0|eng d
020 _a9781447147633
_9978-1-4471-4763-3
024 7 _a10.1007/978-1-4471-4763-3
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
082 0 4 _a004
_223
245 1 4 _aThe Secure Information Society
_h[electronic resource] :
_bEthical, Legal and Political Challenges /
_cedited by J�org Kr�uger, Bertram Nickolay, Sandro Gaycken.
264 1 _aLondon :
_bSpringer London :
_bImprint: Springer,
_c2013.
300 _aX, 214 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPreface -- Section 1 - New Strategic Cybersecurity -- Between War & Peace: Considering the Statecraft of Cyberspace -- Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps -- Section 2 - New Regulatory Cybersecurity -- Duties of Care on the Internet -- The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R) -- Data Insecurity: Scams, Blags & Scalawags -- Section 3 - New Technological Cybersecurity -- Content Analysis in the Digital Age: Tools, Functions, and Implications for Security -- Secure Products Using Inherent Features -- Assistant-based Reconstruction of Believed Destroyed Shredded Documents -- In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains.
520 _aIn our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.
650 0 _aComputer science.
650 0 _aPolitical science.
650 0 _aPhilosophy.
650 0 _aComputers and civilization.
650 0 _aElectrical engineering.
650 0 _aEconomic policy.
650 1 4 _aComputer Science.
650 2 4 _aComputers and Society.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aPhilosophy of Technology.
650 2 4 _aR & D/Technology Policy.
650 2 4 _aPolitical Science.
700 1 _aKr�uger, J�org.
_eeditor.
700 1 _aNickolay, Bertram.
_eeditor.
700 1 _aGaycken, Sandro.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781447147626
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4471-4763-3
912 _aZDB-2-SCS
942 _cEBK
999 _c56304
_d56304