This book explores a society currently being transformed by the influence of advanced information technology, and provides insights into the main technological and human issues and a holistic approach to inclusion, security, safety and, last but not least, privacy and freedom of expression.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focus on location privacy protection methods.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain.
From predictive policing to self-surveillance to private security, the potential uses to of big data in crime control pose serious legal and ethical challenges relating to privacy, discrimination, and the presumption of innocence.
In the age of global climate change, society will require cities that are environmentally self-sufficient, able to withstand various environmental problems and recover quickly.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This volume originated from an international, interdisciplinary research course organized by the Institute of Information Management of the University of Munster in 2021-2022, funded by the DAAD IVAC sponsorship program.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
'Reasonable expectations of privacy' have become a cornerstone concept in privacy and data protection legislation worldwide, extending today from US constitutional law to the GDPR, Article 8 ECHR, and various Asian and African data protection frameworks.
The definitive guide for ensuring data privacy and GDPR compliance Privacy regulation is increasingly rigorous around the world and has become a serious concern for senior management of companies regardless of industry, size, scope, and geographic area.
This study guide offers 100% coverage of every objective for the Certified Data Privacy Solutions Engineer Exam This resource offers complete, up-to-date coverage of all the material included on the current release of the Certified Data Privacy Solutions Engineer exam.
In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge.
Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework.
This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems.
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them.
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise.
With the increase in the development of the advanced cellular communication system, it is assumed that several sectors, such as the health industry, education, transport industry, business model, and so on, will rapidly grow.
The Internet Age has created vast and ubiquitous databases of personal information in universities, corporations, government agencies, and doctors' offices.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications.