<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01883nam a2200217 i 4500</leader>
  <controlfield tag="005">20251112201441.0</controlfield>
  <controlfield tag="008">220614s2023    njua     b    001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9781800612853</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.8</subfield>
    <subfield code="b">RebR</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
    <subfield code="a">Regulating Cyber Technologies :</subfield>
    <subfield code="b">Privacy vs Security /</subfield>
    <subfield code="c">edited by Nathalie R&#xE9;b&#xE9;</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Hackensack :</subfield>
    <subfield code="b">World Scientific,</subfield>
    <subfield code="c">&#xA9;2023</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xxxi, 344p.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">"Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber-world. New technologies are generating both privacy and security issues involving anonymity, cross border transactions, virtual communications and assets, among others. This book is a collection of works by experts on cyber matters and legal considerations that need addressing in a timely manner. It comprises cross-disciplinary knowledge that is pooled to this end. Risk mitigation tools, including cyber risk management, data protection regulations, as well as ethical practice guidelines are reviewed in detail. The regulatory issues associated with new technologies along with emergent challenges in the field of cybersecurity that require improved regulatory frameworks are considered. We probe ethical, material, and enforcement threats, thus revealing the inadequacy of current legal practices. To address these shortcomings, we propose new regulatory privacy and security guidelines that can be implemented to deal with the new technologies and cyber matters"--</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Information Technology</subfield>
    <subfield code="x">Management.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer Security</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Database Security</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">R&#xE9;b&#xE9;, Nathalie [Ed.]</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">7442</subfield>
    <subfield code="d">7442</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">PHY</subfield>
    <subfield code="a">IITTP</subfield>
    <subfield code="b">IITTP</subfield>
    <subfield code="c">GEN</subfield>
    <subfield code="d">2025-10-16</subfield>
    <subfield code="e">Shri Raghavendra Global Books</subfield>
    <subfield code="g">8457.33</subfield>
    <subfield code="i">9349</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.8 RebR (12097)</subfield>
    <subfield code="p">12097</subfield>
    <subfield code="r">2026-02-18 00:00:00</subfield>
    <subfield code="t">Copy 01</subfield>
    <subfield code="v">12081.90</subfield>
    <subfield code="w">2025-10-16</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
