Security and the Networked Society

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cybe

  • PDF / 5,268,777 Bytes
  • 309 Pages / 439.42 x 683.15 pts Page_size
  • 41 Downloads / 237 Views

DOWNLOAD

REPORT


curity and the Networked Society

Security and the Networked Society

Mark A. Gregory • David Glance

Security and the Networked Society Foreword by Margaret Gardner AO and Robyn Owens

Mark A. Gregory RMIT University Melbourne, VIC, Australia

David Glance University of Western Australia Crawley, WA, Australia

ISBN 978-3-319-02389-2 ISBN 978-3-319-02390-8 (eBook) DOI 10.1007/978-3-319-02390-8 Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2013951227 © Springer International Publishing Switzerland 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

A special thank you to Susan Lagerstrom-Fife at Springer who supported this book from the outset. The authors would like to thank The Conversation (http://www.theconversation. edu.au) and Technology Spectator (http://www.technologyspectator.com.au). Special thanks goes to the editors who assisted with the preparation of the material included in this book: From The Conversation Andrew Jaspan, Misha Ketchell, Helen Westerman, Matt De Neef, Paul Dalgarno, Bella Counihan, Gillian Terzis and Charis Palmer and from Technology Spectator Supratim Adhikari and Harrison Polites. Thanks also to our universities RMIT University and University of Western Australia for supporting The Convers