Jump to ContentJump to Main Navigation

You are looking at 1-20 of 25 items

  • Keywords: information security x
Clear All Modify Search

View:

Electronic government in Japan: Towards harmony between technology solutions and administrative systems

Toshiro Kita

in Recovering from Success: Innovation and Technology Management in Japan

Published in print:
2006
Published Online:
September 2007
ISBN:
9780199297320
eISBN:
9780191711237
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199297320.003.0016
Subject:
Business and Management, Innovation

This chapter looks at government and policy from a different perspective. E-Government has been an important if overlooked part of the e-Japan strategy, and central to this is Juki-net. The debacle ... More


Expenditures on Competitor Analysis and Information Securit y: A Managerial Accounting Perspective

Alnoor Bhimani

in Management Accounting in the Digital Economy

Published in print:
2003
Published Online:
August 2004
ISBN:
9780199260386
eISBN:
9780191601231
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/0199260389.003.0005
Subject:
Economics and Finance, Financial Economics

This chapter examines the strategic relations between expenditures on competitor analysis (CA) and information security (IS), and the implications for management accounting. It is shown that the ... More


Understanding Regulatory and Consumer Interest in the Cloud

Jonathan Cave, Neil Robinson, Svitlana Kobzar, and Helen Rebecca Schindler

in Regulating the Cloud: Policy for Computing Infrastructure

Published in print:
2015
Published Online:
May 2016
ISBN:
9780262029407
eISBN:
9780262331166
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029407.003.0006
Subject:
Computer Science, Programming

This Chapter presents two frameworks to help understand the range of concerns relative to consumer harm articulated at national and European level in the context of cloud computing. These concerns ... More


Basic Principles

Keith M. Martin

in Everyday Cryptography: Fundamental Principles and Applications

Published in print:
2012
Published Online:
December 2013
ISBN:
9780199695591
eISBN:
9780191774898
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199695591.003.0001
Subject:
Mathematics, Applied Mathematics

This chapter discusses the basic principles of cryptography. It covers the role of cryptography in securing information; the types of risk to which information is typically exposed; the main security ... More


Information Lost: Will the “Paradise” That Information Promises, to Both Consumer and Firm, Be “Lost” on Account of Data Breaches? The Epic is Playing Out

Catherine L. Mann

in Economic Analysis of the Digital Economy

Published in print:
2015
Published Online:
September 2015
ISBN:
9780226206844
eISBN:
9780226206981
Item type:
chapter
Publisher:
University of Chicago Press
DOI:
10.7208/chicago/9780226206981.003.0011
Subject:
Economics and Finance, Development, Growth, and Environmental

Vast amounts of information result from business and consumer search, communication, and transactions. All this information can enhance market efficiency and consumer surplus as firms tailor products ... More


Introduction

Andrea M. Matwyshyn

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0001
Subject:
Law, Intellectual Property, IT, and Media Law

This introductory chapter briefly sets out the book's purpose, which is to explore some of the dynamics behind corporations' struggle with information security. It then discusses the reasons behind ... More


Information Security and Contracts: Contracting Insecurity: Software License Terms That Undermine Information Security

Jennifer A. Chandler

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0010
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter examines software contracting through the lens of cybersecurity in order to analyze terms and practices that arguably reduce the general level of cybersecurity. The inspiration for this ... More


Everyday Cryptography: Fundamental Principles and Applications

Keith M. Martin

Published in print:
2012
Published Online:
December 2013
ISBN:
9780199695591
eISBN:
9780191774898
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199695591.001.0001
Subject:
Mathematics, Applied Mathematics

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents an introduction to the role that cryptography plays in providing information ... More


Harboring Data: Information Security, Law, and the Corporation

Andrea M. Matwyshyn (ed.)

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
book
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.001.0001
Subject:
Law, Intellectual Property, IT, and Media Law

As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the ... More


Conclusion

Andrea M. Matwyshyn

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0012
Subject:
Law, Intellectual Property, IT, and Media Law

This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of ... More


Reporting of Information Security Breaches: A Reporter's View: Corporate Information Security and the Impact of Data Breach Notification Laws

Kim Zetter

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0004
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter presents an insider's view of how information about corporate information security breaches reaches the public. It says that “[d]espite the passage of state-level data security breach ... More


Information Security of Health Data: Electronic Health Information Security and Privacy

Sharona Hoffman and Andy Podgurski

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0007
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter analyzes electronic health data security vulnerabilities and the legal framework that has been established to address them. It describes the wide-ranging threats to health information ... More


Information Security of Financial Data: Quasi-Secrets: The Nature of Financial Information and Its Implications for Data Security

Cem Paya

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0008
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter presents a technical critique challenging the most basic premises underlying the Gramm–Leach–Bliley Act—that “financial data” refers to data held by financial institutions. Instead, it ... More


Information Technology for a Safe and Secure Society in Japan: Toward a Cyber-Physical Solution

Kazuo Takaragi

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0012
Subject:
Information Science, Information Science

This chapter introduces the topic of information technology for a safe and secure society in Japan and shows an emerging trend toward a cyber-physical solution. It begins by reviewing major security ... More


Looking at Information Security Through an Interdisciplinary Lens: Computer Science as a Social Science: Applications to Computer Security

Jonathan Pincus, Sarah Blankinship, and Tomasz Ostwald

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0002
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter argues for a multidisciplinary perspective in analyzing information security. Developing the best information security practices requires broadening the scope of current perspectives on ... More


Information Security and Patents: Embedding Thickets in Information Security? Cryptography Patenting and Strategic Implications for Information Technology

Greg R. Vetter

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0005
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter discusses the strategic concerns companies face in deciding whether to patent information security methods. It argues that the full promise of cryptography for information security is ... More


Information Security, Law, and Data-Intensive Business Models: Data Control and Social Networking: Irreconcilable Ideas?

Lilian Edwards and Ian Brown

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0011
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter discusses the challenges to information security from social networking websites and the new business models they represent. The success of this new generation of data-intensive virtual ... More


The Information Vulnerability Landscape: Compromising Positions: Organizational and Hacker Responsibility for Exposed Digital Records

Kris Erickson and Philip N. Howard

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0003
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter explores how responsibility for protecting electronic data is currently attributed and examines legislation aimed at managing the problem of compromised personal records. It compares the ... More


Evolving Legal Frameworks for Protecting the Right to Internet Privacy in China

Xu Jinghong

in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

Published in print:
2015
Published Online:
April 2015
ISBN:
9780190201265
eISBN:
9780190201302
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780190201265.003.0010
Subject:
Economics and Finance, International

When discussing the Internet in China, most Western audiences only hear about espionage or Internet control portrayed by their media. They do not understand China’s social and economic Internet ... More


Everyday Cryptography: Fundamental Principles and Applications

Keith Martin

Published in print:
2017
Published Online:
July 2017
ISBN:
9780198788003
eISBN:
9780191829956
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198788003.001.0001
Subject:
Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing ... More


View: