Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best pr...Lees meer
How and why the US government gave up its control of ICANN, the global coordinator of internet names, numbers, and protocols--and what the geopolitica...Lees meer
Interdisciplinary perspectives on the role of new information technologies, including mobile phones, wireless networks, and biometric identification, ...Lees meer
How hacking cultures drive contemporary capitalism and the future of innovation. In Resistance to the Current , Johan Söderberg and Maxigas examine fo...Lees meer
Why the Internet was designed to be the way it is, and how it could be different, now and in the future. How do you design an internet? The architectu...Lees meer
An examination of "cultural zoning" in China considers why government regulation of online video is so much more lenient than regulation of broadcast ...Lees meer
The rich, untold origin story of the ubiquitous web cookie--what's wrong with it, why it's being retired, and how we can do better. Consent pop-ups co...Lees meer
What the Open Government Partnership tells us about how international initiatives can and do shape domestic public sector reform. At the 2011 meeting ...Lees meer
How, despite thirty years of effort, Soviet attempts to build a national computer network were undone by socialists who seemed to behave like capitali...Lees meer
When science competes with myriad influences in public policymaking, how can we ensure that it does so effectively? Policymakers, like most people tod...Lees meer
A framework for understanding the totality of costs and benefits of universal access that will foster honest appraisal and guide the development of go...Lees meer
How the basic concepts of economics--including markets, institutions, and money--can be used to create and analyze economies based on virtual goods. I...Lees meer
How the blockchain--a system built on foundations of mutual mistrust--can become trustworthy. The blockchain entered the world on January 3, 2009, int...Lees meer
An exploration of how design might be led by marginalized communities, dismantle structural inequality, and advance collective liberation and ecologic...Lees meer
New perspectives on the misinformation ecosystem that is the production and circulation of fake news. What is fake news? Is it an item on Breitbart, a...Lees meer
Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management. As cybersecu...Lees meer
An argument that the movement for network neutrality was of a piece with its neoliberal environment, solidifying the continued existence of a commerci...Lees meer
Scholars from across law and internet and media studies examine the human rights implications of today's platform society. Today such companies as App...Lees meer
An examination of environmental satellite data sharing policies, offering a model of data-sharing policy development, case and practical recommendatio...Lees meer
Scholars from a range of disciplines discuss research methods, theories, and conceptual approaches in the study of internet governance. The design and...Lees meer
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the...Lees meer
The emergence of the cloud as infrastructure: experts from a range of disciplines consider policy issues including reliability, privacy, consumer prot...Lees meer
How data science and the analysis of networks help us solve the puzzle of unintended consequences. Social life is full of paradoxes. Our intentional a...Lees meer
How, despite thirty years of effort, Soviet attempts to build a national computer network were undone by socialists who seemed to behave like capitali...Lees meer