000335250 000__ 02985cam\a2200361\a\4500 000335250 001__ 335250 000335250 005__ 20210513122442.0 000335250 008__ 081021s2009\\\\paua\\\\\b\\\\001\0\eng\\ 000335250 010__ $$a 2008043297 000335250 020__ $$a9781605662046 000335250 020__ $$a1605662046 000335250 035__ $$a(OCoLC)ocn263146758 000335250 035__ $$a335250 000335250 040__ $$aDLC$$cDLC$$dYDX$$dBTCTA$$dYDXCP$$dBWX$$dUKM$$dCDX 000335250 049__ $$aISEA 000335250 05000 $$aHV6773$$b.S635 2009 000335250 08200 $$a364.16/8$$222 000335250 24500 $$aSocioeconomic and legal implications of electronic intrusion /$$c[edited by] Dionysios Politis, Phaedon Kozyris, Ioannis Iglezakis. 000335250 260__ $$aHershey, PA :$$bInformation Science Reference,$$cc2009. 000335250 300__ $$axix, 367 p. :$$bill. ;$$c29 cm. 000335250 504__ $$aIncludes bibliographical references and index. 000335250 5050_ $$aThe socioeconomic background of electronic crime -- Intrusion in the sphere of personal communication -- Criminal sanctions against electronic intrusion -- Protecting identity without comprising privacy : privacy implications of identity protection -- RFID technology and its impact on privacy : is society one step before the disappearance of personal data protection? -- How much is too much? How marketing professionals can avoid violating privacy laws by understanding the privacy principles -- Navigating the internet : privacy and the "transparent" individual -- Controlling electronic intrusion by unsolicited unwanted bulk spam : privacy vs. freedom of communication -- Cyberproperty in the United States : trespass to chattels & new technology -- Digital forensics and the chain of custody to counter cybercrime -- An analysis of privacy and security in the Zachman and federal enterprise architecture frameworks -- Surveillance in the 21st century : integration of law and technology -- Designing light weight intrusion detection systems : non-negative matrix factorization approach -- Data mining of personal information : a taste of the intrusion legacy with a sprinkling of semanic web -- Surveillance of employees' electronic communications in the workplace : an employers' right to spy or an invasion of privacy? -- Forensic watermarking for secure multimedia distribution -- Spam and advertisement : proposing a model for charging intrusion -- European e-signatures solutions on the basis of PKI authentication technology -- Security of alternative delivery channels in banking : issues and countermeasures. 000335250 520__ $$a"This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher. 000335250 650_0 $$aComputer crimes$$xSocial aspects. 000335250 650_0 $$aComputer crimes$$xLaw and legislation. 000335250 650_0 $$aComputer networks$$xSecurity measures. 000335250 650_0 $$aConsumer protection. 000335250 650_0 $$aSpam (Electronic mail)$$xLaw and legislation. 000335250 650_0 $$aPrivacy, Right of. 000335250 650_0 $$aIdentity theft. 000335250 7001_ $$aPolitis, Dionysios. 000335250 7001_ $$aKozyris, Phaedon J.$$q(Phaedon John) 000335250 7001_ $$aIglezakis, Ioannis,$$d1965- 000335250 85200 $$bgen$$hHV6773$$i.S635$$i2009 000335250 909CO $$ooai:library.usi.edu:335250$$pGLOBAL_SET 000335250 980__ $$aBIB 000335250 980__ $$aBOOK