Security and control of information technology in society: proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Ilich and ashore at St. Peterburg, Russia, 12-17 August 1993
The misuse of information technology (IT) presents a major problem both for Western countries and for the developing world. Dependence on IT is widespread, in the operation and control of a range of social, industrial, commercial, governmental and regulatory processes. It carries with it, threats to personal privacy and freedom and brings new opportunities for criminal activity. These dangers have to be countered and controlled in a manner which balances the great benefits which IT undoubtedly brings. Very careful consideration has to be given to determine the most effective methods of control and regulation of IT. So clarifies Martin Wasik, Professor of Law at Manchester University in his foreword to this book.The publication provides a forum for consideration of the current situation - of what has been done, and of what should be done henceforth, to reduce the misuse of IT. It aims to offer an understanding of threats to IT security and the risks to people and organisations arising from these threats. It also discusses the legal prescriptions required to counteract the threats and to deal with the risks. Further, it establishes the need for close collaboration between legal and technical specialists in the formalisation of remedies. Individual papers examine different aspects of the problem areas and the wide diversity of input from specialists across the world indicates the international significance both of the subject matter and of the book itself.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Conference in Perspective
Is International Law on Security of Information Systems
15 other sections not shown
access control application aspects certification chipcard communication computer crime computer crime law Computer Security computer systems computer virus confidential Control of Information Covert Channel criminal law CTCPEC cultural Cyberpunk data protection decrypting defined document electronic Elsevier Science B.V. encrypting environment federal files Guidelines IFIP impact implemented information protection information security information systems Information Technology Information Technology Security integrity IT-security ITSEC Keywords legislation OECD operating system organisations paper personal data privacy erosion privacy protection problem programs protection profiles requirements Russia SBC framework Science B.V. North-Holland Security and Control Security Evaluation Criteria security functionality security of information security policy signature Sizer social Society A-43 specific St Petersburg standards Stockholm Stockholm University structure surveillance System Security TCSEC technical Technology in Society theft threat trade secret Trusted Computer Trusted Computing Base unauthorized virus Yngstrom