August 2023
Intermediate to advanced
1040 pages
38h 39m
English
In previous chapters, we focus on technical and management controls that address various aspects of computer security and privacy. In this chapter we study the legal and ethical questions that arise in designing, building, maintaining, and using devices and software that make claims related to security and privacy. As we note elsewhere, security and privacy existed well before computing. The legal system has adapted quite well to computer technology by reusing some old forms of legal ...