Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 1–10 of 300 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Electronic Collaboration in Science

    Edited by Stephen H. Koslow, Michael F. Huerta

    Series: Progress in Neuroinformatics Research Series

    The increasingly sophisticated and powerful information technology we are creating plays an ever more prominent role in facilitating interaction and cooperation in everyday life. The time has come to harness it in the service of scientific research. This pathbreaking book describes the technical...

    Published February 5th 2015 by Psychology Press

  2. Cybercrime and Digital Forensics

    An Introduction

    By Thomas J Holt, Adam M Bossler, Kathryn C Seigfried-Spellar

    The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another...

    Published January 27th 2015 by Routledge

  3. Social Media, Politics and the State

    Protests, Revolutions, Riots, Crime and Policing in the Age of Facebook, Twitter and YouTube

    Edited by Daniel Trottier, Christian Fuchs

    Series: Routledge Research in Information Technology and Society

    This book is the essential guide for understanding how state power and politics are contested and exercised on social media. It brings together contributions by social media scholars who explore the connection of social media with revolutions, uprising, protests, power and counter-power, hacktivism...

    Published January 27th 2015 by Routledge

  4. The Data Bank Society (Routledge Revivals)

    Organizations, Computers and Social Freedom

    By John Smith

    Series: Routledge Revivals

    This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy...

    Published January 19th 2015 by Routledge

  5. Data Privacy for the Smart Grid

    By Rebecca Herold, Christine Hertzog

    Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its...

    Published January 15th 2015 by Auerbach Publications

  6. Privacy, Due Process and the Computational Turn

    The Philosophy of Law Meets the Philosophy of Technology

    Edited by Mireille Hildebrandt, Katja De Vries

    Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management,...

    Published January 7th 2015 by Routledge

  7. Multilevel Security for Relational Databases

    By Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, Hala S. El-Sayed

    Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support...

    Published December 4th 2014 by Auerbach Publications

  8. Cybervetting

    Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

    By Edward J. Appel

    Researching an individual’s, firm’s or brand’s online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for...

    Published November 12th 2014 by CRC Press

  9. Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

    Published October 29th 2014 by Chapman and Hall/CRC

  10. Physical Security and Safety

    A Field Guide for the Practitioner

    Edited by Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

    Series: Occupational Safety & Health Guide Series

    How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the...

    Published October 29th 2014 by CRC Press