0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (210)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Advances in Cryptology - ASIACRYPT '91 - International Conference on the Theory and Application of Cryptology,... Advances in Cryptology - ASIACRYPT '91 - International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings (Paperback, 1993 ed.)
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto
R1,692 Discovery Miles 16 920 Ships in 10 - 15 working days

This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DES-like cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers - foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers - foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session.

Managing with Information Technology (Paperback, Softcover reprint of the original 1st ed. 1993): Richard Ennals, Philip... Managing with Information Technology (Paperback, Softcover reprint of the original 1st ed. 1993)
Richard Ennals, Philip Molyneux
R1,471 Discovery Miles 14 710 Ships in 10 - 15 working days

The language of business and management, and of infor mation technology, is being employed across all sectors of economic and social activity. In recent years computers and information technology (IT) in general have moved from being a scarce resource to being a more generally available commodity, without a corresponding increase in understanding of how the new generation of tools can be used. IT is available on individual desktops, supporting decision making and communication, but often conven tional organizations have failed to adapt, individuals lack competence and confidence, and senior managers lack both the strategic insight to develop appropriate strategies and the humility to accept that they need to learn. As each sector, whether business, education, public sec tor management or the community and voluntary sector, realizes that the potential of IT is not being exploited to the full, calls are issued for the development of new "hybrid managers," a term coined to describe the gap in understanding and competence that is to be filled. The two editors work in the hybrid field of business information technology, which is a melting pot of ideas and experience from numerous traditional disciplines. The pace of change is such that no one individual could ever be abreast of all technical and business develop ments, but the field is now sufficiently mature for us to identify certain underlying issues and principles, and areas of research for the coming years."

Advances in Cryptology - AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast,... Advances in Cryptology - AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings (Paperback, 1993 ed.)
Jennifer Seberry, Yuliang Zheng
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.

Advances in Cryptology - CRYPTO '90 - Proceedings (Paperback, 1991 ed.): Alfred John Menezes, Scott A. Vanstone Advances in Cryptology - CRYPTO '90 - Proceedings (Paperback, 1991 ed.)
Alfred John Menezes, Scott A. Vanstone
R1,777 Discovery Miles 17 770 Ships in 10 - 15 working days

Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.

The Stability Theory of Stream Ciphers (Paperback, 1991 ed.): Cunsheng Ding, Guozhen Xiao, Weijuan Shan The Stability Theory of Stream Ciphers (Paperback, 1991 ed.)
Cunsheng Ding, Guozhen Xiao, Weijuan Shan
R1,508 Discovery Miles 15 080 Ships in 10 - 15 working days

Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.

Modern Socio-Technical Perspectives on Privacy (Paperback, 1st ed. 2022): Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski,... Modern Socio-Technical Perspectives on Privacy (Paperback, 1st ed. 2022)
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, …
R1,003 Discovery Miles 10 030 Ships in 9 - 15 working days

This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.

The Data Protection Officer - Profession, Rules, and Role (Hardcover): Paul Lambert The Data Protection Officer - Profession, Rules, and Role (Hardcover)
Paul Lambert
R3,476 Discovery Miles 34 760 Ships in 12 - 17 working days

The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.

Local Area Network Security - Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April... Local Area Network Security - Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3-6, 1989. Proceedings (Paperback, 1989 ed.)
Thomas A. Berson, Thomas Beth
R1,126 Discovery Miles 11 260 Ships in 10 - 15 working days
Internet of Things Security - Challenges, Advances, and Analytics (Hardcover): Chintan Patel, Nishant Doshi Internet of Things Security - Challenges, Advances, and Analytics (Hardcover)
Chintan Patel, Nishant Doshi
R4,311 Discovery Miles 43 110 Ships in 12 - 17 working days

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.

Advances in Cryptology - EUROCRYPT '87 - Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam,... Advances in Cryptology - EUROCRYPT '87 - Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings (Paperback, 1988 ed.)
David Chaum, Wyn L. Price
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

It is our pleasure to thank dl those uho contributed to nial\ing thew proceeding\ possible: the authors. progriimme committee. organihing committee, I4C.K otticfrh and directors, and all the attendees. We were all deeplq saddened nhen ne lemied th,it Tore Ilerle~tam. J member 01 the programme committee, had died unexpsctedl\ Thi\ olunie I\ dedicated to liim Amsterdum, the Netherlirnds London, Englund Junuur,, 1988 __~ ...~~~. ~ ~ ~ I. Advances in C'r>ptolog?: .A Report on C'RY t'TO Si. Allen Cirr\lio. k.d. L 04. Department of P.lectrica1 and ('omputcr Engineering, S'iiita Harhara 2. C'ryptography: Proceeding\. Burg keusrwiii lYX2 (I.ecturr biotr5 in C'omptitcr Scicncr: 149). I li- mas Beth, Ed. Springer-Verlag. 1983. 3. Advanccs in C'rytology: Proceedings cif C'KY'PTO S2, I),]\ id ('hauin. Ronald L KiLcsi. and Al~n I Sherman. Eds. Plenum NY. 1YX3. 4. Advances in C'ryptology: Proceeding5 of C'K)'f)l.O S3. D;i\id ('hiiuni, kd. I'Icnuiii XY. IY84. IV ~~~ ~ ~~~_.______ 5 4dbances in Crqptolog>: Proceeding, of C'RYP'TO X4 (Lecture Notes in Computer Science: 196). G.R. Blakley and Ua\ id ('haurn. Eda. Springer-Verlag, 19x5. 6. .Advances in CTptology: Proceeding\ of C'RYPTO X5 (Lecture Notes in C'oiiiputer Sc~encc: 2 IX). tlugh C. Williams. Ed. Springer-Vrrl:ig. 1986. 7. Advances in Cqptologq : Proceedings of C'RYP10 80 (Lecture h'cite\ in C'ornputer Scwncc: 263). A.hl Odlyzko. td. Springer-Verlag. 1987. 8. No proceedings were published for ECROCRYP7 X3. which w:i\ held in Udiiie Ital?.

Audacity to Spy - How Government, Business & Hackers Rob Us of Privacy (Paperback): Catherine Nolan, Ashley M Wilson Audacity to Spy - How Government, Business & Hackers Rob Us of Privacy (Paperback)
Catherine Nolan, Ashley M Wilson
R507 R429 Discovery Miles 4 290 Save R78 (15%) Ships in 10 - 15 working days
Advances in Cryptology - EUROCRYPT '85 - Proceedings of a Workshop on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '85 - Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques. Linz, Austria, April 9-11, 1985 (Paperback, 1986 ed.)
Franz Pichler
R1,441 Discovery Miles 14 410 Ships in 10 - 15 working days

The storage, routing and transmission of information, either in the form of digital data or of analog signals, plays a central role in modern society. To ensure that such information is protected from access by unauthorized persons is an important new challenge. The development of the theory and practical techniques needed to meet this challenge is the goal of current cryptological research. This research is highly varied and multidisciplinary. It is concerned with fundamental problems in mathematics and theoretical computer science as well as with the engineering aspects of complex information systems. Cryptology today ranks among the most active and interesting areas of research in both science and engineering. EUROCRYPT '85 maintained the tradition of the three previous workshops in this series (Paris 1984, Udine 1983, Burg Feuerstein 1982) with its emphasis on recent developments in cryptology, but also made a concerted effort to encompass more traditional topics in cryptology such as shift register theory and system theory. The many papers on these topics in this volume are witness to the success of this effort.

Secure, Resilient, and Agile Software Development (Hardcover): Mark Merkow Secure, Resilient, and Agile Software Development (Hardcover)
Mark Merkow
R2,031 Discovery Miles 20 310 Ships in 12 - 17 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

WHOIS Running the Internet - Protocol, Policy, and Privacy (Hardcover): GO Bruen WHOIS Running the Internet - Protocol, Policy, and Privacy (Hardcover)
GO Bruen
R2,391 Discovery Miles 23 910 Ships in 12 - 17 working days

Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website. * Includes an appendix with information on current and authoritative WHOIS services around the world * Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with instructions for navigating them * Explains network dependencies and processes related to WHOIS utilizing flowcharts * Contains advanced coding for programmers * Visit the book's companion website http://whois.knujon.com for technical and policy documents concerning WHOIS, WHOIS code examples, internet locations for WHOIS databases and more. WHOIS Running the Internet: Protocol, Policy, and Privacy is written primarily for internet developers, policy developers, industry professionals in law enforcement, digital forensic investigators, and intellectual property attorneys. Garth O. Bruen is an Internet policy and security researcher whose work has been published in the Wall Street Journal and the Washington Post. Since 2012 Garth Bruen has served as the North American At-Large Chair to the Internet Corporation of Assigned Names and Numbers (ICANN). In 2003 Bruen created KnujOn.com with his late father, Dr. Robert Bruen, to process and investigate Internet abuse complaints (SPAM) from consumers. Bruen has trained and advised law enforcement at the federal and local levels on malicious use of the Domain Name System in the way it relates to the WHOIS record system. He has presented multiple times to the High Technology Crime Investigation Association (HTCIA) as well as other cybercrime venues including the Anti-Phishing Working Group (APWG) and the National Center for Justice and the Rule of Law at The University of Mississippi School of Law. Bruen also teaches the Fisher College Criminal Justice School in Boston where he develops new approaches to digital crime.

Digital Fluency - Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their... Digital Fluency - Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their Applications for Digital Transformation (Paperback, 1st ed.)
Volker Lang
R1,300 R1,038 Discovery Miles 10 380 Save R262 (20%) Ships in 10 - 15 working days

If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide. The real-world applications of these cutting-edge technologies are expanding rapidly, and your daily life will continue to be affected by each of them. There is no better time than now to get started and become digitally fluent. You need not have previous knowledge of these versatile technologies, as author Volker Lang will expertly guide you through this digital age. He illustrates key concepts and applications in numerous practical examples and more than 48 catchy figures throughout Digital Fluency. The end of each chapter presents you with a helpful implementation checklist of central lessons before proceeding to the next. This book gets to the heart of digital buzzwords and concepts, and tells you what they truly mean. Breaking down topics such as automated driving and intelligent robotics powered by artificial intelligence, blockchain-based cryptocurrencies and smart contracts, drug development and optimization of financial investment portfolios by quantum computing, and more is imperative to being ready for what the future of industry holds. Whether your own digital transformation journey takes place within your private or public organization, your studies, or your individual household, Digital Fluency maps out a concrete digital action plan for all of your technology and innovation strategy needs. What You Will Learn Gain guidance in the digital age without requiring any previous knowledge about digital technologies and digital transformation Get acquainted with the most popular current and prospective applications of artificial intelligence, blockchain technology, and quantum computing across a wide range of industries including healthcare, financial services, and the automobile industry Become familiar with the digital innovation models of Amazon, Google, Microsoft, IBM, and other world-leading organizations Implement your own digital transformation successfully along the eight core dimensions of a concrete digital action plan Who This Book Is ForThought-leaders, business executives and industry strategists, management and strategy consultants, politicians and policy makers, entrepreneurs, financial analysts, investors and venture capitalists, students and research scientists, as well as general readers, who want to become digitally fluent.

DarkMarket - How Hackers Became the New Mafia (Paperback): Misha Glenny DarkMarket - How Hackers Became the New Mafia (Paperback)
Misha Glenny 1
R391 R319 Discovery Miles 3 190 Save R72 (18%) Ships in 9 - 15 working days

We live our lives online - banking, shopping, working, dating - but have we become complacent? Who's got your money? We share our personal details, our thoughts and movements with a faceless screen, with no real idea what lies behind it. Who's got your identity? DarkMarket exposes the shocking truth about what lurks behind our computers: an underground crime network that invades our privacy and threatens our security on a daily basis. Who's got your life? Glenny tracks down the key players - including criminals, national and international security experts, police, crack addicts, the Saudi Royal Family, and most importantly, victims - to reveal the true scale of this new global threat. Shortlisted for the Orwell Prize 2012

Web Privacy with P3P (Paperback, 1st ed): Lorrie Faith Cranor Web Privacy with P3P (Paperback, 1st ed)
Lorrie Faith Cranor
R944 R735 Discovery Miles 7 350 Save R209 (22%) Out of stock

Web Privacy with P3P explains the P3P protocol and shows web site developers how to configure their sites for P3P compliance. Full of examples and case studies, the book delivers practical advice and insider tips. Software developers, privacy consultants, corporate decision-makers, lawyers, public policy-makers, and any individual interested in online privacy issues will find this book a necessary reference.

Data in Society - Challenging Statistics in an Age of Globalisation (Paperback): Jim Ridgway, Ron Johnston, Liliana Bounegru,... Data in Society - Challenging Statistics in an Age of Globalisation (Paperback)
Jim Ridgway, Ron Johnston, Liliana Bounegru, Jonathan Gray, Amy Sippitt, …
R876 Discovery Miles 8 760 Ships in 12 - 17 working days

Statistical data and evidence-based claims are increasingly central to our everyday lives. Critically examining 'Big Data', this book charts the recent explosion in sources of data, including those precipitated by global developments and technological change. It sets out changes and controversies related to data harvesting and construction, dissemination and data analytics by a range of private, governmental and social organisations in multiple settings. Analysing the power of data to shape political debate, the presentation of ideas to us by the media, and issues surrounding data ownership and access, the authors suggest how data can be used to uncover injustices and to advance social progress.

How to Destroy Surveillance Capitalism (Paperback): Cory Doctorow How to Destroy Surveillance Capitalism (Paperback)
Cory Doctorow
R316 R264 Discovery Miles 2 640 Save R52 (16%) Ships in 10 - 15 working days
Modern Psychometrics - The Science of Psychological Assessment (Hardcover, 4th edition): John Rust, Michal Kosinski, David... Modern Psychometrics - The Science of Psychological Assessment (Hardcover, 4th edition)
John Rust, Michal Kosinski, David Stillwell
R3,882 Discovery Miles 38 820 Ships in 12 - 17 working days

This popular text introduces the reader to all aspects of psychometric assessment, including its history, the construction and administration of traditional tests, and the latest techniques for psychometric assessment online. Rust, Kosinski, and Stillwell begin with a comprehensive introduction to the increased sophistication in psychometric methods and regulation that took place during the 20th century, including the many benefits to governments, businesses, and customers. In this new edition, the authors explore the increasing influence of the internet, wherein everything we do on the internet is available for psychometric analysis, often by AI systems operating at scale and in real time. The intended and unintended consequences of this paradigm shift are examined in detail, and key controversies, such as privacy and the psychographic microtargeting of online messages, are addressed. Furthermore, this new edition includes brand-new chapters on item response theory, computer adaptive testing, and the psychometric analysis of the digital traces we all leave online. Modern Psychometrics combines an up-to-date scientific approach with full consideration of the political and ethical issues involved in the implementation of psychometric testing in today's society. It will be invaluable to both undergraduate and postgraduate students, as well as practitioners who are seeking an introduction to modern psychometric methods.

Modern Psychometrics - The Science of Psychological Assessment (Paperback, 4th edition): John Rust, Michal Kosinski, David... Modern Psychometrics - The Science of Psychological Assessment (Paperback, 4th edition)
John Rust, Michal Kosinski, David Stillwell
R1,318 Discovery Miles 13 180 Ships in 12 - 17 working days

This popular text introduces the reader to all aspects of psychometric assessment, including its history, the construction and administration of traditional tests, and the latest techniques for psychometric assessment online. Rust, Kosinski, and Stillwell begin with a comprehensive introduction to the increased sophistication in psychometric methods and regulation that took place during the 20th century, including the many benefits to governments, businesses, and customers. In this new edition, the authors explore the increasing influence of the internet, wherein everything we do on the internet is available for psychometric analysis, often by AI systems operating at scale and in real time. The intended and unintended consequences of this paradigm shift are examined in detail, and key controversies, such as privacy and the psychographic microtargeting of online messages, are addressed. Furthermore, this new edition includes brand-new chapters on item response theory, computer adaptive testing, and the psychometric analysis of the digital traces we all leave online. Modern Psychometrics combines an up-to-date scientific approach with full consideration of the political and ethical issues involved in the implementation of psychometric testing in today's society. It will be invaluable to both undergraduate and postgraduate students, as well as practitioners who are seeking an introduction to modern psychometric methods.

Data in Society - Challenging Statistics in an Age of Globalisation (Hardcover): Jim Ridgway, Ron Johnston, Liliana Bounegru,... Data in Society - Challenging Statistics in an Age of Globalisation (Hardcover)
Jim Ridgway, Ron Johnston, Liliana Bounegru, Jonathan Gray, Amy Sippitt, …
R2,417 Discovery Miles 24 170 Ships in 12 - 17 working days

Statistical data and evidence-based claims are increasingly central to our everyday lives. Critically examining 'Big Data', this book charts the recent explosion in sources of data, including those precipitated by global developments and technological change. It sets out changes and controversies related to data harvesting and construction, dissemination and data analytics by a range of private, governmental and social organisations in multiple settings. Analysing the power of data to shape political debate, the presentation of ideas to us by the media, and issues surrounding data ownership and access, the authors suggest how data can be used to uncover injustices and to advance social progress.

Judiciary-Friendly Forensics of Software Copyright Infringement (Hardcover): Vinod Polpaya Bhattathiripad Judiciary-Friendly Forensics of Software Copyright Infringement (Hardcover)
Vinod Polpaya Bhattathiripad
R5,109 Discovery Miles 51 090 Ships in 12 - 17 working days

The software industry continues to expand as new products enter into the technological marketplace in order to meet increasing demand. As a result of the popularity of often-expensive software products, companies face the growing challenge of protecting their products against copyright infringement. Judiciary-Friendly Forensics of Software Copyright Infringement discusses the forensics of software copyright infringement. This book highlights theoretical, functional, and procedural matters in the investigation of copyright infringement of software products, as well as the development of forensic technologies to detect and eliminate software piracy. As this publication will explore comprehensive topics on the forensic process of software piracy, it is an essential resource for software forensic experts, lawyers in the field of copyright infringement, judges, software professionals, software developers, and students.

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2,... Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers (Hardcover, 1st ed. 2019)
Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hubner, Stephan Krenn
R2,020 R724 Discovery Miles 7 240 Save R1,296 (64%) Ships in 9 - 15 working days

This book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological.

Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases (Paperback, 1st ed. 2022):... Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases (Paperback, 1st ed. 2022)
Youyang Qu, Longxiang Gao, Shui Yu, Yong Xiang
R1,377 Discovery Miles 13 770 Ships in 12 - 17 working days

This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
Containing Big Tech - How To Protect Our…
Tom Kemp Hardcover R712 R603 Discovery Miles 6 030
Permanent Record
Edward Snowden Paperback  (1)
R368 Discovery Miles 3 680
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,127 Discovery Miles 21 270
Information And Communications…
Dana van der Merwe Paperback R1,257 R1,116 Discovery Miles 11 160
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R301 Discovery Miles 3 010
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,732 Discovery Miles 27 320

 

Partners