Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
From encryption to quantum computing...
~
Daalen, Ot van.
Linked to FindBook
Google Book
Amazon
博客來
From encryption to quantum computing = the governance of information security and human rights /
Record Type:
Electronic resources : Monograph/item
Title/Author:
From encryption to quantum computing/ by Ot van Daalen.
Reminder of title:
the governance of information security and human rights /
Author:
Daalen, Ot van.
Published:
The Hague :T.M.C. Asser Press : : 2025.,
Description:
xii, 367 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1. Introduction -- Part I The Landscape -- Chapter 2. The Technological and Societal Landscape -- Chapter 3. The Governance Landscape -- Part II The Human Rights Framework -- Chapter 4 Human Rights in Context -- Chapter 5. The Right to Privacy and Data Protection -- Chapter 6. The Right to Communications Freedom -- Chapter 7 The Right to Science -- Part III Synthesis -- Chapter 8. Human Rights-Compatible Information Security Cycle Governance -- Chapter 9. Human Rights-Compatible Encryption Governance -- Chapter 10. Human Rights-Compatible Quantum Computing Governance -- Chapter 11. Conclusion and Summary.
Contained By:
Springer Nature eBook
Subject:
Computer security - Law and legislation. -
Online resource:
https://doi.org/10.1007/978-94-6265-635-2
ISBN:
9789462656352
From encryption to quantum computing = the governance of information security and human rights /
Daalen, Ot van.
From encryption to quantum computing
the governance of information security and human rights /[electronic resource] :by Ot van Daalen. - The Hague :T.M.C. Asser Press :2025. - xii, 367 p. :ill., digital ;24 cm. - Information technology and law series,v. 382215-1966 ;. - Information technology and law series ;v. 38..
Chapter 1. Introduction -- Part I The Landscape -- Chapter 2. The Technological and Societal Landscape -- Chapter 3. The Governance Landscape -- Part II The Human Rights Framework -- Chapter 4 Human Rights in Context -- Chapter 5. The Right to Privacy and Data Protection -- Chapter 6. The Right to Communications Freedom -- Chapter 7 The Right to Science -- Part III Synthesis -- Chapter 8. Human Rights-Compatible Information Security Cycle Governance -- Chapter 9. Human Rights-Compatible Encryption Governance -- Chapter 10. Human Rights-Compatible Quantum Computing Governance -- Chapter 11. Conclusion and Summary.
This book examines the implications of information security which plays such an important role in modern digital infrastructure. Information security technologies restrict the (mis)use of this infrastructure, while also constantly being probed by researchers, intelligence agencies and criminals. One can see this cycle of making and breaking everywhere in the digital sphere. An important example of this cat-and-mouse game is the development of quantum computers, which may in the near future break some widely used encryption technologies. This cycle also has implications for human rights: weakening encryption may affect privacy, for example. But the relationship between human rights and information security has not been investigated in-depth before. In this study, state obligations relating to information security are analysed under the European Convention for Human Rights and the EU Charter for Fundamental Rights, focusing on issues as human rights-compatible encryption policy, on how governments should deal with vulnerabilities in software, and whether governments can curtail the development and export of quantum computers. This book analyses the human rights-compatibility of quantum computing governance and offers unique insights into the connection between human rights and information security that will be relevant for legal practitioners, policy-makers and academics involved in this field of research. Ot van Daalen is Assistant Professor at the Institute for Information Law (IViR), Faculty of Law of the University of Amsterdam, the Netherlands.
ISBN: 9789462656352
Standard No.: 10.1007/978-94-6265-635-2doiSubjects--Topical Terms:
845952
Computer security
--Law and legislation.
LC Class. No.: K564.C6
Dewey Class. No.: 343.0999
From encryption to quantum computing = the governance of information security and human rights /
LDR
:03279nmm a2200337 a 4500
001
2410600
003
DE-He213
005
20240901130242.0
006
m d
007
cr nn 008maaau
008
260204s2025 ne s 0 eng d
020
$a
9789462656352
$q
(electronic bk.)
020
$a
9789462656345
$q
(paper)
024
7
$a
10.1007/978-94-6265-635-2
$2
doi
035
$a
978-94-6265-635-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
K564.C6
072
7
$a
LNJ
$2
bicssc
072
7
$a
LAW000000
$2
bisacsh
072
7
$a
LNJ
$2
thema
082
0 4
$a
343.0999
$2
23
090
$a
K564.C6
$b
D111 2025
100
1
$a
Daalen, Ot van.
$3
3784570
245
1 0
$a
From encryption to quantum computing
$h
[electronic resource] :
$b
the governance of information security and human rights /
$c
by Ot van Daalen.
260
$a
The Hague :
$b
T.M.C. Asser Press :
$b
Imprint: T.M.C. Asser Press,
$c
2025.
300
$a
xii, 367 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Information technology and law series,
$x
2215-1966 ;
$v
v. 38
505
0
$a
Chapter 1. Introduction -- Part I The Landscape -- Chapter 2. The Technological and Societal Landscape -- Chapter 3. The Governance Landscape -- Part II The Human Rights Framework -- Chapter 4 Human Rights in Context -- Chapter 5. The Right to Privacy and Data Protection -- Chapter 6. The Right to Communications Freedom -- Chapter 7 The Right to Science -- Part III Synthesis -- Chapter 8. Human Rights-Compatible Information Security Cycle Governance -- Chapter 9. Human Rights-Compatible Encryption Governance -- Chapter 10. Human Rights-Compatible Quantum Computing Governance -- Chapter 11. Conclusion and Summary.
520
$a
This book examines the implications of information security which plays such an important role in modern digital infrastructure. Information security technologies restrict the (mis)use of this infrastructure, while also constantly being probed by researchers, intelligence agencies and criminals. One can see this cycle of making and breaking everywhere in the digital sphere. An important example of this cat-and-mouse game is the development of quantum computers, which may in the near future break some widely used encryption technologies. This cycle also has implications for human rights: weakening encryption may affect privacy, for example. But the relationship between human rights and information security has not been investigated in-depth before. In this study, state obligations relating to information security are analysed under the European Convention for Human Rights and the EU Charter for Fundamental Rights, focusing on issues as human rights-compatible encryption policy, on how governments should deal with vulnerabilities in software, and whether governments can curtail the development and export of quantum computers. This book analyses the human rights-compatibility of quantum computing governance and offers unique insights into the connection between human rights and information security that will be relevant for legal practitioners, policy-makers and academics involved in this field of research. Ot van Daalen is Assistant Professor at the Institute for Information Law (IViR), Faculty of Law of the University of Amsterdam, the Netherlands.
650
0
$a
Computer security
$x
Law and legislation.
$3
845952
650
1 4
$a
IT Law, Media Law, Intellectual Property.
$3
3384747
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Human Rights.
$3
760752
650
2 4
$a
European Law.
$3
1566626
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Information technology and law series ;
$v
v. 38.
$3
3784571
856
4 0
$u
https://doi.org/10.1007/978-94-6265-635-2
950
$a
Law and Criminology (SpringerNature-41177)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9516098
電子資源
11.線上閱覽_V
電子書
EB K564.C6
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login