0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (209)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The 2018 Yearbook of the Digital Ethics Lab (Paperback, 1st ed. 2019): Carl OEhman, David Watson The 2018 Yearbook of the Digital Ethics Lab (Paperback, 1st ed. 2019)
Carl OEhman, David Watson
R1,451 Discovery Miles 14 510 Ships in 10 - 15 working days

This book explores a wide range of topics in digital ethics. It features 11 chapters that analyze the opportunities and the ethical challenges posed by digital innovation, delineate new approaches to solve them, and offer concrete guidance to harness the potential for good of digital technologies. The contributors are all members of the Digital Ethics Lab (the DELab), a research environment that draws on a wide range of academic traditions. The chapters highlight the inherently multidisciplinary nature of the subject, which cannot be separated from the epistemological foundations of the technologies themselves or the political implications of the requisite reforms. Coverage illustrates the importance of expert knowledge in the project of designing new reforms and political systems for the digital age. The contributions also show how this task requires a deep self-understanding of who we are as individuals and as a species. The questions raised here have ancient -- perhaps even timeless -- roots. The phenomena they address may be new. But, the contributors examine the fundamental concepts that undergird them: good and evil, justice and truth. Indeed, every epoch has its great challenges. The role of philosophy must be to redefine the meaning of these concepts in light of the particular challenges it faces. This is true also for the digital age. This book takes an important step towards redefining and re-implementing fundamental ethical concepts to this new era.

Advanced Applications of Blockchain Technology (Paperback, 1st ed. 2020): Shiho Kim, Ganesh Chandra Deka Advanced Applications of Blockchain Technology (Paperback, 1st ed. 2020)
Shiho Kim, Ganesh Chandra Deka
R4,946 Discovery Miles 49 460 Ships in 10 - 15 working days

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.

The Ethics of Cybersecurity (Paperback, 1st ed. 2020): Markus Christen, Bert Gordijn, Michele Loi The Ethics of Cybersecurity (Paperback, 1st ed. 2020)
Markus Christen, Bert Gordijn, Michele Loi
R2,581 Discovery Miles 25 810 Ships in 10 - 15 working days

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

Handbook of IoT and Blockchain - Methods, Solutions, and Recent Advancements (Hardcover): Brojo Kishore Mishra, Sanjay Kumar... Handbook of IoT and Blockchain - Methods, Solutions, and Recent Advancements (Hardcover)
Brojo Kishore Mishra, Sanjay Kumar Kuanar, Sheng-Lung Peng, Daniel D. Dasig, Jr
R4,444 Discovery Miles 44 440 Ships in 12 - 17 working days

Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain. Chapters include theoretical analysis, practical implications, and extensive surveys with analysis on methods, algorithms, and processes for new product development. IoT and Blockchain are the emerging topics in the current manufacturing scenario.This handbook includes recent advances; showcases the work of research around the globe; offers theoretical analysis and practical implications; presents extensive surveys with analysis, new contributions, and proposals on methods, algorithms, and processes; and also covers recent advances from quantitative and qualitative articles, case studies, conceptual works, and theoretical backing. This handbook will be of interest to graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Blockchain.

Internet of Things-Applications and Future - Proceedings of ITAF 2019 (Paperback, 1st ed. 2020): Atef Zaki Ghalwash, Nashaat El... Internet of Things-Applications and Future - Proceedings of ITAF 2019 (Paperback, 1st ed. 2020)
Atef Zaki Ghalwash, Nashaat El Khameesy, Dalia A. Magdi, Amit Joshi
R5,478 Discovery Miles 54 780 Ships in 10 - 15 working days

This book is a collection of the best research papers presented at the First World Conference on Internet of Things: Applications & Future (ITAF 2019), Sponsored by GR Foundation and French University in Egypt, held at Triumph Luxury Hotel, Cairo, Egypt, on 14-15 October 2019. It includes innovative works from leading researchers, innovators, business executives, and industry professionals that cover the latest advances in and applications for commercial and industrial end users across sectors within the emerging Internet of Things ecosphere. It addresses both current and emerging topics related to the Internet of Things such as big data research, new services and analytics, Internet of Things (IoT) fundamentals, electronic computation and analysis, big data for multi-discipline services, security, privacy and trust, IoT technologies, and open and cloud technologies.

IoT - Security and Privacy Paradigm (Hardcover): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Hardcover)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R4,457 Discovery Miles 44 570 Ships in 12 - 17 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Forensic Discovery (Paperback): Daniel Farmer, Wietse Venema Forensic Discovery (Paperback)
Daniel Farmer, Wietse Venema
R1,130 Discovery Miles 11 300 Ships in 12 - 17 working days

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of "Exploiting Software" and "Building Secure Software"

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
--Steve Bellovin, coauthor of "Firewalls and Internet Security, Second Edition," and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
--Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
--Rik Farrow, Consultant, author of "Internet Security for Home and Office"

"Farmer and Venema do for digital archaeology what Indiana Jones did for historicalarchaeology. "Forensic Discovery" unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
--Richard Bejtlich, technical director, ManTech CFIA, and author of "The Tao of Network Security Monitoring"

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
--Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
--Brian Carrier, digital forensics researcher, and author of "File System Forensic Analysis"The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a widevariety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to Understand essential forensics concepts: volatility, layering, and trustGather the maximum amount of reliable evidence from a running systemRecover partially destroyed information--and make sense of itTimeline your system: understand what really happened whenUncover secret changes to everything from system utilities to kernel modulesAvoid cover-ups and evidence traps set by intrudersIdentify the digital footprints associated with suspicious activityUnderstand file systems from a forensic analyst's point of viewAnalyze malware--without giving it a chance to escapeCapture and examine the contents of main memory on running systems Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.

Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Paperback)
Adam Henschke
R930 Discovery Miles 9 300 Ships in 12 - 17 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover): Suneeta Satpathy, Sachi Mohanty Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover)
Suneeta Satpathy, Sachi Mohanty
R2,206 Discovery Miles 22 060 Ships in 12 - 17 working days

Digital forensics has recently gained a notable development and become the most demanding area in today's information security requirement. This book investigates the areas of digital forensics, digital investigation and data analysis procedures as they apply to computer fraud and cybercrime, with the main objective of describing a variety of digital crimes and retrieving potential digital evidence. Big Data Analytics and Computing for Digital Forensic Investigations gives a contemporary view on the problems of information security. It presents the idea that protective mechanisms and software must be integrated along with forensic capabilities into existing forensic software using big data computing tools and techniques. Features Describes trends of digital forensics served for big data and the challenges of evidence acquisition Enables digital forensic investigators and law enforcement agencies to enhance their digital investigation capabilities with the application of data science analytics, algorithms and fusion technique This book is focused on helping professionals as well as researchers to get ready with next-generation security systems to mount the rising challenges of computer fraud and cybercrimes as well as with digital forensic investigations. Dr Suneeta Satpathy has more than ten years of teaching experience in different subjects of the Computer Science and Engineering discipline. She is currently working as an associate professor in the Department of Computer Science and Engineering, College of Bhubaneswar, affiliated with Biju Patnaik University and Technology, Odisha. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis and decision mining. Dr Sachi Nandan Mohanty is an associate professor in the Department of Computer Science and Engineering at ICFAI Tech, ICFAI Foundation for Higher Education, Hyderabad, India. His research interests include data mining, big data analysis, cognitive science, fuzzy decision-making, brain-computer interface, cognition and computational intelligence.

The Ecosystem of e-Business: Technologies, Stakeholders, and Connections - 17th Workshop on e-Business, WeB 2018, Santa Clara,... The Ecosystem of e-Business: Technologies, Stakeholders, and Connections - 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Jennifer J. Xu, Bin Zhu, Xiao Liu, Michael J. Shaw, Han Zhang, …
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 17th Workshop on e-Business, WeB 2018, which took place in Santa Clara, CA, USA, in December 2018. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2018 theme was "The Ecosystem of e-Business: Technologies, Stakeholders, and Connections." There was a total of 47 submissions and 41 papers were presented at the conference. Of these, 19 revised papers are presented in this volume. These contributions are organized in the following topical sections: social, policy, and privacy issues; e-market; FinTech; and artificial intelligence.

Web Services - ICWS 2019 - 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San... Web Services - ICWS 2019 - 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
John Miller, Eleni Stroulia, Kisung Lee, Liang-Jie Zhang
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 26th International Conference on Web Services, ICWS 2019, held as part of SCF 2019 in San Diego, CA, USA in June 2019. The 11 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 31 submissions. ICWS has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice of Web-based services, to identify emerging research topics, and to define the future of Web-based services. Topics include Internet services modeling, discovery, composition, testing, adaptation, delivery, as well as standards.

Privacy-Preserving Machine Learning (Paperback, 1st ed. 2022): Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li Privacy-Preserving Machine Learning (Paperback, 1st ed. 2022)
Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li
R1,373 Discovery Miles 13 730 Ships in 12 - 17 working days

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.

Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected... Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.

Handbook of Mobile Data Privacy (Paperback, Softcover reprint of the original 1st ed. 2018): Aris Gkoulalas-Divanis, Claudio... Handbook of Mobile Data Privacy (Paperback, Softcover reprint of the original 1st ed. 2018)
Aris Gkoulalas-Divanis, Claudio Bettini
R3,552 Discovery Miles 35 520 Ships in 10 - 15 working days

This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.

Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Hardcover): Richard Warner, Robert Sloan Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Hardcover)
Richard Warner, Robert Sloan
R1,557 Discovery Miles 15 570 Ships in 12 - 17 working days

The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover)
Adam Henschke
R2,921 Discovery Miles 29 210 Ships in 12 - 17 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September... Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26-28, 2018, Proceedings (Paperback, 1st ed. 2018)
Josep Domingo-Ferrer, Francisco Montes
R1,853 Discovery Miles 18 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2018, held in Valencia, Spain, in September 2018 under the sponsorship of the UNESCO Chair in Data Privacy. The 23 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized into the following topics: tabular data protection; synthetic data; microdata and big data masking; record linkage; and spatial and mobility data. Chapter "SwapMob: Swapping Trajectories for Mobility Anonymization" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Intelligent Mobile Malware Detection (Hardcover): Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran Intelligent Mobile Malware Detection (Hardcover)
Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran
R2,144 Discovery Miles 21 440 Ships in 12 - 17 working days

Unique selling point: * This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. * This book will be useful for researchers, students, developers and security analysts to know how malware behavior represented in the form of system call graphs can effectively detect Android malware. * The malware detection mechanisms in this book can be integrated with commercial antivirus softwares to detect Android malware including obfuscated variants.

Digital Transformation: Challenges and Opportunities - 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10,... Digital Transformation: Challenges and Opportunities - 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Wooje Cho, Ming Fan, Michael J. Shaw, Byungjoon Yoo, Han Zhang
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 16th Workshop on e-Business, WeB 2017, which took place in Seoul, South Korea, in December 2017. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2017 theme was "Digital transformation: challenges and opportunities". The 11 papers presented in this volume were carefully reviewed and selected from 43 submissions. These are original research articles with a broad coverage of behavioral issues on consumers, citizens, businesses, industries and governments, ranging from technical to strategic issues.

Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun,... Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
R2,999 Discovery Miles 29 990 Ships in 10 - 15 working days

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun,... Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
R3,430 Discovery Miles 34 300 Ships in 10 - 15 working days

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

Web Services - ICWS 2018 - 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018,... Web Services - ICWS 2018 - 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings (Paperback, 1st ed. 2018)
Hai Jin, Qingyang Wang, Liang-Jie Zhang
R1,538 Discovery Miles 15 380 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections such as Web Services, RESTful web services, Web Services Description Langugage, Universal Description Discovery and Integration, Service discovery and interfaces, Domain-specific security and privacy architectures, Location bases services, Sercurity Services and Markup languages.

Privacy in Context - Technology, Policy, and the Integrity of Social Life (Hardcover): Helen Nissenbaum Privacy in Context - Technology, Policy, and the Integrity of Social Life (Hardcover)
Helen Nissenbaum
R2,249 Discovery Miles 22 490 Ships in 12 - 17 working days

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself--most people understand that this is crucial to social life --but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts--whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

European Data Protection Law - Corporate Compliance and Regulation (Hardcover, 2nd Revised edition): Christopher Kuner European Data Protection Law - Corporate Compliance and Regulation (Hardcover, 2nd Revised edition)
Christopher Kuner
R11,059 R8,695 Discovery Miles 86 950 Save R2,364 (21%) Ships in 12 - 17 working days

The new edition of this acclaimed book gives a fully updated overview of European data protection law affecting companies, incorporating the important legal developments which have taken place since the last edition was published. These include the first three cases of the European Court of Justice interpreting the EU Data Protection Directive (95/46), the Commission's first report on the implementation of the Directive, the Data Retention Directive, new developments in international data transfers, conflicts between security requirements and data protection, and the implementation of the Electronic Communications and Privacy Directive 2002/58 in the Member States. It also covers the recent European Court of Justice decision on the controversial export of airline passenger data to the US, and expands its European overview to include the new and acceding Member States. The book contains comprehensive coverage of data protection law, while at the same time providing pragmatic guidance on the typical compliance issues that companies face. As globalization of the world economy continues, an increasing number of business issues with data protection implications have come to the foreground, for example, outsourcing, whistleblower hotlines and records management, all of which are covered in the book. The appendices have been expanded to include most sources which a company will need, such as the texts of relevant directives, the safe harbor principles and FAQs, and charts of implementation in the Member States of specific provisions of interest to business. Thus, the book is a single reference source for companies faced with data protection issues. A Chinese edition of the book was published in 2008, making it the first in-depth treatise on European data protection law published in Chinese.

Personal Analytics and Privacy. An Individual and Collective Perspective - First International Workshop, PAP 2017, Held in... Personal Analytics and Privacy. An Individual and Collective Perspective - First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Riccardo Guidotti, Anna Monreale, Dino Pedreschi, Serge Abiteboul
R1,945 Discovery Miles 19 450 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Personal Analytics and Privacy, PAP 2017, held in Skopje, Macedonia, in September 2017. The 14 papers presented together with 2 invited talks in this volume were carefully reviewed and selected for inclusion in this book and handle topics such as personal analytics, personal data mining and privacy in the context where real individual data are used for developing a data-driven service, for realizing a social study aimed at understanding nowadays society, and for publication purposes.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Containing Big Tech - How To Protect Our…
Tom Kemp Hardcover R712 R603 Discovery Miles 6 030
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R301 Discovery Miles 3 010
Modern Day Surveillance Ecosystem and…
Ananda Mitra Hardcover R6,229 R5,616 Discovery Miles 56 160
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,127 Discovery Miles 21 270
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,464 Discovery Miles 74 640
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380

 

Partners