Карточка | Таблица | RUSMARC | |
Handbook of research on cyber law, data protection, and privacy / Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors. — 1 online resource — <URL:http://elib.fa.ru/ebsco/3299999.pdf>.Дата создания записи: 07.06.2021 Тематика: Internet — Law and legislation.; Computer crimes — Law and legislation.; Data protection — Law and legislation.; Computer crimes — Law and legislation.; Data protection — Law and legislation.; Internet — Law and legislation. Коллекции: EBSCO Разрешенные действия: –
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Группа: Анонимные пользователи Сеть: Интернет |
Аннотация
"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privacy"--.
Права на использование объекта хранения
Место доступа | Группа пользователей | Действие | ||||
---|---|---|---|---|---|---|
Локальная сеть Финуниверситета | Все | |||||
Интернет | Читатели | |||||
Интернет | Анонимные пользователи |
Оглавление
- Cover
- Title Page
- Copyright Page
- Book Series
- Editorial Advisory Board
- List of Contributors
- Table of Contents
- Detailed Table of Contents
- Foreword
- Preface
- Acknowledgment
- Chapter 1: Principles of Data Privacy and Security in a Cyber World
- Chapter 2: Data Access, Privacy, Protection Methods, and Challenges
- Chapter 3: Privacy and Other Legal Concerns in the Wake of Deepfake Technology
- Chapter 4: Social Media and Cyber Security
- Chapter 5: The European Union's Proposed Artificial Intelligence Legislation and the Path Ahead for Asian Approaches to Artifical Intelligence
- Chapter 6: Blockchain Technology in the Agricultural Supply Chain
- Chapter 7: Gauging the Scale of Intertwinement
- Chapter 8: Cybersquatting
- Chapter 9: Evolution of Cryptocurrency
- Chapter 10: Cryptocurrency
- Chapter 11: Blockchain Technology Efficiently Managing Information and Cyber Security
- Chapter 12: The Cryptocurrency “Pump-and-Dump”
- Chapter 13: Considerations for Blockchain-Based Online Dispute Resolution
- Chapter 14: A Decade in Pixels
- Chapter 15: A Survey on Privacy-Preserving Data Publishing Models for Big Data
- Chapter 16: Critical Appraisal of Challenges to Online Consumer Fissures in Information Technology Law in India
- Chapter 17: OTT Platforms and Their Distributorship Agreement With Content Makers
- Chapter 18: Mapping the Changing Contours of Electronic Evidence in India
- Chapter 19: The Vulnerability of Children in Cyberspace
- Chapter 20: Artificial Intelligence
- Compilation of References
- About the Contributors
- Index
Статистика использования
Количество обращений: 0
За последние 30 дней: 0 Подробная статистика |