Items
Details
Table of Contents
The socioeconomic background of electronic crime
Intrusion in the sphere of personal communication
Criminal sanctions against electronic intrusion
Protecting identity without comprising privacy : privacy implications of identity protection
RFID technology and its impact on privacy : is society one step before the disappearance of personal data protection?
How much is too much? How marketing professionals can avoid violating privacy laws by understanding the privacy principles
Navigating the internet : privacy and the "transparent" individual
Controlling electronic intrusion by unsolicited unwanted bulk spam : privacy vs. freedom of communication
Cyberproperty in the United States : trespass to chattels & new technology
Digital forensics and the chain of custody to counter cybercrime
An analysis of privacy and security in the Zachman and federal enterprise architecture frameworks
Surveillance in the 21st century : integration of law and technology
Designing light weight intrusion detection systems : non-negative matrix factorization approach
Data mining of personal information : a taste of the intrusion legacy with a sprinkling of semanic web
Surveillance of employees' electronic communications in the workplace : an employers' right to spy or an invasion of privacy?
Forensic watermarking for secure multimedia distribution
Spam and advertisement : proposing a model for charging intrusion
European e-signatures solutions on the basis of PKI authentication technology
Security of alternative delivery channels in banking : issues and countermeasures.
Intrusion in the sphere of personal communication
Criminal sanctions against electronic intrusion
Protecting identity without comprising privacy : privacy implications of identity protection
RFID technology and its impact on privacy : is society one step before the disappearance of personal data protection?
How much is too much? How marketing professionals can avoid violating privacy laws by understanding the privacy principles
Navigating the internet : privacy and the "transparent" individual
Controlling electronic intrusion by unsolicited unwanted bulk spam : privacy vs. freedom of communication
Cyberproperty in the United States : trespass to chattels & new technology
Digital forensics and the chain of custody to counter cybercrime
An analysis of privacy and security in the Zachman and federal enterprise architecture frameworks
Surveillance in the 21st century : integration of law and technology
Designing light weight intrusion detection systems : non-negative matrix factorization approach
Data mining of personal information : a taste of the intrusion legacy with a sprinkling of semanic web
Surveillance of employees' electronic communications in the workplace : an employers' right to spy or an invasion of privacy?
Forensic watermarking for secure multimedia distribution
Spam and advertisement : proposing a model for charging intrusion
European e-signatures solutions on the basis of PKI authentication technology
Security of alternative delivery channels in banking : issues and countermeasures.