|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Emerging as an effective alternative to organization-based
information systems, cloud computing has been adopted by many
businesses around the world. Despite the increased popularity,
there remain concerns about the security of data in the cloud since
users have become accustomed to having control over their hardware
and software. Security, Trust, and Regulatory Aspects of Cloud
Computing in Business Environments compiles the research and views
of cloud computing from various individuals around the world.
Detailing cloud security, regulatory and industry compliance, and
trust building in the cloud, this book is an essential reference
source for practitioners, professionals, and researchers worldwide,
as well as business managers interested in an assembled collection
of solutions provided by a variety of cloud users.
Data collection allows today's businesses to cater to each
customer's individual needs and provides a necessary edge in a
competitive market. However, any breach in confidentiality can
cause serious consequences for both the consumer and the company.
The Handbook of Research on Emerging Developments in Data Privacy
brings together new ideas on how to deal with potential leaks of
valuable customer information. Highlighting the legal aspects of
identity protection, trust and security, and detection techniques,
this comprehensive work is a valuable resource for any business,
legal, or technology professional looking to improve information
security within their organization.
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
Breaches and identity theft involving medical data are on the rise.
Data security has become especially critical to the healthcare
industry as patient privacy hinges on legal compliance and secure
adoption of electronic health records. As cyber criminals see
medical data as an easy way to illegally obtain medical goods and
services or sell sensitive information, major security flaws can
pose serious threats to the health and safety of patients. The
Handbook of Research on Medical Data Security for Bioengineers
seeks to provide a cross-disciplinary forum on research in privacy
preserving healthcare systems and engineering applications in
medical data security. The goal of the book is to instigate
discussion on these critical issues since the success of electronic
healthcare applications depends directly on patient security and
privacy for ethical and legal reasons. While highlighting topics
including data privacy, encryption strategies, and smart health,
this book is ideally designed for IT experts, computer engineers,
biomedical engineer practitioners, professionals, researchers, and
post-doctoral and graduate students.
Secret sharing schemes form one of the most important topic in
Cryptography. These protocols are used in many areas, applied
mathematics, computer science, electrical engineering. A secret is
divided into several pieces called shares. Each share is given to a
user of the system. Each user has no information about the secret,
but the secret can be retrieved by certain authorized coalition of
users.This book is devoted to such schemes inspired by Coding
Theory. The classical schemes of Shamir, Blakley, Massey are
recalled. Survey is made of research in Combinatorial Coding Theory
they triggered, mostly self-dual codes, and minimal codes.
Applications to engineering like image processing, and key
management of MANETs are highlighted.
Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid,
to explain the phenomenal, yet under-researched relationship
between terrorists and media professionals in which acts of
terrorism and media coverage are exchanged, influenced, and fueled
by one another. Exchanging Terrorism Oxygen for Media Airwaves: The
Age of Terroredia provides a timely and thorough discussion on a
wide range of issues surrounding terrorism in relation to both
traditional and new media. Comprised of insights and research from
leading experts in the fields of terrorism and media studies, this
publication presents various topics relating to Terroredia:
understanding of terrorism and the role of the media, terrorism
manifestations and media representations of terrorism, types of
terrorism and media stereotypes of terrorism, terrorism tactics and
media strategies, the war on terrorism, the function of terrorism
and the employment of the media, new terrorism and new media,
contemporary cases of terrorist-media interactions, the rationality
behind terrorism and counterterrorism, as well as the
responsibility of the media. This publication is of interest to
government officials, media professionals, researchers, and
upper-level students interested in learning more about the complex
relationship between terrorism and the media.
Technology has become profoundly integrated into modern society;
however, this increases the risk of vulnerabilities, such as
hacking and other system errors, along with other online threats.
Security, Privacy, and Anonymization in Social Networks: Emerging
Research and Opportunities is a pivotal reference source for the
most up-to-date research on edge clustering models and weighted
social networks. Presenting widespread coverage across a range of
applicable perspectives and topics, such as neighborhood attacks,
fast k-degree anonymization (FKDA), and vertex-clustering
algorithms, this book is ideally designed for academics,
researchers, post-graduates, and practitioners seeking current
research on undirected networks and greedy algorithms for social
network anonymization.
As data mining is one of the most rapidly changing disciplines with
new technologies and concepts continually under development,
academicians, researchers, and professionals of the discipline need
access to the most current information about the concepts, issues,
trends, and technologies in this emerging field.""Social
Implications of Data Mining and Information Privacy:
Interdisciplinary Frameworks and Solutions"" serves as a critical
source of information related to emerging issues and solutions in
data mining and the influence of political and socioeconomic
factors. An immense breakthrough, this essential reference provides
concise coverage of emerging issues and technological solutions in
data mining, and covers problems with applicable laws governing
such issues.
Personal Data Privacy and Protection in a Surveillance Era:
Technologies and Practices spans a number of interdependent and
emerging topics in the area of legal protection of privacy and
technology. This book explores the new threats that cyberspace
poses to the privacy of individuals, as well as the threats that
surveillance technologies generate in public spaces and in digital
communication. It examines media practices and privacy frameworks
in the fields of copyright, digital management and genetic
information. New models of data protection are proposed along with
their advantages and disadvantages.
Information security is moving much higher up the agenda of
corporate concerns. The pitfalls lying in wait of corporate
information are legion. If information is our most important asset,
then we must fortify ourselves for the task of protecting it
properly. This book is a compilation of contributed chapters by
researches and practitioners addressing issues, trends and
challenges facing the management of information security in this
new millennium. Information Security Management: Global Challenges
in the New Millennium focuses on aspects of information security
planning, evaluation, design and implementation.
With the proliferation of devices connected to the internet and
connected to each other, the volume of data collected, stored, and
processed is increasing every day, which brings new challenges in
terms of information security. As big data expands with the help of
public clouds, traditional security solutions tailored to private
computing infrastructures and confined to a well-defined security
perimeter, such as firewalls and demilitarized zones (DMZs), are no
longer effective. New security functions are required to work over
the heterogenous composition of diverse hardware, operating
systems, and network domains. Security, Privacy, and Forensics
Issues in Big Data is an essential research book that examines
recent advancements in big data and the impact that these
advancements have on information security and privacy measures
needed for these networks. Highlighting a range of topics including
cryptography, data analytics, and threat detection, this is an
excellent reference source for students, software developers and
engineers, security analysts, IT consultants, academicians,
researchers, and professionals.
Geared towards technical professionals, marketing managers,
finance/business strategists, law/policy makers, and educators
whose work involves e-commerce, this unique book provides a clear
overview of the legal and public policy issues associated with
computer networks and electronic transaction and security. It
identifies various forms of potential legal and commercial
liability, and advises what legal claims may be raised, by whom,
and the potential impact of these claims. Methods to reduce or
eliminate liability are discussed, offering practical, operational
guidance to professionals. The book also describes the legal rights
of computer system and electronic commerce operators that can be
applied to help preserve security and to recover in the event that
security is breached.
Technological innovation and evolution continues to improve
personal and professional lifestyles, as well as general
organizational and business practices; however, these advancements
also create potential issues in the security and privacy of the
user's information. Innovative Solutions for Access Control
Management features a comprehensive discussion on the trending
topics and emergent research in IT security and governance.
Highlighting theoretical frameworks and best practices, as well as
challenges and solutions within the topic of access control and
management, this publication is a pivotal reference source for
researchers, practitioners, students, database vendors, and
organizations within the information technology and computer
science fields.
Cyber security, encompassing both information and network security,
is of utmost importance in today s information age. Cyber Security
Standards, Practices and Industrial Applications: Systems and
Methodologies details the latest and most important advances in
security standards. First, it introduces the differences between
information security (covers the understanding of security
requirements, classification of threats, attacks and information
protection systems and methodologies) and network security
(includes both security protocols as well as systems which create a
security perimeter around networks for intrusion detection and
avoidance). In addition, the book serves as an essential reference
to students, researchers, practitioners and consultants in the area
of social media, cyber security and information and communication
technologies (ICT).
The path forward to rein in online surveillance, AI, and tech monopolies.
Technology is a gift and a curse. The five Big Tech companies―Meta, Apple, Amazon, Microsoft, and Google―have built innovative products that improve many aspects of our lives. But their intrusiveness and our dependence on them have created pressing threats to our civil rights, economy, and democracy.
Coming from an extensive background building Silicon Valley-based tech startups, Tom Kemp eloquently and precisely weaves together the threats posed by Big Tech:
- the overcollection and weaponization of our most sensitive data
- the problematic ways Big Tech uses AI to process and act upon our data
- the stifling of competition and entrepreneurship due to Big Tech's dominant market position
This richly detailed book exposes the consequences of Big Tech's digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices. It offers actionable solutions to these problems and a clear path forward for individuals and policymakers to advocate for change. By containing the excesses of Big Tech, we will ensure our civil rights are respected and preserved, our economy is competitive, and our democracy is protected.
|
You may like...
Sermons
Joseph Butler
Paperback
R580
Discovery Miles 5 800
Too Late
Colleen Hoover
Paperback
R295
R264
Discovery Miles 2 640
Vrydagaand
Elsa Winckler
Paperback
R339
Discovery Miles 3 390
|