Buch, Englisch, 184 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 312 g
Avoidance, Causes and Possible Cures
Buch, Englisch, 184 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 312 g
ISBN: 978-1-4419-4182-4
Verlag: Springer US
While a plethora of books on identity theft exists, this professional book combines both technical and economic aspects, presented from the perspective of the identified individual. The book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and placing biometric security in an economically broken system, which results in a broken biometric system. The last chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftssysteme, Wirtschaftsstrukturen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Business Application Unternehmenssoftware SAP
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
Weitere Infos & Material
Identity in Economics, and in Context.- Modern Technological and Traditional Social Identities.- Identity Theft.- Who Owns You?.- Defeating the Greatest Masquerade.- Secrecy, Privacy, Identity.- Security and Privacy as Market Failures.- Trusting Code and Trusting Hardware.- Technologies of Identity.- Anonymous Identifiers.- Digital Signatures.- Strengths and Weaknesses of Biometrics.- Reputation.- Scenario I: Your Credentials Please.- Scenario II: Universal National Identifier.- Scenario III: Sets of attributes.- Scenario IV: Ubiquitous Identity Theft.- Closing.