Jump to ratings and reviews
Rate this book

Unauthorized Access: The Crisis in Online Privacy and Security

Rate this book
Going beyond current books on privacy and security, Unauthorized The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language.The authors—two renowned experts on computer security and law—explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security.Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

398 pages, Kindle Edition

First published October 15, 2012

42 people are currently reading
32 people want to read

About the author

Robert Sloan

21 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
2 (25%)
4 stars
3 (37%)
3 stars
2 (25%)
2 stars
0 (0%)
1 star
1 (12%)
Displaying 1 - 4 of 4 reviews
Profile Image for Carter.
597 reviews
December 7, 2021
A lot of this material, was refresher for me; I still, often do not agree with the prevailing wisdom, in this field. Security, is a difficult problem, in some situations, especially when private data crosses the boundary between two systems, which is exploited in phishing scams. This also applies to web applications and services. The notion of zero trust, cannot be applied in this instance.
Profile Image for Matt Amann.
2 reviews1 follower
March 5, 2019
Spooky

The crisis of our times explained in such a way that even the most uninformed will begin to fear for the risks to their immortal soul inherent in technology use.
Profile Image for Tuna.
288 reviews5 followers
November 16, 2014
Excellent book detailing the need for norms in online privacy due to information aggregates collecting a wealth of information that most people don't agree with.
Displaying 1 - 4 of 4 reviews

Can't find what you're looking for?

Get help and learn more about the design.