Socioeconomic and Legal Implications of Electronic Intrusion, 1st Edition

  • Published By:
  • ISBN-10: 1605662054
  • ISBN-13: 9781605662053
  • Grade Level Range: College Freshman - College Senior
  • 367 Pages | eBook
  • Original Copyright 2009 | Published/Released July 2009
  • This publication's content originally published in print form: 2009

  • Price:  Sign in for price



Focuses on abusive and illegal practices of penetration in the sphere of private communications; provides legal and political practitioners, academicians, and intrusion researchers with expert knowledge into global theft and spam perspectives, identity theft and fraud, and electronic crime issues.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Editorial Advisory Board.
List of Reviewers.
Table of Contents.
Detailed Table of Contents.
1: The Social and Economic Dynamic for Electronic Crime.
2: The Socioeconomic Background of Electronic Crime.
3: Intrusion in the Sphere of Personal Communications.
4: Criminal Sanctions Against Electronic Intrusion.
5: Protecting Identity without Comprising Privacy: Privacy Implications of Identity Protection.
6: RFID Technology and its Impact on Privacy: Is Society One Step before the Disappearance of Personal Data Protection?.
7: How Much is Too Much? How Marketing Professionals can Avoid Violating Privacy Laws by Understanding the Privacy Principles.
8: Navigating in Internet: Privacy and the "Transparent" Individual.
9: Controlling Electronic Intrusion by Unsolicited Unwanted Bulk Spam: Privacy vs. Freedom of Communication.
10: Electronic Intrusion: Technologies, Strategies and Methodologies.
11: Cyberproperty in the United States: Trespass io Chattels & New Technology.
12: Digital Forensics and the Chain of Custody to Counter Cybercrime.
13: An Analysis of Privacy and Security in the Zachman and Federal Enterprise Architecture Frameworks.
14: Surveillance in the 21st Century: Integration of Law and Technology.
15: Designing Light Weight Intrusion Detection Systems: Non-Negative Matrix Factorization Approach.
16: Data Mining of Personal Information: A Taste of the Intrusion Legacy with a Sprinkling of Semantic Web.
17: Surveillance of Employees' Electronic Communications in the Workplace: An Employers' Right to Spy or an Invasion to Privacy?.
18: The Forensic Challenges for Intrusion.
19: Forensic Watermarking for Secure Multimedia Distribution.
20: Spam and Advertisement: Proposing a Model for Charging Intrusion.
21: European E-Signatures Solutions on the Basis of PKI Authentication Technology.
22: Security of Alternative Delivery Channels in Banking: Issues and Countermeasures.
Compilation of References.
About the Contributors.