Cybersecurity – Essentials: Institutions, Instruments, Types and Forms

Amazon Price: $39.00 $36.37 You save: $2.63 (7%). (as of February 18, 2018 01:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This paper examines the phenomenon of cybercrime, as a serious hazard of new, digital society. Different forms of cybercrime are described, accompanied with up-to-date statistical data. Focus is put on available international legal framework as well as on the major institutional bodies – state or non-governmental – aimed to achieve security in cyberspace. The authors also attempt to evaluate the costs of particular cyber, criminal activities whereas basic ethical issues regarding piracy are also examined. Finally, this work end with the study case elaborating the cyber issue in the Central Asian Republics (Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan).

The Black Box Society: The Secret Algorithms That Control Money and Information

Rating: 
Amazon Price: $36.00 $35.98 You save: $0.02 (%). (as of February 18, 2018 03:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Every day, corporations are connecting the dots about our personal behavior—silently scrutinizing clues left behind by our work habits and Internet use. The data compiled and portraits created are incredibly detailed, to the point of being invasive. But who connects the dots about what firms are doing with this information? The Black Box Society argues that we all need to be able to do so—and to set limits on how big data affects our lives.

Hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only scratched the surface of this troubling behavior.
Continue reading “The Black Box Society: The Secret Algorithms That Control Money and Information”

Cyber Law in Argentina

Amazon Price: $103.00 $51.50 You save: $51.50 (50%). (as of February 17, 2018 22:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law–the law affecting information and communication technology (ICT)–in Argentina covers every aspect of the subject, including intellectual property rights in the ICT sector, relevant competition rules, drafting and negotiating ICT-related contracts, electronic transactions, privacy issues, and computer crime. Lawyers who handle transnational matters will appreciate the detailed explanation of specific characteristics of practice and procedure.

Following a general introduction, the book assembles its information and guidance in seven main areas of practice: the regulatory framework of the electronic communications market; software protection, legal protection of databases or chips, and other intellectual property matters; contracts with regard to software licensing and network services, with special attention to case law in this area; rules with regard to electronic evidence, regulation of electronic signatures, electronic banking, and electronic commerce; specific laws and regulations with respect to the liability of network operators and service providers and related product liability; protection of individual persons in the context of the processing of personal data and confidentiality; and the application of substantive criminal law in the area of ICT.
Continue reading “Cyber Law in Argentina”

Consent of the Networked: The Worldwide Struggle For Internet Freedom

Rating: 
Amazon Price: N/A (as of February 18, 2018 18:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Internet was going to liberate us, but in truth it has not. For every story about the web’s empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon.

Sudden changes in Facebook’s features and privacy settings have exposed identities of protestors to police in Egypt and Iran. Apple removes politically controversial apps at the behest of governments as well as for its own commercial reasons. Dozens of Western companies sell surveillance technology to dictatorships around the world. Google struggles with censorship demands from governments in a range of countries—many of them democracies—as well as mounting public concern over the vast quantities of information it collects about its users.
Continue reading “Consent of the Networked: The Worldwide Struggle For Internet Freedom”

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

Rating: 
Amazon Price: $54.00 $54.00 (as of February 18, 2018 04:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy.

Cyberattacks–actions intended to damage adversary computer systems or networks–can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues.
Continue reading “Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities”