Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing.
Handbook on Augmenting Telehealth Services: Using Artificial Intelligence provides knowledge of AI-empowered telehealth systems for efficient healthcare services.
CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world.
This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain.
Cybersecurity and Human Rights in the Age of Cyberveillance isa collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden.
This book is a collection of the best research papers presented at the First World Conference on Internet of Things: Applications & Future (ITAF 2019), Sponsored by GR Foundation and French University in Egypt, held at Triumph Luxury Hotel, Cairo, Egypt, on 14-15 October 2019.
This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.
Ambient assisted living (AAL) utilizes information and communication technology to empower individuals to maintain an active and independent lifestyle for as long as possible.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation.
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts.
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide.
In this book, Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States.
The explosive increase in information and the miniaturization of electronic devices demand new recording technologies and materials that combine high density, fast response, long retention time and rewriting capability.
The Handbook provides an essential resource at the interface of Genomics, Health and Society, and forms a crucial research tool for both new students and established scholars across biomedicine and social sciences.
'A remarkable, authentic and chilling expos of a global conspiracy that reads like a first-rate conspiracy thriller: a book of gripping, compulsive and disturbing impact' William BoydDark Mirror is the ultimate inside account of the vast, global surveillance network that now pervades all our lives.
Das Standard-Datenschutzmodell (SDM) gilt spätestens seit 2020 deutschlandweit als etabliert, um normative Anforderungen der DSGVO in funktionale Anforderungen an die Praxis der Datenverarbeitungen zu transformieren.
This reference text presents the important components for grasping the potential of social computing with an emphasis on concerns, challenges, and benefits of the social platform in depth.
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.