Atnaujinkite slapukų nuostatas

El. knyga: Fighting Terror Online: The Convergence of Security, Technology, and the Law

  • Formatas: PDF+DRM
  • Išleidimo metai: 24-Nov-2007
  • Leidėjas: Springer-Verlag New York Inc.
  • Kalba: eng
  • ISBN-13: 9780387735788
  • Formatas: PDF+DRM
  • Išleidimo metai: 24-Nov-2007
  • Leidėjas: Springer-Verlag New York Inc.
  • Kalba: eng
  • ISBN-13: 9780387735788

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The unprecedented events that have taken place in recent years have led legislators and governments throughout the world to reconsider and restructure their policies regarding security issues. Today, worldwide attention is being given to a new security threat, in the form of global terrorism. Legal systems are being called upon to provide a response to these threats, in all areas of life, including the online environment.Among its many tools, global terror also uses advanced technological methods. This fact presents a difficult challenge to policymakers. Therefore, we have chosen to focus this book on the issue of formulating appropriate policy at the interface between security and technology, human rights and economic policy.The fundamental issue - the tension between security needs and civil rights - is not new. A great deal of experience has been amassed in various countries in this regard, and the question that now arises is whether the existing system of principles and laws, developed on the basis of experience gathered in the “concrete” world, is applicable to the “digital” environment.This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror, and will identify the threats, the security needs, and the issues that are unique to this environment. We examine whether the unique characteristics of this environment require new legal solutions, or whether existing solutions are sufficient. Three areas of online activity are identified that require reexamination: security, monitoring, and propaganda. For each of these, we will indicate the issues, examine existing legal arrangements, and offer guidelines for formulating legal policy. There is a demonstrated need to relate to the digital environment as a battlefront, map the new security threats, and thereby hope to provide focus to the pressing discussion on today's legislative and technological agenda.

Worldwide attention is being given to a new security threat, in the form of global terrorism. This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror, and identifies the threats, the security needs, and the issues that are unique to this environment. The book examines whether the unique characteristics of this environment require new legal solutions, or whether existing solutions are sufficient. Three areas of online activity are identified that require reexamination: security, monitoring, and propaganda. For each of these, the book indicates the issues, examines existing legal arrangements, and offers guidelines for formulating legal policy. There is a demonstrated need to relate to the digital environment as a battlefront, map the new security threats, and thereby hope to provide focus to the pressing discussion on today's legislative and technological agenda.
Introduction 1(1)
Global Wars in a Global Information Environment
1(3)
The Decline of the State
4(2)
The Comeback of the State
6(2)
Balancing Wars through the Law
8(2)
Digital Law
10(2)
The Law of Digital Wars
12(1)
An Outline of the Book
12(3)
The Balance Between Security and Civil Rights
15(48)
Mapping the Threats: Preventing Physical and Virtual Terrorist Attacks
16(2)
Designing Policies to Address New Security Threats
18(19)
Information Warfare
19(3)
Data Security
22(2)
Gathering Information and Surveillance
24(4)
Regulation of Encryption Products
28(2)
Terror Propaganda
30(7)
Preserving Civil Liberties
37(19)
The Right to Privacy
38(6)
Freedom of Expression
44(5)
Enforcement
49(7)
Electronic Commerce and Innovation
56(7)
Ramifications for Research and Development
56(2)
Encryption Regulation and Electronic Commerce
58(5)
The Legal Situation: Prevention and Enforcement in the Information Age
63(44)
The International Scene
64(5)
Protection of the Right to Privacy
64(1)
International Regulation for Protection of Personal Data
65(3)
International Regulation of Encryption Products
68(1)
International Regulation of Decryption Products
68(1)
The United States
69(19)
Protection of the Right to Privacy
69(5)
Protection of the Freedom of Speech
74(6)
American Regulation of Encryption Products
80(5)
American Regulation of Decryption Products
85(3)
The European Union
88(14)
Protection of the Right to Privacy
89(6)
EU Regulation of Encryption
95(4)
EU Regulation of Copyright
99(3)
Other Countries
102(5)
Britain
102(2)
Canada
104(1)
Australia
105(2)
The Legal Framework in Israel
107(30)
The Right to Privacy
107(12)
Search and Seizure
108(2)
Secret Monitoring in Israeli Law
110(9)
Freedom of Speech
119(5)
Liability of Service Providers
119(3)
Enforcement of Hacking Prohibitions
122(2)
Israeli Regulation of Encryption
124(8)
The Framework of the Legal Arrangements up to 1998
125(3)
The Framework of the Legal Arrangements After 1998
128(4)
Freedom of Occupation
132(3)
Property Rights
135(2)
Technological Issues
137(18)
What is Encryption? The Technological Basis
137(2)
The Basic Principle of Encryption: Letter Replacement
139(1)
Symmetrical Encryption
139(2)
Asymmetrical Encryption: Public Key and Private Key
141(5)
The RSA Encryption Method
141(1)
Analysis of the RSA Method
142(4)
How is Information Gathered on the Internet?
146(9)
General Background
146(2)
Means of Collecting Information and Monitoring the Internet
148(4)
Collection of information on the server or the PC
152(3)
Recommendations: Is There a Need for New Regulations?
155(10)
The Existing System's Suitability for the Internet
155(1)
Implementing Existing Legal Regulations for the Internet
156(1)
Protecting the Right to Privacy
157(2)
The Liability of Internet Service Providers
159(1)
Regulating Encryption Products to Protect Freedom of Occupation
160(5)
Concluding Remarks 165(4)
Name Index 169(4)
Subject Index 173


Martin Charles Golumbic is Professor of Computer Science and Director of the Caesarea Edmond Benjamin de Rothschild Foundation Institute for Interdisciplinary Applications of Computer Science at the University of Haifa. He is the editor of the book "Advances in Artificial Intelligence, Natural Language and Knowledge-based Systems" (Springer, 1990), the author of the book "Algorithmic Graph Theory and Perfect Graphs" (second edition, Elsevier 2004), coauthor of a second book "Tolerance Graphs" (Cambridge University Press, 2004), and the founding editor-in-chief of the journal series "Annals of Mathematics and Artificial Intelligence" (Springer). Professor Golumbic received his Ph.D. in mathematics from Columbia University in 1975, and has previously held positions at New York University, Bell Laboratories, IBM Israel and Bar-Ilan University as well as visiting positions at Université de Paris, the Weizmann Institute of Science, and Ecole Polytechnique Fédérale de Lausanne. He has given guest lectures in 15 states in the U.S.A. and in 20 other countries, and he was elected as a Fellow of the European Artificial Intelligence society ECCAI in 2005.