The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet the requirements of privacy laws.
Artificial Intelligence (AI) innovations in digital health offer unprecedented opportunities to facilitate human health and provide tools and techniques that reduce overall costs.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.
In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation.
An ideal primer for anyone implementing a PIMS based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001.
'A remarkable, authentic and chilling expos of a global conspiracy that reads like a first-rate conspiracy thriller: a book of gripping, compulsive and disturbing impact' William BoydDark Mirror is the ultimate inside account of the vast, global surveillance network that now pervades all our lives.
As we go about our day-to-day lives, digital information about who we are is gathered from all angles via biometric scans, passport applications, and, of course, social media.
El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy.
Das User Interface, auf dem Benutzeraktionen und -eingaben, beispielsweise zur Authentifizierung auf einer Webseite, getätigt werden, ist ein beliebtes Ziel für Cyberkriminelle, um Zugangsdaten zu erlangen.
En este documento exploramos cuál ha sido la respuesta de la ley y la jurisprudencia colombianas frente a las tensiones entre la intimidad y la publicidad de los datos.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
On 5 June 2013, the Guardian began publishing a series of documents leaked by NSA contractor Edward Snowden, revealing the extent of internet surveillance undertaken by government and intelligence agencies.
In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation.