As a practicing child psychiatrist and mother of three, Jodi Gold has a unique understanding of both the mind-boggling benefits and the serious downsides of technology.
Dieses Beitragswerk bringt Vorreiter, öffentliche Meinungsbildner und renommierte Fachexperten zu Fragestellungen des digitalen Wandels zusammen und bündelt deren Blickwinkel auf dieses entscheidende Zukunftsthema.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.
Imagine a set of simple principles that could help you to understand how parts combine to become a whole, and how each part sees the whole from its own perspective.
An entertaining, scientifically rigorous exploration of the social and biological effects of our wireless world The way we use i-technology is affecting our health and happiness.
The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security.
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009),which took place in Saint-Malo,France, during September 23-25.
Fostering Women's Engagement in STEM Through Education: A Cross-Cultural Academic-Industry Journey uniquely intertwines academic rigour with real-world impact, offering a comprehensive exploration of science, technology, engineering, and mathematics (STEM) experiences forged through the Partnership for Innovation in Employability (PIE) programme.
In this book, we have set up a unified analytical framework for various human-robot systems, which involve peer-peer interactions (either space-sharing or time-sharing) or hierarchical interactions.
This book provides in-depth information about the technical, legal, and policy issues that are raised when humans and artificially intelligent machines are enhanced by technology.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Sensor Systems and Software, S-Cube 2010, held in Miami, Florida, USA, in December 2010.
In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können.
Patricia Lotz behandelt Rechtsfragen zum Einsatz moderner Marketingformen und gibt einen ersten Überblick über die Fallstricke, die sich dem E-Commerce in Zukunft vor allem im Bereich des Datenschutzes stellen werden.
Als IT-Experte bei stern TV erhält Tobias Schrödel immer wieder Hilferufe von Menschen, ob er Zugang zu Daten auf Handys oder sonstigen elektronischen Geräten verschaffen kann - auch zu digitalen Inhalten von Toten.
In June 2011, Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt, arrived from America at Ellingham Hall, the country residence in Norfolk, England where Assange was living under house arrest.
Patricia Lotz behandelt Rechtsfragen zum Einsatz moderner Marketingformen und gibt einen ersten Überblick über die Fallstricke, die sich dem E-Commerce in Zukunft vor allem im Bereich des Datenschutzes stellen werden.
In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können.
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power.