語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on cyber law, data protection, and privacy
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Handbook of research on cyber law, data protection, and privacyNisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors.
其他作者:
Khan, Shaharyar Asaf,
出版者:
Hershey, Pennsylvania :IGI Global,2022.
面頁冊數:
1 online resource (390 p.)
標題:
InternetLaw and Legislation.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8641-9
ISBN:
9781799886433$q(ebook)
Handbook of research on cyber law, data protection, and privacy
Handbook of research on cyber law, data protection, and privacy
[electronic resource] /Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors. - Hershey, Pennsylvania :IGI Global,2022. - 1 online resource (390 p.)
Includes bibliographical references and index.
Chapter 1. Principles of data privacy and security in a cyber world -- Chapter 2. Data access, privacy, protection methods, and challenges: a systematic literature review -- Chapter 3. Privacy and other legal concerns in the wake ofdeepfake technology: comparative study of India, US, and China -- Chapter 4. Social media and cyber security: investigating the risk in Nigeria -- Chapter 5. The European Union's proposed artificial intelligence legislation and the path ahead for Asian approaches to artifical intelligence -- Chapter 6. Blockchain technology in the agricultural supply chain: a case study of India -- Chapter 7. Gauging the scale of intertwinement: juggling between the use of biometric data andright to privacy -- Chapter 8. Cybersquatting: need for protection of domain names in the realm of cyberspace -- Chapter 9. Evolution of cryptocurrency: analysing the utility, legality, and regulatory framework in India -- Chapter 10. Cryptocurrency: a detailed study -- Chapter 11. Blockchain technology efficiently managing information and cyber security -- Chapter 12. The cryptocurrency "pump-and-dump": social media and legal and ethical ambiguity -- Chapter 13. Considerations for blockchain-based online dispute resolution -- Chapter 14. A decade in pixels: analyzing incidents of state-sponsored surveillance from the last decade -- Chapter 15. A Survey on privacy-preserving data publishing models for big data--Chapter 16. Critical appraisal of challenges to online consumer fissures in information technology law in India -- Chapter 17. OTT platforms and their distributorship agreement with content makers: a study from the perspective of competition law and policy in India and other jurisdictions -- Chapter 18. Mapping the changing contours of electronic evidence in India -- Chapter 19. The vulnerability of children in cyberspace -- Chapter 20. Artificial intelligence: the need of the hour.
"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additionalregulations to safeguard user identification, data and privacy"
ISBN: 9781799886433$q(ebook)Subjects--Topical Terms:
974023
Internet
--Law and Legislation.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: K564.C6 / H26 2022eb
Dewey Class. No.: 343.0999
Handbook of research on cyber law, data protection, and privacy
LDR
:03125nmm a2200241 a 4500
001
662246
006
m d
007
cr nn muauu
008
241202s2022 pau fob 001 0 eng d
020
$a
9781799886433$q(ebook)
020
$a
9781799886419$q(hardcover)
035
$a
(OCoLC)1310045670
035
$a
00272191
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
K564.C6
$b
H26 2022eb
082
0 4
$a
343.0999
$2
23
245
0 0
$a
Handbook of research on cyber law, data protection, and privacy
$h
[electronic resource] /
$c
Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2022.
300
$a
1 online resource (390 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Principles of data privacy and security in a cyber world -- Chapter 2. Data access, privacy, protection methods, and challenges: a systematic literature review -- Chapter 3. Privacy and other legal concerns in the wake ofdeepfake technology: comparative study of India, US, and China -- Chapter 4. Social media and cyber security: investigating the risk in Nigeria -- Chapter 5. The European Union's proposed artificial intelligence legislation and the path ahead for Asian approaches to artifical intelligence -- Chapter 6. Blockchain technology in the agricultural supply chain: a case study of India -- Chapter 7. Gauging the scale of intertwinement: juggling between the use of biometric data andright to privacy -- Chapter 8. Cybersquatting: need for protection of domain names in the realm of cyberspace -- Chapter 9. Evolution of cryptocurrency: analysing the utility, legality, and regulatory framework in India -- Chapter 10. Cryptocurrency: a detailed study -- Chapter 11. Blockchain technology efficiently managing information and cyber security -- Chapter 12. The cryptocurrency "pump-and-dump": social media and legal and ethical ambiguity -- Chapter 13. Considerations for blockchain-based online dispute resolution -- Chapter 14. A decade in pixels: analyzing incidents of state-sponsored surveillance from the last decade -- Chapter 15. A Survey on privacy-preserving data publishing models for big data--Chapter 16. Critical appraisal of challenges to online consumer fissures in information technology law in India -- Chapter 17. OTT platforms and their distributorship agreement with content makers: a study from the perspective of competition law and policy in India and other jurisdictions -- Chapter 18. Mapping the changing contours of electronic evidence in India -- Chapter 19. The vulnerability of children in cyberspace -- Chapter 20. Artificial intelligence: the need of the hour.
520
3
$a
"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additionalregulations to safeguard user identification, data and privacy"
650
0
$a
Internet
$x
Law and Legislation.
$3
974023
650
0
$a
Computer crimes
$x
Law and legislation.
$3
683921
650
0
$a
Data protection
$x
Law and legislation.
$3
174562
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Khan, Shaharyar Asaf,
$d
1983-
$3
974019
700
1
$a
Sharma, Mamta.
$3
974020
700
1
$a
Agarwal, Aarushi,
$d
1988-
$3
974021
700
1
$a
Khan, Zubair Ahmed,
$d
1985-
$3
974022
700
1
$a
Dewani, Nisha Dhanraj,
$d
1985-
$e
editor.
$3
867722
710
2
$a
IGI Global.
$3
529832
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8641-9
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000243107
電子館藏
1圖書
電子書
EB K564.C6 H26 2022eb 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8641-9
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入