This kind of approach to the information infrastructure that can be trusted by all of its users and, hence, will be secured for all of us and our children to come.
– Joseph Kizza, University of Tennessee-Chattanooga, USA
This volume discusses security protocols and practices for the current information infrastructure. It surveys issues such as moral and ethical education and security, privacy, and anonymity and their effects on the creation of an ethical framework for decision making.
– Books News Inc . (2008)
The book's 17 chapters have a consistent style: an introduction describing what will be presented, often followed by relevant definitions, then the body of the chapter, a summary conclusion, and references.
– CHOICE, Vol. 45, No. 8 (April 2008)