ABSTRACT

Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security.

chapter Chapter 1|12 pages

Introduction

Size: 0.17 MB
Size: 1.21 MB

chapter Chapter 3|21 pages

Norms and Markets

Size: 0.21 MB

chapter Chapter 4|19 pages

Informational Privacy

The General Theory
Size: 0.18 MB

chapter Chapter 5|30 pages

Informational Privacy

Norms and Value Optimality
Size: 0.26 MB
Size: 0.25 MB

chapter Chapter 7|23 pages

Software Vulnerabilities

Creating Best Practices
Size: 0.20 MB

chapter Chapter 8|40 pages

Computers and Networks

Attack and Defense
Size: 1.27 MB

chapter Chapter 9|30 pages

Malware, Norms, and ISPs

Size: 0.79 MB

chapter Chapter 10|22 pages

Malware

Creating a Best Practices Norm
Size: 0.23 MB

chapter Chapter 11|30 pages

Tracking, Contracting, and Behavioral Advertising

Size: 0.29 MB

chapter Chapter 12|52 pages

From One-Sided Chicken to Value Optimal Norms

Size: 0.42 MB