Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 41–50 of 273 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 5

  1. Data Governance

    Creating Value from Information Assets

    Edited by Neera Bhansali

    As organizations deploy business intelligence and analytic systems to harness business value from their data assets, data governance programs are quickly gaining prominence. And, although data management issues have traditionally been addressed by IT departments, organizational issues critical to...

    Published June 16th 2013 by Auerbach Publications

  2. Infoglut

    How Too Much Information Is Changing the Way We Think and Know

    By Mark Andrejevic

    Today, more mediated information is available to more people than at any other time in human history. New and revitalized sense-making strategies multiply in response to the challenges of "cutting through the clutter" of competing narratives and taming the avalanche of information. Data miners, "...

    Published June 16th 2013 by Routledge

  3. Effective Surveillance for Homeland Security

    Balancing Technology and Social Issues

    Edited by Francesco Flammini, Roberto Setola, Giorgio Franceschetti

    Series: Multimedia Computing, Communication and Intelligence

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current...

    Published June 9th 2013 by Chapman and Hall/CRC

  4. The Digital Divide

    The Internet and Social Inequality in International Perspective

    Edited by Massimo Ragnedda, Glenn W. Muschert

    Series: Routledge Advances in Sociology

    This book provides an in-depth comparative analysis of inequality and the stratification of the digital sphere. Grounded in classical sociological theories of inequality, as well as empirical evidence, this book defines ‘the digital divide’ as the unequal access and utility of internet...

    Published June 4th 2013 by Routledge

  5. Privacy, Due Process and the Computational Turn

    The Philosophy of Law Meets the Philosophy of Technology

    Edited by Mireille Hildebrandt, Katja de Vries

    Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management,...

    Published May 23rd 2013 by Routledge

  6. The Complete Book of Data Anonymization

    From Planning to Implementation

    By Balaji Raghunathan

    Series: Infosys Press

    The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner's and a program sponsor's perspective. Discussing analysis, planning, setup, and...

    Published May 20th 2013 by Auerbach Publications

  7. Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

    By Mohssen Mohammed, Al-Sakib Khan Pathan

    Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods ...

    Published May 20th 2013 by Auerbach Publications

  8. Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured...

    Published May 7th 2013 by CRC Press

  9. Guide to the De-Identification of Personal Health Information

    By Khaled El Emam

    Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients’ privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health...

    Published May 5th 2013 by Auerbach Publications

  10. Investigating Computer-Related Crime, Second Edition

    By Peter Stephenson, Keith Gilbert

    Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research...

    Published April 18th 2013 by CRC Press