Reference Hub1
Indices2
Handbook of Research on Emerging Developments in Data Privacy

Handbook of Research on Emerging Developments in Data Privacy

Copyright: © 2015 |Pages: 507
ISBN13: 9781466673816|ISBN10: 1466673818|EISBN13: 9781466673823
DOI: 10.4018/978-1-4666-7381-6
Cite Book Cite Book

MLA

Gupta, Manish, editor. Handbook of Research on Emerging Developments in Data Privacy. IGI Global, 2015. https://doi.org/10.4018/978-1-4666-7381-6

APA

Gupta, M. (Ed.). (2015). Handbook of Research on Emerging Developments in Data Privacy. IGI Global. https://doi.org/10.4018/978-1-4666-7381-6

Chicago

Gupta, Manish, ed. Handbook of Research on Emerging Developments in Data Privacy. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-7381-6

Export Reference

Mendeley
Favorite Full-Book Download

Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company.

The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the legal aspects of identity protection, trust and security, and detection techniques, this comprehensive work is a valuable resource for any business, legal, or technology professional looking to improve information security within their organization.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Legal Aspects  (pages 25-26)
Legal Aspects
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Identity Protection  (pages 100-100)
Identity Protection
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Trust and Security  (pages 198-198)
Trust and Security
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Detection Techniques  (pages 339-339)
Detection Techniques
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.