Cyber law and cyber security in developing and emerging economies / (Record no. 945215)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01906nam a2200265 a 4500 |
001 - CONTROL NUMBER | |
control field | vtls000098829 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IIMC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20221117183722.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 140626 2010 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781845428716 |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] | |
-- | 201406261955 |
-- | VLOAD |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 343.1240999 |
Item number | KAR |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Shalhoub, Zeinab karake |
9 (RLIN) | 2785130 |
245 1# - TITLE STATEMENT | |
Title | Cyber law and cyber security in developing and emerging economies / |
Statement of responsibility, etc. | Zeinab Karake Shalhoub and Sheikha Lubna Al Qasimi |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Cheltenham : |
Name of publisher, distributor, etc. | Edward Elgar, |
Date of publication, distribution, etc. | 2010 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | v, 239 p. 24 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | This book reveals that the diffusion of cyber activities in developing and emerging economies is relatively low, with the main stumbling blocks resting in regulatory, cultural, and social factors. The authors argue that cyber crimes constitute a prime obstacle to the diffusion of e-commence and e-governments in developing economies, and governments have an important role in developing control mechanisms in the form of laws. However, setting appropriate policies and complementary services, particularly those affecting the telecommunications sector and other infrastructure, human capital and the investment environment, severely constrains Internet access. Using both strategic and operational perspectives, the authors discuss the concrete experience of constructing and implementing cyber laws and cyber security measures in developing and emerging countries, |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Law and legislation |
-- | Developing countries |
9 (RLIN) | 1620620 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
General subdivision | Law and legislation |
-- | Developing countries. |
9 (RLIN) | 1620621 |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Qasimi, Sheikha Lubna Al |
9 (RLIN) | 1620622 |
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN) | |
a | 129547~~~C |
903 ## - LOCAL DATA ELEMENT C, LDC (RLIN) | |
a | 129547~~~C |
904 ## - LOCAL DATA ELEMENT D, LDD (RLIN) | |
a | <Computer networks --Law and legislation --Developing countries><Computer security --Law and legislation --Developing countries.> |
949 ## - LOCAL PROCESSING INFORMATION (OCLC) | |
-- | VIRTUAITEM |
-- | 10000 |
-- | 10000 |
-- | 1 |
6 | 129547 |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Calcutta | Calcutta | 17/11/2022 | 343.1240999 KAR | IIMC-129547 | 17/11/2022 | 17/11/2022 | Book |