Narrow your search

Library

KBR (1)

LUCA School of Arts (1)

NATO Library (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLouvain (1)

UCLL (1)

UGent (1)

VIVES (1)

More...

Resource type

book (3)


Language

English (3)


Year
From To Submit

2022 (1)

1995 (2)

Listing 1 - 3 of 3
Sort by
Legislating privacy
Author:
ISBN: 0807864056 0585028001 9780585028002 9780807837795 0807837792 9780807864050 0807822264 9780807822265 0807845329 9780807845325 9798890869395 Year: 1995 Publisher: Chapel Hill University of North Carolina Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

While technological threats to personal privacy have proliferated rapidly, legislation designed to protect privacy has been slow and incremental. In this study of legislative attempts to reconcile privacy and technology, Priscilla Regan examines congressional policy making in three key areas: computerized databases, wiretapping, and polygraph testing. In each case, she argues, legislation has represented an unbalanced compromise benefiting those with a vested interest in new technology over those advocating privacy protection. Legislating Privacy explores the dynamics of congressio

Legislating privacy : technology, social values, and public policy
Author:
ISBN: 0807822264 Year: 1995 Publisher: Chapel Hill London University of North Carolina Press


Book
Cyber Intelligence : Actors, Policies, and Practices 
Author:
ISBN: 9781626379657 9781626379664 1626379653 1626379661 Year: 2022 Publisher: Boulder, CO : Lynne Rienner,

Loading...
Export citation

Choose an application

Bookmark

Abstract

US national security compromised by WikiLeaks. Towns held hostage by ransomware. Corporate websites hacked. Cyber espionage and cybercrimes are increasing in both frequency and sophistication - requiring the collection of actionable intelligence in order to combat them. The author provides here a comprehensive overview of cyber intelligence, explaining what it is, why it is needed, who is doing it, and how it is done. Notably, the book : Outlines the roles of the major US intelligence agencies involved; Assesses significant laws and policies from the 1990s to the present; Compares methods and best practices across the public and private sectors; Looks beyond the US to explore the capabilities of actors like China, Iran, and Russia; Includes real-world examples and case studies. The result is an in-depth examination of the processes and applications of spying in cyberspace, accessible to a wide range of readers.

Listing 1 - 3 of 3
Sort by