Legal aspects Books

164 products


  • Advanced Introduction to Law and Artificial

    Edward Elgar Publishing Ltd Advanced Introduction to Law and Artificial

    15 in stock

    Book SynopsisElgar Advanced Introductions are stimulating and thoughtful introductions to major fields in the social sciences and law, expertly written by the world's leading scholars. Designed to be accessible yet rigorous, they offer concise and lucid surveys of the substantive and policy issues associated with discrete subject areas. Woodrow Barfield and Ugo Pagallo present a succinct introduction to the legal issues related to the design and use of artificial intelligence (AI). Exploring human rights, constitutional law, data protection, criminal law, tort law, and intellectual property law, they consider the laws of a number of jurisdictions including the US, the European Union, Japan, and China, making reference to case law and statutes. Key features include: a critical insight into human rights and constitutional law issues which may be affected by the use of AI discussion of the concept of legal personhood and how the law might respond as AI evolves in intelligence an introduction to current laws and statutes which apply to AI and an identification of the areas where future challenges to the law may arise. This Advanced Introduction is ideal for law and social science students with an interest in how the law applies to AI. It also provides a useful entry point for legal practitioners seeking an understanding of this emerging field.Trade Review‘Barfield and Pagallo’s book offers a great overview on the most discussed and practically relevant legal discussions about AI. The authors portray the currently applicable laws and the relevant decisions comprehensibly for law students and non-lawyers. The references throughout the book as well as a list of additional topics will assist readers who would like to expand their knowledge. They present an overview and offer law students several carefully chosen gateways through which readers may explore the vast and steadily growing literature in the field. If you are looking for a concise book on the manifold issues of artificial intelligence and law, Barfield and Pagallo’s Advanced Introduction to Law and Artificial Intelligence is a great starting point.’ -- Carolin Kemper, Prometheus‘Edward Elgar has hit the nail on the head by choosing this particular topic to publish in its Edward Elgar Advanced Introduction Series. It is a much need book at this time when the hype about Artificial Intelligence (AI) is at a crescendo level.’ -- Sally Ramage, Criminal Lawyer‘This book provides an authoritative introduction into the specific legal topics covered, and a springboard into further research, and will prove a useful resource for its intended audience.’ -- Stephanie Falconer, Law in Context'A much needed comprehensive and up-to-date introduction to the law of AI, a must read for all ICT lawyers!' --Giovanni Sartor, University of Bologna and European University Institute, ItalyTable of ContentsContents: Introduction to Law and Artificial Intelligence 1. Definitions, Actors, Concepts 2. Human Rights Considerations 3. Constitutional Law Issues 4. Legal Personality and Artificial Intelligence 5. Issues of Data Protection 6. Tort Law Approaches 7. Criminal Law 8. Copyright Law 9. Patent Law 10. Business Law, Antitrust, and Trade Secrets 11. Looking Ahead: Towards a Law of Artificial Intelligence Index

    15 in stock

    £18.95

  • CRC Press Cyber Security Using Modern Technologies

    1 in stock

    Book Synopsis

    1 in stock

    £42.74

  • CRC Press Software Security

    1 in stock

    Book SynopsisSoftware Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. Itâs not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

    1 in stock

    £42.74

  • Cyber War Versus Cyber Realities

    Oxford University Press Inc Cyber War Versus Cyber Realities

    15 in stock

    Book SynopsisIn 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based?Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict.As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term efTrade Review"Valeriano and Maness have done real service to the field by taking cyber hyperbole down a notch and highlighting the need for better theory about and empirical evaluation of cyber conflict, even if they will not have the last word on the topic." --Jon R. Lindsay, Assistant Professor of Digital Media and Global Affairs, University of Toronto Munk School of Global Affairs "Path-breaking...the first [book] to provide both theory and empirical evidence to bear on the subject. In doing so it is likely to direct all serious research on the subject in the immediate and medium term." --Paul F. Diehl, Associate Provost and Ashbel Smith Professor of Political Science, University of Texas-Dallas "Why haven't more cyber wars occurred? Valeriano and Maness present theory and evidence to show why states exercise cyber restraint. Their book is a healthy corrective to the usual hype." --Joseph S. Nye, Jr., Harvard University and author of The Future of Power "An important contribution to international relations theory and analysis. A path-breaking empirical work." --Nazli Choucri, Professor of Political Science, Massachusetts Institute of Technology "Most books that touch on theories of cyber power are stuck in either the mire of technical realities or zoom in the other direction, into the stratosphere of 'battles' over cognition and perception. Neither is very relevant for understanding actual conflict between nations. With Cyber War versus Cyber Realities, Valeriano and Maness have a rare gem, a book rooted in a deep analysis of the true realities of cyber conflict from which they draw both lessons and theories with real relevance in national capitals." --Jay Healey, Director of the Cyber Statecraft Initiative, The Atlantic Council "Valeriano and Maness have provided scholars with an impressive starting point that contributes towards greater understanding of the cyber security threat landscape as well as the prospect of a less threatening cyber future." --Francis C. Domingo, De La Salle University and the University of Nottingham, Journal of Information and Technology "Cyber War Versus Cyber Realities is a groundbreaking empirical work and a necessary read for scholars focusing on cyber conflict and people generally interested in international relations." -- Journal of Information Technology & Politics "Overall...the book is an essential contribution to the cyber security literature, and one that substantially advances the debate about the impact of cyber war as a term of reference and an empirical reality." --Joe Burton, H-Net Reviews "Overall, this book provides a new perspective on cyber conflict, countering the media hype of impending Cyber Pearl Harbors or Cyber 9/11s. Further, it offers one of the first viable attempts to quantify the impact of cyber actions, and presents facts and evidence to support their theories. As such, [the authors] build a strong case for cyber policy based on moderation versus worst-case scenarios." -- Small Wars & Insurgencies "Valeriano and Maness view cyber conflict through the lens of international relations and primarily focus on cyber interactions among states and directed towards states in the realm of foreign policy." --Small Wars & InsurgenciesTable of ContentsPreface ; Acknowledgements ; Chapter 1: The Contours of the Cyber Conflict World ; Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations ; Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era ; Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists ; Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus ; Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations ; Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear ; Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations ; Chapter 9: Conclusion ; Tables and Figures

    15 in stock

    £36.44

  • University of Chicago Press The Electronic Word

    10 in stock

    Book SynopsisSurveys the effects of electronic text on the arts and letters and how they might be taught in a newly democratized society. To those who view electronic text as a cultural catastrophe, Lanham counters that "electronic expression has come not to destroy the Western arts but to fulfil them."Table of ContentsPreface Acknowledgments 1: The Electronic Word: Literary Study and the Digital Revolution 2: Digital Rhetoric and the Digital Arts 3: Twenty Years After: Digital Decorum and Bi-stable Allusions 4: The Extraordinary Convergence: Democracy, Technology, Theory, and the University Curriculum 5: Electronic Textbooks and University Structures 6: Strange Lands, Strange Languages, and Useful Miracles 7: The "Q" Question 8: Elegies for the Book 9: Operating Systems, Attention Structures, and the Edge of Chaos 10: Conversation with a Curmudgeon Index

    10 in stock

    £21.42

  • How Computer Games Help Children Learn

    Palgrave MacMillan Us How Computer Games Help Children Learn

    1 in stock

    Book SynopsisHow Computer Games Help Children Learn shows how video and computer games can help teach children to build successful futures - but only if we think in new ways about education itself.Trade Review"Shaffer offers practical advice to assist parents and educators to respond to his call to radically transform an increasingly outdated educational system..." Barry Joseph, Online Leadership Director, Global Kids "This totally enchanting book shows what education in the 21st century couldlook likeif we are willing to expand our notions of learning in ways that foster productive inquiry and design An extremely readable book that should be on the bookshelf of anyone who cares about having schools that help young people prepare to compete in the global economy." John Seely Brown, Former Chief Scientist of Xerox Corporation and Director of its Palo Alto Research Center (PARC), Senior Fellow, Annenberg Center, USC, and co-author, The Social Life of Information and The Only Sustainable Edge "Beautifully written...How Computer Games Help Children Learn breaks new ground in exciting ways. What a treat! A book about the development of innovative thinking that is refreshingly innovative...A tour de force." Deborah Lowe Vandell, Chair, Department of Education, University of California, Irvine "You may have asked yourself if computer games are destroying the minds of our nation's children. How Computer Games Help Children Learn shows that the exact opposite is true. Parents, educators, and computer game makers take note: by combining years of research and his front-line classroom experiences, Shaffer makes a cogent and compelling argument for the educational power of intelligently crafted games that can serve as tools to help children think and learn about real world problems and their solutions." Michael McCormick, Senior Designer, Backbone Entertainment, and Lead Designer of SimCity 4 "Shaffer's book moves from vivid case studies and accessible accounts of key ideas from the learning sciences to practical advice on how parents can help theirchildren learn more from the games they play. This book represents the logical next step in a conversation started by James Paul Gee's What Video GamesHave toTeach Us about Learning and Literacy and Steven Johnson's Everything Bad Is Good For You." Henry Jenkins, Director, Comparative Media Studies Program, MIT "This well-written and important book will introduce parents and teachers to a radical idea: video games can be good for children. When children play games like Sim City or The Oregon Trail, they learn about urban planning or the American West in spite of themselves. But these games are just the tip of the iceberg; Shaffer describes a wide range of fascinating new learning games that are just now emerging...Because these games give children the chance to creatively manipulate a virtual world, they can teach creativity and innovation, abilities that are more important than ever in today's competitive global economy Shaffer advises parents how to pick out a good learning game, how to play it with your children, and how to make sure they are learning from it." R. Keith Sawyer, author of Group Genius: The Creative Power of Collaboration "Shaffer's book points out forcefully a paradigm of future schooling: to better prepare our kids for a globally competitive world, we have to bring the thinking, practices, and cultures of various professions into school learning. With convincing examples of simulated professional games that can integrate learning, working, and playing, he proves that this is feasible." Tak-Wai Chan, National Central University, Taiwan 'This groundbreaking book raises fundamental issues concerning the goals of education and highlights the need for innovative thinkers in the 21st century. Written in a clear, lucid, and direct manner, Shaffer makes his ideas easily accessible to professional as well as lay readers. The book will benefit educators, school administrators, policy makers, and, most importantly, parents.' Yam San Chee, Associate Professor, Learning Sciences & Technologies Academic Group & Learning Sciences Lab, National Institute of Education, Nanyang Technological University "Deep learning, technical learning, learning that leads to the ability to innovate: these are the most important natural resources in our global high-tech world. Will our children be able to compete with kids in China and India? Shaffer shows us how to mine the potential of video game technologies to transform learning at home, in communities, and in schools." James Paul Gee, University of Wisconsin-Madison, author of What Video Games Have to Teach Us about Learning and Literacy "Like Dewey, Piaget, and Papert before him, Shaffer challenges us to rethink learning in a new age. He uses vivid examples - backed by solid research - to show what education should look like in the 21st century." - Kurt D. Squire, Assistant Professor of Education, University ofWisconsin-Madison,and Game Designer"A must read for anyone who cares about learning. Game designers depend on having millions of people voluntarily learn more than anyone would dare put into a school curriculum. So studying games - how they are designed and how they are played - is one of the best sources of insight about learning, and Shaffer is an excellent guide to making the most of it." - Seymour Papert, Professor Emeritus, Media and Education Technology, MIT Media LabTable of ContentsForeword: Seeing the Future; J.P.Gee Introduction Epistemology: The Debating Game Knowledge: The Digital Zoo Skills: Escher's World Values: The Pandora Project Identity: Science.net Beyond the Industrial School: The Future of Education and How We Get There

    1 in stock

    £47.49

  • Human Rights in the Age of Platforms Information

    MIT Press Ltd Human Rights in the Age of Platforms Information

    2 in stock

    Book SynopsisScholars from across law and internet and media studies examine the human rights implications of today's platform society.Today such companies as Apple, Facebook, Google, Microsoft, and Twitter play an increasingly important role in how users form and express opinions, encounter information, debate, disagree, mobilize, and maintain their privacy. What are the human rights implications of an online domain managed by privately owned platforms? According to the Guiding Principles on Business and Human Rights, adopted by the UN Human Right Council in 2011, businesses have a responsibility to respect human rights and to carry out human rights due diligence. But this goal is dependent on the willingness of states to encode such norms into business regulations and of companies to comply. In this volume, contributors from across law and internet and media studies examine the state of human rights in today's platform society.The contributors consider the “dataficationR

    2 in stock

    £25.65

  • Professional Security Management

    Taylor & Francis Professional Security Management

    1 in stock

    Book SynopsisHistorically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the ''need to know''. The reader will benefit from an understandingTable of Contents1 Private security and the development of the Security Manager2 Security risk management and strategic business awareness3 Critical Security Areas 3.1 Security Risk Management 3.2 Crime Prevention through Environmental Design and Situational Crime Prevention 3.3 Physical and Electronic Security Systems3.4 The Security Survey and Security Audit3.5 Business Resilience Risk Management Crisis Management Disaster Management Business Continuity Management 3.6 The Chief Security Officer (CSO) and the Chief Information Security Officer(CISO)3.7 Cyber Crime3.8 Critical National Infrastructure3.9 Terrorism and Counter Terrorism3.10 Aviation and Maritime Security Management3.11 Supply Chain Security Management3.12 Hostile Environment Awareness3.13 Strategic Business Awareness3.14 Fraud Investigations3.15 Retail Loss Prevention3.16 Workplace Investigations3.17 Academic and vocational qualifications3.18 ConclusionBibliographyIndex

    1 in stock

    £47.49

  • Understanding Users

    Taylor & Francis Ltd Understanding Users

    1 in stock

    Book SynopsisGrounded in the user-centered design movement, this book offers a broad consideration of how our civilization has evolved its technical infrastructure for human purpose to help us make sense of our contemporary information infrastructure and online existence. The author incorporates historical, cultural, and aesthetic approaches to situating information and its underlying technologies across time in the collective, lived experiences of humanity.In today's digital environment, user experience is vital to the success of any product or service. Yet as the user population expands to include us all, designing for people who vary in skills, abilities, preferences, and backgrounds is challenging. This book provides an integrated understanding of users, and the methods that have evolved to identify usability challenges, that can facilitate cohesive and earlier solutions. The book treats information creation and use as a core human behavior based on acts of representation and recordinTable of Contents1. Information as a Human Process, 2. The Emergence of User-Centeredness, 3. Designing Our Information World: Craft or Science?, 4. Humans and the Vertical Slice, 5. The Physio-Tech Layer, 6. The Cogito-Tech Layer, 7. The Socio-Tech Layer, 8. The Culturo-Tech Layer, 9. Usability as a Design Value, 10. Acceptability as a Design Value, 11. Augmentation as the REAL Value

    1 in stock

    £29.99

  • CISO COMPASS

    CRC Press CISO COMPASS

    1 in stock

    Book Synopsis#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021, 2022, 2023, and 2024!2020 Cybersecurity CANON Hall of Fame WinnerTodd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program.CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the Table of ContentsSection 1: THE CISO ROAD MAP 1. CISO Role: Evolution or Revolution? 2. Cybersecurity Leadership and the McKinsey 7-S Framework Section 2: STRATEGY 3. Developing Strategy 4. Emerging Technologies and Trends Section 3: STRUCTURE 5. Cybersecurity Organization Structure 6. CISO Reporting Models Section 4: SYSTEMS 7. Leveraging the Incidents of Others 8. The Security Control Framework Maze 9. Risk Management Practices Section 5: SHARED VALUES 10. It’s the Law 11. Data Protection and Privacy Every CISO Must Know 12. Meaningful Policies and Procedures Section 6: STAFF 13. Multigenerational Workforce Team Dynamics Section 7: SKILLS 14. CISO Soft Skills Section 8: STYLE 15. The CISO and the Board of Directors

    1 in stock

    £42.74

  • Law 3.0

    Taylor & Francis Law 3.0

    2 in stock

    Book SynopsisPutting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape.Technology not only disrupts the traditional idea of what it is âto think like a lawyer,â as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules â thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in sTable of Contents1. Introduction to Law 3.0 2. BookWorld: A Short Story about Disruption Part One: The Technological Disruption of Law 3. Law 1.0: Easy Cases, Difficult Cases, and Hard Cases 4. Law 1.0 Disrupted 5. Law 2.0 and Technology as a Problem 6. Law 2.0 and the ‘Crazy Wall’ 7. Law 2.0 Disrupted: Technology as a Solution 8. Law 3.0: Coherentist, Regulatory-Instrumentalist, and Technocratic Conversations 9. Tech Test Case I: Liability for Robot Supervisors 10. Tech Test Case II: Smart Shops, Code Law, and Contract Law 11. Easterbrook and the Law of the Horse Part Two: Law Reimagined 12. Law as One Element in the Regulatory Environment 13. Mapping the Regulatory Environment 14. The Complexion of the Regulatory Environment 15. Law 3.0 and Liberty: The Pianos at St Pancras 16. Law 3.0: The Thin End of the Wedge, and the Thick End Part Three: Living with Law 3.0 17. The Benchmarks of Legitimacy: The Range of Regulatory Responsibilities 18. Uncertainty, Precaution, Stewardship 19. Re-inventing the Rule of Law 20. Technology and the Triple Licence 21. High Tech Policing and Crime Control 22. The Renewal of Coherentism 23. Redesigning the Institutional Framework I: National Institutions 24. Redesigning the Institutional Framework II: International Institutions Part Four: Learning the Law 25. Rethinking Legal Education 26. Any Questions? 27. Concluding Remarks: Looking Back, Looking Forward

    2 in stock

    £19.99

  • Smartphones Current Events and Mobile Information

    Taylor & Francis Ltd Smartphones Current Events and Mobile Information

    1 in stock

    Book SynopsisSmartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news. Advancing our knowledge of mobile behaviour, the book also highlights the ways in which mobile news impacts the lives of the general public. Using a multi-faceted research model on mobile news consumption behaviour, Oh and Tang examined a wide spectrum of mobile news consumption activities, outlined the key characteristics of mobile news, as well as captured users' near real-time evaluation of and emotional reactions to news stories. The book also shows that the process of using smartphones to receive, read, find, share, and store news stories has resulted in new behavioural patterns that enable people to consume news in a multifaceted way. Analyzing the extent and various methods of mobile news sharing can, Oh and Tang argue, help us understand how such exchanges reshape contemporary society. Demonstrating that mTable of Contents1. Background and Introduction; 2. Mobile News Consumed by Study Participants; 3. Mobile News Consumption Cycle and Activities; 4. Mobile News Reactions: Evaluative Reactions, Affective Reactions; 5. Summary and Conclusion

    1 in stock

    £47.49

  • Economic Crime

    Taylor & Francis Ltd Economic Crime

    15 in stock

    Book SynopsisThis book is the first attempt to establish 'economic crime' as a new sub-discipline within criminology. Fraud, corruption, bribery, money laundering, price-fixing cartels and intellectual property crimes pursued typically for financial and professional gain, have devastating consequences for the prosperity of economic life. While most police forces in the UK and the USA have an âeconomic crimeâ department, and many European bodies such as Europol use the term and develop strategies and structures to deal with it, it is yet to grain traction as a widely used term in the academic community. Economic Crime: From Conception to Response aims to change that and covers: definitions of the key premises of economic crime as the academic sub-discipline within criminology; an overview of the key research on each of the crimes associated with economic crime; public, private and global responses to economic crime across its different forms and sectors of the economy, both within the UK and globally. This book is an essential resource for students, academics and practitioners engaged with aspects of economic crime, as well as the related areas of financial crime, white-collar crime and crimes of the powerful. Trade Review"The scope of economic crimes are unparalleled in modern times, particularly with the rise of the Internet and online financial services. This work provides an excellent approach to understand these offenses, and the individuals responsible. It is essential reading for professionals and the academy." Thomas Holt, School of Criminal Justice at Michigan State University, USA"This volume makes a convincing case for an offense-based approach to the category of economic crimes, ranging from corporate cartels and money laundering, to counterfeiting, industrial espionage and intellectual property crime. It provides an encompassing overview of these crimes as well as a highly up-to-date and integrated discussion of national, transnational and private policing of economic crimes. An accessible and well-written introduction that is useful to anyone interested in understanding the character and harmfulness of crimes in the context of global business, as well as in the design of smart prevention strategies."Judith van Erp, Professor of Regulatory Governance, Utrecht University, The Netherlands"This is a very helpful compendium to guide private and public sector practitioners and scholars through a rapidly evolving field of theory and action, and a clarion call for more serious evidence-based resourcing and policy attention to a range of economic crimes" Michael Levi, Professor of Criminology, Cardiff University"This book delivers on the case for economic criminology! In an engaging and accessible style, it walks the reader through the complexity of the types, causes and consequences of economic crimes. Effectively balancing theory and practice, and not shying away from critical definitional issues, it is chock full of illustrative and provocative examples. Button, Hock and Shepherd have created a strong foundation for students, scholars, policy makers and practitioners to further advance this critical yet understudied area of criminology."Jeremy M. Wilson, Professor, School of Criminal Justice, Michigan State University, US"This is a go-to text for understanding the latest patterns in the fast-evolving area of economic crime. The authors combine analytical clarity with an entertaining readable style, providing fascinating insights into an area that is under-researched despite being an increasingly present part of our lives."Elizabeth Dávid-Barrett, Professor of Governance and Integrity, University of Sussex, UK The scope of economic crimes are unparalleled in modern times, particularly with the rise of the Internet and online financial services. This work provides an excellent approach to understand these offenses, and the individuals responsible. It is essential reading for professionals and the academy. Thomas Holt, School of Criminal Justice at Michigan State University, USAThis volume makes a convincing case for an offense-based approach to the category of economic crimes, ranging from corporate cartels and money laundering, to counterfeiting, industrial espionage and intellectual property crime. It provides an encompassing overview of these crimes as well as a highly up-to-date and integrated discussion of national, transnational and private policing of economic crimes. An accessible and well-written introduction that is useful to anyone interested in understanding the character and harmfulness of crimes in the context of global business, as well as in the design of smart prevention strategies.Judith van Erp, Professor of Regulatory Governance, Utrecht University, The Netherlands"This is a very helpful compendium to guide private and public sector practitioners and scholars through a rapidly evolving field of theory and action, and a clarion call for more serious evidence-based resourcing and policy attention to a range of economic crimes" Michael Levi, Professor of Criminology, Cardiff UniversityThis book delivers on the case for economic criminology! In an engaging and accessible style, it walks the reader through the complexity of the types, causes and consequences of economic crimes. Effectively balancing theory and practice, and not shying away from critical definitional issues, it is chock full of illustrative and provocative examples. Button, Hock and Shepherd have created a strong foundation for students, scholars, policy makers and practitioners to further advance this critical yet understudied area of criminology.Jeremy M. Wilson, Professor, School of Criminal Justice, Michigan State University, USThis is a go-to text for understanding the latest patterns in the fast-evolving area of economic crime. The authors combine analytical clarity with an entertaining readable style, providing fascinating insights into an area that is under-researched despite being an increasingly present part of our lives.Elizabeth Dávid-Barrett, Professor of Governance and Integrity, University of Sussex Table of Contents1.Economic Crime and Economic Criminology 2.Fraud 3.Bribery and Corruption 4.Cartel and Antitrust Offences 5.Economic Cybercrime 6.Intellectual Property Crime and Illicit Trade 7.Industrial and Economic Espionage 8.Money Laundering 9.Explaining Economic Crime 10.Economic Crime: Law and Regulation 11.State and Transnational Policing of Economic Crime 12.Private Policing of Economic Crime Conclusion: An Agenda for Economic Criminologists and Economic Crime Practitioners

    15 in stock

    £34.19

  • Technology is Dead

    CRC Press Technology is Dead

    1 in stock

    Book SynopsisHow did we end up here, masters of scientific insight, purveyors of ever more powerful technologies, astride the burning planet that created us, and now responsible for cleaning up the mess and determining the future direction of all of life? And what do we do about it?Technology is Dead is a book that attempts to answer both of those questions. It is a book of both challenge and hope, written for those who are able or willing to lead us out of our global predicament. It is a book for everybody: the politicians, CEOs, community leaders, everyday parents, and young people who understand that we must change our ways to ensure a sustainable future for all living things and the planet we rely on.

    1 in stock

    £95.00

  • Health Data Privacy under the GDPR

    Taylor & Francis Ltd Health Data Privacy under the GDPR

    15 in stock

    Book SynopsisThe growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity.This book examines health privacy questions in light of the General Data Protection Regulation (GDPR)  and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technologTable of ContentsSection 1Health Data Privacy under the GDPRChapter 1The GDPR and (Big) Health Data: Assessing the EU Legislator’s ChoicesMaria Tzanou, Keele University, UKChapter 2Attribution of Responsibility under the GDPR in the Context of Health Data ProcessingYordanka Ivanova, Sofia University St. Kliment Ohridski, Bulgaria, and Vrije Universiteit Brussel, BelgiumChapter 3Healthcare data about children in social media: the challenges raised under the GDPRRosemary Jay, Hunton Andrews Kurth, UKChapter 4European-wide Big Health Data Analytics under the GDPRJos Dumortier, KU Leuven and Timelex Lawyers, Brussels, BelgiumMahault Piéchaud Boura, Timelex Lawyers, Brussels, BelgiumChapter 5Privacy Issues in eHealth and mHealth AppsBeatriz Sainz-de-Abajo, University of Valladolid, SpainIsabel de la Torre-Díez, University of Valladolid, SpainSusel Góngora-Alonso, University of Valladolid, SpainMiguel López-Coronado, University of Valladolid, SpainSection 2A Critical Assessment of the GDPR’s Regulatory SolutionsChapter 6Regulating non-personal data in the age of Big DataBart van der Sloot, Tilburg University, the NetherlandsChapter 7Addressing Big Data and AI Challenges: A Taxonomy and Why the GDPR Cannot Provide a One-size-fits-all SolutionMaria Tzanou, Keele University, UKChapter 8The GDPR, AI and the NHS Code of Conduct for Data-Driven Health and Care Technology Joseph Savirimuthu, University of Liverpool, UK

    15 in stock

    £36.09

  • Information Security Policies Procedures and

    Taylor & Francis Information Security Policies Procedures and

    1 in stock

    Book SynopsisInformation Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and Table of ContentsIntroduction. Information Security Policy Basics. Information Security Policy Framework. Information Security Policy Details. Information Security Procedures and Standards. Information Security Policy Projects. Appendices.

    1 in stock

    £30.39

  • An Interdisciplinary Approach to Modern Network

    CRC Press An Interdisciplinary Approach to Modern Network

    1 in stock

    Book SynopsisAn Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and privatTable of ContentsChapter 1: Application of Artificial Intelligence in Cyber-security – A Detail Survey on Intrusion Detection System Chapter 2: IoMT data Security Approach: Blockchain in Healthcare Chapter 3: Machine Learning Approach for Network Intrusion Detection SystemChapter 4: Deep learning approach for network intrusion detection systemChapter 5: Firewalls and SecurityChapter 6: Application of Machine Learning and Deep Learning in Cyber Security: An Innovative ApproachChapter 7: A Modified Authentication Approach for Cloud computing in E-Healthcare SystemChapter 8: Advanced Security System in Video Surveillance for COVID-19Chapter 9: Secure Sound and Data Communication via Li-FiChapter 10: A Novel Secured Method for Rapid Data Accumulation in Energy Aware WSN

    1 in stock

    £99.75

  • Blockchain and Artificial Intelligence

    Taylor & Francis Ltd Blockchain and Artificial Intelligence

    1 in stock

    Book SynopsisPresent energy systems are undergoing a radical transformation, driven by the urgent need to address the climate change crisis. At the same time, we are witnessing the sharp growth of energy data and a revolution of advanced technologies, with artificial intelligence (AI) and Blockchain emerging as two of the most transformative technologies of our time. The convergence of these two technologies has the potential to create a paradigm shift in the energy sector, enabling the development of smart energy systems that are more resilient, efficient, and sustainable.This book situates itself at the forefront of this paradigm shift, providing a timely and comprehensive guide to AI and Blockchain technologies in the energy system. Moving from an introduction to the basic concepts of smart energy systems, this book proceeds to examine the key challenges facing the energy system, and how AI and Blockchain can be used to address these challenges. Research examples are presented to showcTable of ContentsList of FiguresList of TablesForewordPrefaceAuthor BiosContributorsSection I Fundamental TheoriesChapter 1 Smart Energy SystemsChapter 2 Theories of Artificial IntelligenceChapter 3 Theories of Blockchain TechnologiesSection II Applications in Smart Energy SystemsChapter 4 Reforms in Energy Systems: Prosumers Era and Future Low Carbon Energy SystemsChapter 5 Application of Artificial Intelligence for Energy SystemsChapter 6 Implementation of Blockchain in Local Energy MarketsChapter 7 Cyber Physical System Modeling for Energy InternetSection III Testbeds for Smart Energy SystemsChapter 8 Developing Testbeds for Smart Energy Systems

    1 in stock

    £71.24

  • Ergonomics Mw Vol 1 HistScop

    Taylor & Francis Ltd Ergonomics Mw Vol 1 HistScop

    1 in stock

    Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.

    1 in stock

    £285.00

  • Ergonomics Mw Vol 2 SkillDis

    Taylor & Francis Ltd Ergonomics Mw Vol 2 SkillDis

    1 in stock

    Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.

    1 in stock

    £285.00

  • Ergonomics Mw Vol 3Psych Mech

    Taylor & Francis Ltd Ergonomics Mw Vol 3Psych Mech

    1 in stock

    Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.

    1 in stock

    £403.75

  • Ergonomics Mw Vol 4 Manu Cont

    Taylor & Francis Ltd Ergonomics Mw Vol 4 Manu Cont

    15 in stock

    Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.

    15 in stock

    £356.74

  • Systems Practice in the Information Society

    Taylor & Francis Ltd Systems Practice in the Information Society

    15 in stock

    Book SynopsisAs a collection of ideas and methodologies, systems thinking has made an impact in organizations and in particular in the information systems field. However, this main emphasis on organizations limits the scope of systems thinking and practice. There is a need first to use systems thinking in addressing societal problems, and second to enable people involved in developing the information society to reflect on the impacts of systems and technologies in society as a whole. Thus, there are opportunities to review the scope and potential of systems thinking and practice to deal with information society-related issues. Systems Practice in the Information Society provides students of information systems as well as practicing Inofrmation Systems managers with concepts and strategies to enable them to understand and use systems thinking methodologies and address challenges posed by the development of information-based societies. This book brings experiences, ideaTable of Contents1. Introduction 2. The Information Society 3. Systems-Thinking 4. Applied Systems-Thinking 5. Idealist Pattern for Practice in the Information Society 6. Strategic Pattern of Pracitice for the Information Society 7. Power-based Pattern for Practice in the Information Society 8. A Dynamic Practice Framework for Living and Working in the Information Society 9. Conclusions

    15 in stock

    £171.00

  • ServiceOriented Architecture Governance for the

    John Wiley & Sons Inc ServiceOriented Architecture Governance for the

    1 in stock

    Book SynopsisA must-have guide for all companies undertaking service-oriented architecture (SOA) and IT governance Service-Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance, security, and technology facets of SOA and IT governance. This book provides a comprehensive enterprise view of governance from a strategic and tactical perspective, as well as modeling and planning tools to help evolve a company''s ongoing governance requirements. Written by Eric Marks and the industry''s leading SOA authorities, this essential book provides a refreshing business-driven perspective to SOA and IT governance.Table of ContentsPreface. Acknowledgments. CHAPTER 1: The SOA Governance Imperative. The Inevitable SOA Trend. Introduction to Governance. Introduction to Enterprise SOA Governance. Governance and Resource Management and Allocation. Do Not Confuse Governance with Management. Governance Is About Results and Appropriate Use of Resources. Information Technology Governance. IT Process Frameworks: ITIL, COBIT, CMMI, and Others. IT Governance Approaches. Who Are the SOA Stakeholders? Addressing SOA Stakeholder Biases. SOA Governance Impacts IT Governance and Enterprise Architecture. SOA Governance Requirements Vary by SOA Maturity. SOA Bill of Rights. Pursue the ‘‘Right’’ SOA Strategy. Apply SOA to the "Right" Challenges. Identify and Build the "Right" Services. Build Your Services the "Right" Way (Design-Time Governance). Get Your SOA Tools Platform "Right" Create the "Right" Organizational, Cultural, and Behavioral Model. Achieve the ‘‘Right’’ SOA Results. Establish the "Right" SOA Governance Model and Policies. Common SOA Governance Mistakes. Right-Sized SOA Governance: How Much Governance Do We Need? Summary. CHAPTER 2: SOA Governance Reference Model. Why an SOA Governance Reference Model? Elements of the SOA Governance Reference Model. Decomposing the SOA Governance Reference Model. SOA Environmental Dimensions. Applying the SOA Governance Reference Model. Summary. CHAPTER 3: Four Tiers of SOA Governance. Expanded Four Tiers of Governance. Tier 1: Enterprise/Strategic Governance Tier. Tier 2: SOA Operating Model Governance Tier. Tier 3: SOA and Services Development Lifecycle Tier. Tier 4: SOA Governance Enabling Technology Tier. Summary. CHAPTER 4: Organizing Your SOA Governance Toolkit. SOA Governance Assessment Tools. SOA Maturity Assessments. Governance Model Design Tools. Policy Model. Governance and Policy Enforcement Model. Governance Execution Model. Summary. CHAPTER 5: SOA Governance Model Design Process. Governance Model Design Prerequisites. Governance Model Validation, Refinement, and Implementation Planning. SOA Governance Model Design Framework Checklist. Summary. CHAPTER 6: SOA Governance Goals, Principles, and Policies. Overview of the Goals–Principles–Policy Cycle. SOA Strategy and SOA Goals. SOA Governance Goals. Turning SOA Goals into SOA Principles. Deriving SOA Governance Principles. SOA Governance Policies. Introduction to Policies. What Policies Are Required? Suggested Policy Definition Process. Decoupling Policies from Services. Identifying Technical Policies. Toward an Integrated Model of SOA Policies. Policy Taxonomy and Vocabulary. Policy Granularity. Multi-Level or Multi-Tiered Policies. Vertical and Horizontal Policy Enforcement. Policy Enforcement Models: Manual, Technology-Assisted, and Automated. Policy Categories Determine Policy Enforcement Mechanisms. Governance Threads and Governance Process Orchestration. Barriers to a Unified Policy Model. Integrated Policy Enforcement Model. Barriers to Integrated Policy Enforcement Models. Policy Provisioning Model (and Process). SOA Goals, Principle, and Policy Management. Transforming SOA Policies into Behavioral Norms. Summary. CHAPTER 7: SOA Governance Organizational Models. First Things First: Understand Your Current Organizational Structure. Conway’s Law and Enterprise SOA Governance. Marks’s Law? Organization Reflects Funding. Organizational Analysis Steps. Purpose of the SOA Governance Organization. Governance Organization Patterns and Best Practices. Other SOA Governance Board Considerations. Specific Governance Organizational Models to Consider. Federated Organizational Models. SOA Governance for Federated IT Models. Best Practice SOA Governance Organizational Roadmap. SOA Governance Organizational Modeling Steps. SOA Governance Organizational Roadmap. SOA Governance Organizational Model Summary. SOA Governance Organizational Model by SOA Adoption Phase. Summary. CHAPTER 8: SOA and Services Lifecycle Governance. Lifecycle Governance Matrix. Lifecycle Governance Tools and Platforms. Production versus Consumption Perspective. Service Reusability. Governance Gaps in a Typical Enterprise. Service Lifecycle Governance Best Practices. Summary. CHAPTER 9: SOA Governance Enabling Technology and Tools. Policy Management Model (PMM). Policy Enforcement Model (PEM). Policy Provisioning Model (PPM). Introduction to the Governance Technical Reference Model. Technology and Standards of SOA Governance and Policies. Design Time. QA and Testing. Publishing and Discovery. Run Time. Battle for Control of SOA Technology Governance. Summary. CHAPTER 10: SOA Governance and Beyond. Governance as a Strategic Competency. Governance Beyond Policies and Edicts. Evolving Governance: Policies to Norms to Culture. Community Models for Governance: Open Source as a Guide. Governance Open Source Style. Governance of the Internet: The Mac Daddy of Communities. Integrating Governance Paradigms. Governance Performance Management: A Necessary Discipline. Creation of an Enterprise Governance Executive. Separation of Enterprise and IT Governance from the PMO. Plan for the Structural Accordion: Centralized to Decentralized to Centralized Again. Governance Going Forward: The Way Ahead. Develop a Unified Model of Policies. Integrated Policy Enforcement Models. Development of Governance Collaboration Tools. "That Governance Is Best that Governs Best with Least" Summary. Index.

    1 in stock

    £45.00

  • SOA Modeling Patterns for ServiceOriented

    John Wiley & Sons Inc SOA Modeling Patterns for ServiceOriented

    1 in stock

    Book SynopsisLearn the essential tools for developing a sound service-oriented architecture SOA Modeling Patterns for Service-Oriented Discovery and Analysis introduces a universal, easy-to-use, and nimble SOA modeling language to facilitate the service identification and examination life cycle stage. This business and technological vocabulary will benefit your service development endeavors and foster organizational software asset reuse and consolidation, and reduction of expenditure. Whether you are a developer, business architect, technical architect, modeler, business analyst, team leader, or manager, this essential guide-introducing an elaborate set of more than 100 patterns and anti-patterns-will help you successfully discover and analyze services, and model a superior solution for your project,. Explores how to discover services Explains how to analyze services for construction and production How to assess service feasibility for deploymeTable of ContentsPreface xix Foreword xxi CHAPTER 1 Introduction 1 What is Service-Oriented Discovery and Analysis? 2 Service-Oriented Analysis Endeavor 2 Service-Oriented Discovery Endeavor 7 Service-Oriented Discovery and Analysis Proposition 11 Driving Principles of Service-Oriented Discovery and Analysis 13 Service-Oriented Discovery and Analysis Modeling 15 Service-Oriented Discovery and Analysis Patterns 17 Summary 20 PART ONE Service-Oriented Discovery and Analysis Road Map Patterns 21 CHAPTER 2 Vertical Service Discovery and Analysis: Pursuing Inward and Downward Road Map Patterns 25 Service Discovery and Analysis Inward Road Map Pattern 25 Service Discovery and Analysis Downward Road Map Pattern 32 Deliverables 38 Summary 39 CHAPTER 3 Horizontal Service Discovery and Analysis: Pursuing Upward and Outward Road Map Patterns 41 Service-Oriented Discovery and Analysis Upward Road Map Pattern 42 Service Discovery and Analysis Outward Road Map Pattern 46 Deliverables 56 Summary 56 CHAPTER 4 Service-Oriented Discovery and Analysis Best Practices Model: Striving for Balanced Solutions 59 Meet-in-the-Middle Service Discovery: Balancing the Identification Venture 59 Structural and Contextual Analysis and Modeling: Balanced Solutions 61 Focus on Service Discovery and Analysis Cross-Cutting Activities 62 Categorization of Services: Reality Check 64 Service-Oriented Discovery and Analysis Best Practices Model 64 Deliverables 68 Summary 68 PART TWO Service-Oriented Discovery Patterns 69 CHAPTER 5 Top-Down Business Process-Driven Service Discovery Pattern 71 Is Business Process Top-Down Service Discovery Practical? 71 Documenting Business Processes: Industry Standards 72 Understand Business Processes 72 Define Business Process Analysis Maturity Level 76 Study Documented Business Processes 77 Establish Service-Oriented Business Process Model 78 Discover Analysis Services 82 Deliverables 87 Summary 88 CHAPTER 6 Top-Down Attribute-Driven Service Discovery Pattern 89 Study Business and Technology Discovery Sources 89 Attend to the Service Discovery Process 90 Institute Core Attributes 91 Establish Attribution Model 93 Select Attributes for Service Discovery 95 Found Decision Model 97 Discover Analysis Services 100 Establish Service Taxonomy 102 Deliverables 104 Summary 104 CHAPTER 7 Front-to-Back Service Discovery Pattern 105 Front-to-Back Service Discovery Model 105 User Interface Control Services 106 User Interface Content Delivery Services 111 User Interface Content Rendering Services 114 User Interface Value Services 117 Front-to-Back Service Discovery Process 118 Deliverables 122 Summary 122 CHAPTER 8 Back-to-Front Service Discovery Pattern 123 Conceptual Data Model Perspective 123 Logical Data Model Perspective 127 Physical Data Model Perspective 139 Back-to-Front Service Discovery Process 139 Deliverables 144 Summary 144 CHAPTER 9 Bottom-Up Service Discovery Pattern 145 Bottom-Up Business Functionality–Driven Service Discovery 145 Bottom-Up Technology-Driven Service Discovery 152 Bottom-Up Reference Architecture–Driven Service Discovery 157 Deliverables 163 Summary 163 CHAPTER 10 Meet-in-the-Middle Service Discovery Pattern 165 Integration-Oriented Services 165 Common Business Services 172 Infrastructure-Oriented Services 175 Deliverables 179 Summary 180 PART THREE Service-Oriented Categorization Patterns 181 CHAPTER 11 Service Source Categorization Patterns 183 Service Ideas and Concepts 183 Service Abstractions 185 Legacy Entities: Road-Tested Executables 188 Service Portfolio 189 Virtual Entities 191 Deliverables 191 Summary 192 CHAPTER 12 Service Structure Categorization Patterns 193 Service Structure Model 193 Environmental Influences on Service Structure 194 Service Structure Categorization Driving Principles 195 Atomic Service Structure: Indivisible Pattern 195 Composite Service Structure: Hierarchical Pattern 196 Service Cluster: Distributed and Federated Pattern 200 Deliverables 203 Summary 204 CHAPTER 13 Service Contextual Categorization Patterns 205 Contextual Classification Model: Patterns for ServiceContextual Categorization 205 Establishing Leading Service Categories 207 Service Subcategories Establishment Process 211 Deliverables 219 Summary 219 PART FOUR Service-Oriented Contextual Analysis Process and Modeling Patterns 221 CHAPTER 14 Contextual Generalization Analysis Process and Modeling Patterns 225 Contextual Generalization Process 225 Contextual Generalization Patterns 232 Contextual Generalization Anti-Patterns 240 Deliverables 243 Summary 243 CHAPTER 15 Contextual Specification Analysis Process and Modeling Patterns 245 Contextual Specification Process 245 Contextual Specification Patterns 250 Service Specification Anti-Patterns 258 Deliverables 261 Summary 261 CHAPTER 16 Contextual Expansion Analysis Process and Modeling Patterns 263 Contextual Expansion Process 264 Contextual Expansion Levels: Organizational Zones for Distribution of Services 265 Contextual Expansion Patterns 270 Service Contextual Expansion Anti-Patterns 278 Deliverables 281 Summary 281 CHAPTER 17 Contextual Contraction Analysis Process and Modeling Patterns 283 Accommodating Demand for Contextual Contraction 283 Service Contextual Contraction Benefits 284 Service Contextual Contraction Example 285 Contextual Contraction Process 286 Contextual Contraction Patterns 290 Contextual Contraction Anti-Patterns 299 Deliverables 301 Summary 301 PART FIVE Service-Oriented Structural Analysis Process and Modeling Patterns 303 CHAPTER 18 Structural Analysis and Modeling Principles: Introduction to Service Structural Notation and Modeling 305 Structural Analysis Modeling Principles 305 Structural Modeling Notation Introduction 306 Aggregation 310 Decomposition 311 Subtraction 312 Coupling and Decoupling 313 Compounding 315 Unification 316 Transformation 318 Intersection 319 Exclusion 321 Clipping 323 Binding and Unbinding 324 Cloning and Decloning 326 Deliverables 328 Summary 329 CHAPTER 19 Structural Generalization Analysis Process and Modeling Patterns 331 Aggregation Analysis: Patterns and Implementation 332 Unification Analysis: Patterns and Implementation 339 Structural Compounding Analysis: Patterns and Implementation 345 Contract Analysis: Patterns and Implementation 351 Deliverables 357 Summary 357 CHAPTER 20 Structural Specification Analysis Process and Modeling Patterns 359 Decomposition Analysis: Patterns and Implementation 359 Subtraction Analysis: Patterns and Implementation 368 Refactoring Analysis: Patterns and Implementation 375 Contract Analysis: Patterns and Implementation 382 Deliverables 388 Summary 388 CHAPTER 21 Structural Expansion Analysis Process and Modeling Patterns 389 Distribution Analysis: Patterns and Implementation 390 Mediation Analysis: Patterns and Implementation 405 Contract Analysis: Patterns and Implementation 414 Deliverables 420 Summary 420 CHAPTER 22 Structural Contraction Analysis Process and Modeling Patterns 423 Distribution Reduction Analysis: Patterns and Implementation 424 Mediation Rollback Analysis: Patterns and Implementation 435 Contract Analysis: Patterns and Implementation 444 Deliverables 450 Summary 450 Index 451

    1 in stock

    £37.50

  • The Handbook of Information and Computer Ethics

    John Wiley & Sons Inc The Handbook of Information and Computer Ethics

    10 in stock

    Book SynopsisDiscover how developments in information technology are raising new ethical debates Information and computer ethics has emerged as an important area of philosophical and social theorizing, combining conceptual, meta-ethical, normative, and applied elements.Trade Review"This book should be of interest to students and scholars in computer science, philosophy, communications, business, library science, and law. It offers a thorough examination of important and timely ethics issues and is recommended for all academic libraries." (American Reference Books Annual, March 2009) "Although each contributor's writing style is obvious, the sectional layout of the text is consistent from article to article, each beginning with an introduction, offering a conclusion for cursory review, and providing reference for further study." (CHOICE, October 2008)Table of ContentsForeword (Deborah G. Johnson). Preface. Contributors. Introduction (Kenneth Einar Himma and Herman T. Tavani). PART I: FOUNDATIONAL ISSUES AND METHODOLOGICAL FRAMEWORKS. 1. Foundations of Information Ethics (Luciano Floridi). 2. Milestones in the History of Information Ethics (Terrell Ward Bynum). 3. Moral Methodology and Information Technology (Jeroen van den Hoven). 4. Value Sensitive Design and Information Systems (Batya Friedman, Peter H. Kahn, and Alan Borning). PART II: THEORETICAL ISSUES AFFECTING PROPERTY, PRIVACY, ANONYMITY, AND SECURITY. 5. Personality-Based, Rule Utilitarian, and Lockean Justifications of Intellectual Property (Adam D. Moore). 6. Informational Privacy: Concepts, Theories, and Controversies (Herman T. Tavani). 7. Online Anonymity (Kathleen A. Wallace). 8. Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking (Kenneth Einar Himma). PART III: PROFESSIONAL ISSUES AND THE INFORMATION-RELATED PROFESSIONS. 9. Information Ethics and the Library Profession (Kay Mathiesen and Don Fallis). 10. Ethical Interest in Free and Open Source Software (Frances S. Grodzinsky and Marty J. Wolf). 11. Internet Research Ethics: The Field and its Critical Issues (Elizabeth A. Buchanan and Charles Ess). 12. Health Information Technology: Challenges in Ethics, Science, and Uncertainty (Kenneth W. Goodman). 13. Ethical Issues of Information and Business (Bernd Carsten Stahl). PART IV: RESPONSIBILITY ISSUES AND RISK ASSESSMENT. 14. Responsibilities for Information on the Internet (Anton Vedder). 15. Virtual Reality and Computer Simulation (Philip Brey). 16. Genetic Information: Epistemological and Ethical Issues (Antonio Marturano). 17. The Ethics of Cyber Conflict (Dorothy E. Denning). 18. A Practical Mechanism for Ethical Risk Assessment - A SoDIS Inspection (Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan). PART V: REGULATORY ISSUES AND CHALLENGES. 19. Regulation and Governance on the Internet (John Weckert and Yeslam Al-Saggaf). 20. Information Overload (David M. Levy). 21. Email Spam (Keith W. Miller and James H. Moor). 22. The Matter of Plagiarism: What, Why, and If (John Snapper). 23. Intellectual Property: Legal and Moral Challenges of Online File Sharing (Richard A. Spinello). PART VI: ACCESS AND EQUITY ISSUES. 24. Censorship and Access to Information (Kay Mathiesen). 25. The Gender Agenda in Computer Ethics (Alison Adam). 26. The Digital Divide: Perspective for the Future (Maria Canellopoulou-Botti and Kenneth Einar Himma). 27. Intercultural Information Ethics (Rafael Capurro). Index.

    10 in stock

    £140.35

  • Passwords Philology Security Authentication

    Harvard University Press Passwords Philology Security Authentication

    15 in stock

    Book SynopsisCryptology, the science of ciphers and codes, and philology, the study of languages, are typically understood as separate domains. But Brian Lennon contends that computing’s humanistic applications, no less than its technical ones, are marked by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.Trade ReviewPasswords is a fascinating book. What is especially impressive is the author’s deft and knowing engagements with both the long histories of computational text processing and the many discourses that make up literary philology. This is just the sort of work that the present mania for the digital demands, and yet books that actually live up to those demands are few and far between. Lennon is one of the few scholars who is even capable of managing that feat, and he does so here with style and erudition. -- David Golumbia, Virginia Commonwealth UniversityA stunning intervention, Passwords rivets our attention to the long history of our present fascination with the digital humanities. Through a series of close, contextual readings, from ninth-century Arabic philology and medieval European debates on language to twentieth-century stylometry and machine translation, this book recalls us to a series of engagements with language about which ‘all of us—we scholars, we philologists,’ as Lennon puts it, ought to know more. Passwords is eloquent and timely, and it offers a form of deep, institutional-lexical study, which schools us in a refusal to subordinate scholarship in the humanities to the identitarian and stabilizing imperatives of the national-security state. -- Jeffrey Sacks, University of California, Riverside

    15 in stock

    £33.11

  • Mode of Information  Poststructuralism and Social

    John Wiley and Sons Ltd Mode of Information Poststructuralism and Social

    1 in stock

    Book SynopsisThis book is a major new contribution to debates about modernity and post-modernity, emphasising the influence of electronic communication. Poster highlights the emergence of a new communication order, an interaction between humankind and a new kind of reality.Trade Review'Poster has begun to theorize a very significant topic.' SociologyTable of ContentsIntroduction: Words Without Things. 1. The Concept of Postindustrial Society. 2. Baudrillard and TV Ads. 3. Foucault and Data Bases. 4. Derrida and Electronic Writing. 5. Lyotard and Computer Science. Notes. Index.

    1 in stock

    £16.14

  • Law on the Electronic Frontier

    Edinburgh University Press Law on the Electronic Frontier

    1 in stock

    Book SynopsisThis is an issue of our quarterly journal Hume Papers on Public Policy - the journal of the David Hume Institute.Trade ReviewProvides some useful insights into computers and the law over a broad area. -- E Susan Singleton Provides some useful insights into computers and the law over a broad area.Table of ContentsRacing Forms and the Exhibition(ist) (Mis)Match: Second Thoughts on the Anxiety of Production

    1 in stock

    £25.64

  • Computer Ethics A Global Perspective  A Global

    Jones and Bartlett Publishers, Inc Computer Ethics A Global Perspective A Global

    1 in stock

    Book Synopsis

    1 in stock

    £81.60

  • Ethics and Computing  Living Responsibly in a

    Wiley-Blackwell Ethics and Computing Living Responsibly in a

    15 in stock

    Book Synopsis"All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers.Table of ContentsPreface. Acknowledgments for the First Edition. Acknowledgments for the Second Edition Getting Started. Critical-Thinking Skills. Professional Codes of Ethics. "Cracking" and Computer Security. Encryption, Law Enforcement, and Privacy. Computers in Safety-Critical Systems. Whistle Blowing. Intellectual-Property Issues. Environmental and Health Concerns. Striving for Fairness. Managing Your Career. Appendix A: Notes for the Instructor. Appendix B: Codes of Ethics. Appendix C: Pointers to Additional Resources. Index. About the Editor.

    15 in stock

    £95.36

  • Audit and Trace Log Management

    Taylor & Francis Ltd Audit and Trace Log Management

    1 in stock

    Book SynopsisAs regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. Audit and Trace Log Management: Consolidation and Analysis offers a comprehensive introduction and explanation of requirements and problem definition, and also delivers a multidimensional solution set with broad applicability across a wide range of organizations.Itprovidesa wealth of information in the form of processwalkthroughs. These include problem determination, requirements gathering,scope definition, risk assessment, compliance objectives, systemdesign and architecture, implementation and operational challenges, productand solution evaluation, communication plans, project managementchallenges, and determining Return on Investment (ROI). By using templates, tools, and samples that enhance your understanding of processes and solution sets, the author successfully emphasizes the core themes of the book. He also includes mTrade Review“There are only a few books that I would recommend every security professional keep on the shelf, … this is one of them. It was written by someone who has lived the numbing nightmare of surveying the endlessly proliferating sources of event data in a modern enterprise, of identifying what must be collected, how it should be collected, filtered and stored, and what should be done with it. Most importantly, Maier kept careful notes along the way and has provided a guidebook that will help those of us who follow.” —Richard Austin, MSC, CISSP, MCSE, Hewlett Packard, in IEEE Cipher, January 2007 “Ultimately the readers are provided with a roadmap and a “how to” guideline leading to the successful implementation of a state-of-the-art auditing and monitoring system. Most will want to read it from cover to cover, and also add it to their bookshelves for frequent reference. …Armed with the knowledge from this book, you will be able to champion and guide your organization through a disciplined and well-defined audit and monitoring project. It isn’t a stretch to be able further to design and implement the system while fulfilling a diverse set of requirements and organizational needs.” Linda L. McGhie, CISSP, CISM, PCS ISO/Risk Manager, Wells Fargo BankTable of ContentsIntroduction to audit logging. The “why” of consolidated audit logging. Taking stock, what is in place today. Deciding what to capture and how to do it. Setting up correlation rules, putting your assembled infrastructure to work. Security event management, generating reports from your system. Setting security alert levels and escalation processes. Pulling it all together and making your case.

    1 in stock

    £95.00

  • The Cambridge Handbook of Responsible Artificial

    Cambridge University Press The Cambridge Handbook of Responsible Artificial

    1 in stock

    Book SynopsisThere is an urgent need for responsible governance of Artificial Intelligence systems. This Handbook maps important features of responsible AI governance and demonstrates how to achieve and implement them at the regional, national and international level.Trade Review'… an indispensable and thought-provoking resource for shaping the future of AI and its societal impact.' Matija Franklin, PrometheusTable of ContentsIntroduction; Part I. Foundations of Responsible AI: 1. Artificial Intelligence – Key Technologies and Opportunities Wolfram Burgard; 2. Automating Supervision of AI Delegates Jaan Tallinn and Richard Ngo; 3. Artificial Moral Agents – Conceptual Issues and Ethical Controversy Catrin Misselhorn;4. Risk Imposition by Artificial Agents – The Moral Proxy Problem Johanna Thoma; 5. Artificial Intelligence and its Integration into the Human Lifeworld Christoph Durt; Part II. Current and Future Approaches to AI Governance: 6. Artificial Intelligence and the Past, Present and Future of Democracy Mathias Risse; 7. The New Regulation of the European Union on Artificial Intelligence – Fuzzy Ethics Diffuse into Domestic Law and Sideline International Law Thomas Burri; 8. Fostering the Common Good – An Adaptive Approach Regulating High-Risk AI-Driven Products and Services Thorsten Schmidt and Silja Voeneky; 9. China's Normative Systems for Responsible AI – From Soft Law to Hard Law Weixing Shen and Yun Liu; 10. Towards a Global Artificial Intelligence Charter Thomas Metzinger; 11. Intellectual Debt – With Great Power Comes Great Ignorance Jonathan Zittrain; Part III. Responsible AI Liability Schemes: 12. Liability for Artificial Intelligence – The Need to Address both Safety Risks and Fundamental Rights Risks Christiane Wendehorst; 13. Forward to the Past – A Critical Evaluation of the European Approach to Artificial Intelligence in Private International Law Jan von Hein; Part IV. Fairness and Non-Discrimination in AI Systems: 14. Differences that Make a Difference – Computational Profiling and Fairness to Individuals Wilfried Hinsch; 15. Discriminatory AI and the Law – Legal Standards for Algorithmic Profiling Antje von Ungern-Sternberg; Part V. Responsible Data Governance: 16. Artificial Intelligence and the Right to Data Protection Ralf Poscher; 17. Artificial Intelligence as a Challenge for Data Protection Law – And Vice Versa Boris Paal; 18. Data Governance and Trust – Lessons from South Korean Experiences Coping with COVID-19 Haksoo Ko, Sangchul Park and Yong Lim; Part VI. Responsible Corporate Governance of AI Systems: 19. From Corporate Governance to Algorithm Governance – Artificial Intelligence as a Challenge for Corporations and their Executives Jan Lieder; 20. Autonomization and Antitrust – On the Construal of the Cartel Prohibition in the Light of Algorithmic Collusion Stefan Thomas; 21. Artificial Intelligence in Financial Services – New Risks and the Need for More Regulation? Matthias Paul; Part VII. Responsible AI Healthcare and Neurotechnology Governance: 22. Medical AI – Key Elements at the International Level Fruzsina Molnár-Gábor and Johanne Giesecke; 23. 'Hey Siri, How Am I Doing?' – Legal Challenges for Artificial Intelligence Alter Egos in Healthcare Christoph Kroenke; 24. Neurorights – A Human-Rights Based Approach for Governing Neurotechnologies Philipp Kellmeyer; 25. AI-Supported Brain-Computer Interfaces and the Emergence of 'Cyberbilities' Boris Essmann and Oliver Mueller; Part VIII. Responsible AI for Security Applications and in Armed Conflict: 26. Artificial Intelligence, Law and National Security Ebrahim Afsah; 27. Morally Repugnant Weaponry? Ethical Responses to the Prospect of Autonomous Weapons Alex Leveringhaus; 28. On 'Responsible AI' in War – Exploring Preconditions for Respecting International Law in Armed Conflict Dustin A. Lewis.

    1 in stock

    £142.50

  • Access and Control in Digital Humanities

    Taylor & Francis Access and Control in Digital Humanities

    15 in stock

    Book SynopsisAccess and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful. Contributors to this volume present case studies and theoretical approaches from their experience with applications for digital technology in classrooms, museums, archives, in the field and with the general public. Offering potential answers to the issues of access and control from a variety of perspectives, the volume acknowledges that access is subject to competing interests of a variety of stakeholders. Museums, universities, archives, and some communities all place claims on how data can or cannot be shared through digital initiatives and, given the collaborative nature of most digital humanities projects, those in the field need to be cognizant of the various and often competing interests and rights that shape the Table of Contents1. Introduction: access and control in digital humanitiesShane HawkinsPart I. Access, Control, and DH in Academia2. From Stone to Screen: the built-in obsolescence of digitizationKaitlyn Solberg, Lisa Tweten, and Chelsea A. M. Gardner3. Digital humanities and a new research culture: between promoting and practicing open research dataUrszula Pawlicka-DegerPart II. Networks of Access and Control4. Computational ontologies for accessing, controlling, and disseminating knowledge in the cultural heritage sector: a case studyJohn Roberto Rodríguez5. Digital approaches to the ‘Big Ancient Mediterranean’Ryan Horne6. Questioning authority: creation, use, and distribution of linked data in digital humanitiesLindsay Kistler Mattock & Anu ThapaPart III. Access, Control and Immersive Media7. Visuality as historical experience: immersive multi-directional narrative in the MIT Visualizing Cultures ProjectEllen Sebring8. Architectonic connections: virtual reconstruction to disseminate understanding of South and Southeast Asian templesDavid Beynon and Sambit Datta9. Postscript on the Ctrl+Alt society: protocols for locative mediaBrian GreenspanPart IV. Access, Control, and Indigenous Knowledge10. Cross-cultural collaborations in the digital world: a case study from the Great Lakes Research Alliance’s Knowledge Sharing DatabaseHeidi Bohaker, Lisa Truong, and Kate Higginson11. Issues and intersections of Indigenous knowledge protection and copyright for DHKim Paula NayyerPart V. Access, Control, and the Law12. The open access spectrum: redefining the access discourse for the electronic editions of literary worksSetsuko Yokoyama13. Ownership, copyright, and the ethics of the unpublishedEmily C. Friedman14. Digital humanities research under United States and European copyright laws: evolving frameworksErik Ketzan and Paweł Kamocki15. Trust is good, control is better? The GDPR and control over personal data in digital humanities researchPaweł Kamocki

    15 in stock

    £35.14

  • Building in Security at Agile Speed

    Taylor & Francis Ltd Building in Security at Agile Speed

    15 in stock

    Today''s high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to

    15 in stock

    £42.74

  • Wearable Technology in Elite Sport

    Taylor & Francis Wearable Technology in Elite Sport

    15 in stock

    Book SynopsisWearable devices are being used by an increasing number of elite-level sports teams to manage and control the health, performance, and productivity of their athletes. Drawing upon a wide range of interdisciplinary resources, Wearable Technology in Elite Sport reveals how wearable devices are used to quantify athletic bodies in ways that have a number of undesirable consequences for the embodied subject. This book identifies some of the problematic consequences of excessive âdataveillanceâ in sport by interrogating the process by which wearable data is produced, represented, and enacted in the governance of athletic behaviour.The book provides a set of conceptual resources for thinking critically about the powerful role played by measurement systems in shaping athletic embodiment. The themes that this book examines include an exploration of how technological devices serve an important disciplinary function in elite sport and how wearable-derived data might act to affectTable of Contents1. Elite sport and the cult of measurement. 2. Datafication and the cultivation of the neoliberal subject. 3. Producing data. 4. Exploring the representation and enactment of wearable data. 5. Sensing data: Navigating an algorithmic world. 6. The social and ethical implications of excessive datafication.

    15 in stock

    £121.50

  • The Routledge Handbook of Privacy and Social

    Taylor & Francis The Routledge Handbook of Privacy and Social

    1 in stock

    Book SynopsisThis volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors â such as culture, gender, and trust â and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy.This handbook will be a valuTable of ContentsPart 1: Perspectives on Social Media Privacy 1. Definitions of Privacy 2. Individualistic Privacy Theories 3. Privacy Theory – Social, Networked, Relational, Collective 4. Institutional Perspectives on Privacy 5. Group Privacy 6. A Situational Perspective on Privacy in Social Media 7. Privacy Calculus: Theory, Studies, and New Perspectives 8. Online Privacy Cues and Heuristics Part 2: Factors Shaping Social Media Privacy 9. Social Media Affordances and Privacy 10. Privacy and Trust 11. Challenges in Studying Social Media Privacy Literacy 12. Privacy Breaches 13. Privacy Cynicism: Resignation in the Face of Agency Constraints 14. Intercultural Privacy 15. Privacy and Gender Part 3: Populations and Their Social Media Privacy 16. The Translucent Family: Sharenting and Privacy Negotiations between Children and Parents 17. An Intimate Relation: Adolescent Development, Self-disclosure, and Privacy 18. Privacy in Later Life 19. Toward a Better Understanding of Minorities’ Privacy in Social Media 20.Inequalities and Privacy in the Context of Social Media Part 4: Algorithms and Privacy 21. Privacy in Interactions with Machines and Intelligent Systems 22. Social Credit System and Privacy 23. Microtargeting, Privacy, and the Need for Regulating Algorithms 24. Health Data and Privacy Part 5: Solutions to Preserve Social Media Privacy 25. Nudges (and Deceptive Patterns) for Privacy: Six Years Later 26. Communicating Information Security 27. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy 28. Regulating Privacy on Online Social Networks 29. Consumer Privacy and Data Protection in the EU 30. The Role of Participants in Online Privacy Research: Ethical and Practical Considerations

    1 in stock

    £209.00

  • Intelligent CyberPhysical Systems Security for

    CRC Press Intelligent CyberPhysical Systems Security for

    1 in stock

    Book SynopsisIntelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management presents new cyber-physical security findings for Industry 4.0 using emerging technologies like artificial intelligence (with machine/deep learning), data mining, applied mathematics. All these are the essential components for processing data, recognizing patterns, modeling new techniques, and improving the advantages of data science.Featuresâ Presents an integrated approach with Cyber-Physical Systems, CPS security, and Industry 4.0 in one place â Exposes the necessity of security initiatives, standards, security policies, and procedures in the context of industry 4.0 â Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security â Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security forTable of Contents1. Intelligent Cyber-Physical Systems Security for Industry 4.0: An Introduction. 2. Issues in Authentication in Augmented Reality Systems. 3. An Automated Cover Text Selection System for Text Steganography Algorithms. 4. Cyber Attacks and Countermeasures in RPL-based Industrial Internet of Things. 5. Cyber Physical Attacks and IoT. 6. Chaos Based Advanced Encryption Algorithm Using Affine Transformation in S-Box and its Implementation in FPGA. 7. Cyber-Physical Systems Attacks and Countermeasures. 8. Deep Learning Methods to Resolve Cyber Security Issues. 9. Application of Temporal Logic for Construction of Threat Models for Intelligent Cyber-Physical Systems. 10. Software-Defined Network Security. 11. A Review on AI-ML based Cyber-Physical Systems Security for Industry 4.0 12. Triangulation Augmented AI-Algorithm for Achieving Intelligent Flight Stabilizing Performance CapabilitiesBibhorr, Chirag R. Anand. 13. Forecasting based Authentication Schemes for Network Resource Management in Vehicular Communication Network. 14. Intelligent Cyber-Physical Systems Security for Industry 4.0: Concluding Remarks.

    1 in stock

    £100.00

  • Cybersecurity Ethics

    Taylor & Francis Ltd Cybersecurity Ethics

    1 in stock

    Book SynopsisThis textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI, and Big Data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy, and philosophy of science, three ethical frameworks virtue ethics, utilitarian ethics, and communitarian ethics and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance, and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, Big Data, and cyberwarfare. The overall aims of the book are to: Provide ethical frameworks to aid decision-making Present the key ethical issues in relation to computer security Highlight the connection betweeTrade Review‘This book is a rich and valuable resource for students to learn more about non-technical aspects of cybersecurity.’ Markus Christen, Managing Director, Digital Society Initiative, University of Zurich, Switzerland ‘The authoritative text on cybersecurity ethics, covering a wide selection of topics including privacy, intellectual property theft, artificial intelligence and big data. This is a terrific resource for students in Europe and beyond.’ Max Smeets , ETH Zurich, Center for Security Studies (CSS) and Director of European Cyber Conflict Research Initiative 'A comprehensive tour de force in cybersecurity ethics. This illuminating book weaves together ethical frameworks that address the evolving nature of some of the most complicated cyber issues in the 21st century. Are we prepared to understand and respond to the ethical challenges that continue to emerge across cyber domains and technological advances? The author addresses these challenges head on and this book will prove to be an excellent resource to those who wish to advance their understanding of cybersecurity ethics.' William Travis Morris, Director, Norwich University Peace and War Center, USA 'This book is relevant and accessible, providing clear definitions and real-world examples connecting theory and practice. Computational and communications technologies continue to evolve and transform daily life and military operations, and also conceptions of peace and war, identity, and agency. Dr. Manjikian’s text proceeds from a premise that is now widely recognized: the design and use of cyber-related technologies are value-laden activities. This book promotes the kind of critical thinking and discussion about cyber and information warfare that we need in military and civilian classrooms today.' Karen Guttieri, Army Cyber Institute at West Point, USA Praise for the 1st edition: 'This book is a bold and innovative synthesis of thinking from diverse yet interlinked disciplines. It is vital reading for scholars, policymakers, security professionals and organizational leaders. Manjikian's explication of the ACM Code of Ethics shows why it is a foundational concept for cybersecurity.' Steven Metz, U.S. Army War College, USA ‘As cyber conflict, espionage and crime increasingly challenge nations and their citizens, Manjikian's Cybersecurity Ethics provides a comprehensive and needed addition to the cyber literature cannon. This work constitutes a robust framework for decisions and actions in cyberspace and is essential reading for policymakers, practitioners, and students engaging the field of cybersecurity.’ Aaron F. Brantly, Army Cyber Institute, United States Military Academy, West Point 'Mary Manjikian’s introduction to cybersecurity ethics nicely links philosophy to practical cyber concerns of students, corporate and government information managers, and even cyber warriors. Complicated concepts are easy to understand and relevant to personal decision-making.' J John A. Gentry, Georgetown University, USA 'Dr Manjikian has done a masterful job of outlining ethical standards to the constantly evolving cybersecurity domain. This book is a vital reference for those who are concerned with ethics related to hacking, privacy, surveillance, and cyberwarfare in an ever changing virtual environment that transcends boundaries and cultures and challenges the traditional ways that humans have dealt with each other. Ground-breaking and should be required reading for any serious cybersecurity professional.' Keith Dayton, George C. Marshall European Center for Security Studies, Germany 'A great introductory text to complex conceptual and practical issues in cybersecurity.' Heather Roff, Arizona State University, USA 'Mary Manjikian's excellent textbook, Cybersecurity Ethics, delivers an eminently readable perspective for the experienced professional as well as a casual cyberspace consumer. ...Overall, Cybersecurity Ethics excellently fulfills the stated goal to provide an ethical framework and illustrate several current issues regarding cybersecurity through a new textbook. The construction was splendid, material assembled coherently, and sources presented thoroughly and accurately. This book is an excellent introduction to ethical processes associated with cyberspace.' Mark Peters, Strategic Studies Quarterly 'Cybersecurity Ethics is a comprehensive and timely textbook that offers to help educate members to understand the ethics of current and imagined future technologies and their applications.' Darren Cronshaw, The Cove, USA Table of ContentsPart I 1. What is Ethics? 2. Three Ethical Frameworks 3. The Ethical Hacker Part II 4. The Problem of Privacy 5. The Problem of Surveillance 6. The Problems of Intellectual Property Part III 7. Ethics of Artificial Intelligence 8. Cybersecurity, Diversity, Equity, and Inclusion 9. Big Data and the Ethics of Cybersecurity 10. Military Aspects of Cybersecurity Ethics

    1 in stock

    £118.75

  • Cybersecurity Operations and Fusion Centers

    Taylor & Francis Ltd Cybersecurity Operations and Fusion Centers

    15 in stock

    Book SynopsisCybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for anyone involved in the establishment and operation of a Cybersecurity Operations and Fusion Center (SOFC). Think of a combination cybersecurity SOC and cybersecurity Threat Intelligence Center (TIC). In this book, Dr. McLaughlin, who is a well-respected cybersecurity expert, provides a comprehensive guide to the critical importance of having an SOFC and the various options available to organizations to either build one from scratch or purchase a ready-made solution. The author takes the reader through the crucial steps of designing an SOFC model, offering expert advice on selecting the right partner, allocating resources, and building a strong and effective team. The book also provides an in-depth exploration of the design and implementation of the SOFC infrastructure and toolset, including the use of virtual tools, the physicalTable of ContentsPart I. Building and Deployment, 1. What Is a Cybersecurity Operations and Fusion Center (SOFC) and Why Do You Need One?, 2. Designing the SOFC Model, 3. SOFC: Building the Core Team, Part II. Tools and Operations, 4. SOFC Infrastructure and Toolset, 5. Cybersecurity Operations and Fusion Center: Daily Operations, 6. Foundations of Security Operations or SecOps, 7. Detection, Response, and Remediation, Part III. Reporting and Metrics, 8. SOFC Reporting, 9. SOFC Metrics, Part IV. Leadership Alignment and Support, 10. SOFC Alignment and Support, 11. Key Components of a Turnkey SOFC, 12. Conclusion

    15 in stock

    £42.74

  • Bankers Like Us

    Taylor & Francis Ltd Bankers Like Us

    15 in stock

    Book SynopsisThis book will resonate with anyone no matter where you reside on this journey, whether newbie or old guard. If you want to be part of this change, you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn't resonate, then I suggest you think about stepping aside. Curt Queyrouze, President, Coastal Community BankThe world is going digital, and so is bankingin fits, starts, and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits, mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about, not by external heroes and saviours, not by a generation yet to be born, but people just like us. People who understand thTrade Review"I know I will read this again. And again. I need it as a reminder in the work ahead…."—Trygve Aasheim, Lead Architect, Technology and Digital Channels, Corporate Banking, DNBBankers Like Us is about love and innovation at the Fintech Frontier of an inhospitable industry: banking.—Ronit Ghose, Future of Finance Head, Citibank N.A."An insightful read, based on lessons learned over a long career driving change in and outside the banking industry. Leda dives deep into the plumbing – systems, processes and culture – in large organisations, uncovering legacy tech and legacy mindsets with humour and humanity. These are real-world problems with real-world solutions from an expert in digital transformation."—Joy Macknight, Editor, The Banker"In banking, we are in that rare moment of time where worlds are colliding. As Leda writes "The challenge is that up until now, the industry has evolved. Now it has to transform." As a long-time banker and newly-minted digital transformation leader, I know too well that years of ‘existing’ in banking created strong muscle memory that now thrashes against the pace of change. It pulls us back to what feels familiar and comfortable. This opportunity for transformation isn’t about new ways of doing the old things, but more about completely new models of how serve the customer, and how we do so with completely new profit schemes. This book will resonate with anyone no matter where you reside on this journey, whether newbie or old guard. If you want to be part of this change, you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate, then I suggest you think about stepping aside. As Leda explains, this change will need all sorts of talent and skills all the way down to the "friends in low places," but the one big thing to remember is this transformation is coming and won’t care if you don’t buy in."—Curt Queyrouze, President, CCBX, A Division of Coastal Community Bank"With personal and professional experiences beautifully weaved throughout, the book shares – in the most relatable way – that you don’t need to compromise your principles to achieve business results, and that you don’t need to sacrifice business aspirations to be a decent human being. Leda’s narrative exquisitely captures so many of the industry’s ideas and its participants’ contemplations."—Tanya Andreasyan, Editor-in-Chief, FinTech FuturesTable of Contents1. FinTech, Bad Habits and Great People: The Main Ingredients of the Story Ahead 2. Why This, Why Now and Why Working Towards a Big Dream Doesn’t Feel Big and Dreamy 3. Bankers Behaving Badly 4. Painting by Numbers: Diversity, Innovation and Why Lip Service Won’t Move the Needle 5. Fierce Grace: What Drives Us on, Despite Our Bad Habits and Demographic Constraints 6. So (Now) What?

    15 in stock

    £28.49

  • Advances in Cyber Security and Intelligent

    CRC Press Advances in Cyber Security and Intelligent

    2 in stock

    Book SynopsisWe live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyTable of Contents1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework D. SANTHADEVI AND B. JANET4 Exploring the possibility of blockchain and smart contract-based digital certificate P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH6 Addressing the cybersecurity issues in cloud computing SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD7 Role of medical image encryption algorithms in cloud platform for teleradiology applications SIJU JOHN AND S. N. KUMAR8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things THULASI M. SANTHI AND M. C. HELEN MARY9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issuesANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID11 A detailed cram on artificial intelligence industrial systems 4.0 P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI12 Ensuring liveliness property in safety-critical systems ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR13 Machine learning for intelligent analytics JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL14 Secure 3D route optimization of combat vehicles in war field using IoV ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH16 Containerization in cloud computing for OS-level virtualization MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK17 An adaptive deep learning approach for stock price forecasting RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA

    2 in stock

    £94.99

  • Philosophy through Computer Science

    Taylor & Francis Ltd Philosophy through Computer Science

    1 in stock

    Book SynopsisWhat do philosophy and computer science have in common? It turns out, quite a lot!In providing an introduction to computer science (using Python), Daniel Lim presents in this book key philosophical issues, ranging from external world skepticism to the existence of God to the problem of induction. These issues, and others, are introduced through the use of critical computational concepts, ranging from image manipulation to recursive programming to elementary machine learning techniques. In illuminating some of the overlapping conceptual spaces of computer science and philosophy, Lim teaches readers fundamental programming skills and allows them to develop the critical thinking skills essential for examining some of the enduring questions of philosophy.Key Features Teaches readers actual computer programming, not merely ideas about computers Includes fun programming projects (like digital image manipulation and Game of Life simulation)Trade Review"Philosophy and computer science have fascinating interconnections concerning knowledge, reality, and morality. With clarity and insight, Daniel Lim’s book provides an excellent introduction to computing and philosophical investigation. He valuably shows how philosophical arguments and computer programs can combine to address deep questions about thinking and the world."Paul Thagard, University of Waterloo, Canada Table of ContentsPreface 1: Philosophy and Computer Science 2: Python 3: Algorithms 4: Logic 5: Iteration 6: Image Manipulation 7: Skepticism 8: Functions 9: Mind 10: Game of Life 11: Free Will 12: Recursion 13: God 14: Data 15: Machine Learning 16: Induction 17: AI Ethics 18. Solutions Appendix

    1 in stock

    £32.29

  • Ransomware and Cybercrime

    Taylor & Francis Ltd Ransomware and Cybercrime

    15 in stock

    Book SynopsisIn May 2021, Jim Gosler, known as the Godfather and commander of US agenciesâ cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced.Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security.This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online.There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We needâno, we must demandâchange. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.Table of ContentsForeword. Preface. Chapter 1 Stuxnet to Sunburst and Ransomware Development. Chapter 2 Not Secure, F and 0… Chapter 3 Ransomware Lessons Being Learned… Chapter 4 Colonial Pipeline and CI Companies. Chapter 5 CNA Ransomware Attack and Cyber Insurance. Chapter 6 BA, easyJet, and the Travel Industry. Chapter 7 Destabilising the United States, Courts, Law Enforcement, and Way of Life. Chapter 8 Deterrence Theory and the Five Eyes Faux Pas. Chapter 9 Ensuring the Security of Insecurity. Chapter 10 Traditional Warfare, the Fat Man, Mistakes Made, and Lessons Still Being Learned and Ignored. Chapter 11 Survivorship Bias. Chapter 12 Air India Ransomware Faux Pas. Chapter 13 Most Common Website Vulnerabilities and Attacks. Chapter 14 The Old Lady of Threadneedle Street and the FCA. Chapter 15 MITRE CWE and Ransom Task Force. Chapter 16 Critical National Infrastructure: The Collapse of a Nation. Chapter 17 US State Attacks and the Continued Oversight of Security. Chapter 18 Conflicts of Interest. Chapter 19 Innovation and Disbelief. Chapter 20 Blackbaud, Cyberattacks, and Class Action Lawsuits. Chapter 21 The World’s Largest Global Economic Shift. Chapter 22 It Is Not Setting Goals Too High, but Setting Them Too Low and Achieving Them. Chapter 23 Avoiding the Apocalypse. Chapter 24 If a Clever Person Learns from Their Mistakes and a Wise Person Learns from the Mistakes of Others, What Is a Person Who Learns from Neither Known As? Index.

    15 in stock

    £28.49

  • Cyber Security and Business Intelligence

    Taylor & Francis Ltd Cyber Security and Business Intelligence

    1 in stock

    Book SynopsisTo cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information, and government.The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber Table of Contents1. Leveraging Business Intelligence to Enhance Cyber Security InnovationSarika Faisal, Syed Far Abid Hossain, Saba Fahmida and Rayisa Rayhana2. Cyber Risk and the Cost of Unpreparedness of Financial InstitutionsNaveenan R.V and Suresh G 3. Cyber Security in Banking SectorMohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa4. Is the Application of Blockchain Technology in Accounting Feasible? A Developing Nation PerspectiveEmon Kalyan Chowdhury5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity SalaryMahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter6. Test Plan for Immersive Technology-Based Medical Support SystemMohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert 7. Current Challenges of Hand-Based Biometric SystemsKaterina Prihodova, and Miloslav Hub8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion DetectionSad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model InterpretabilityMahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early StagesMahmudul Hasan, Sad Wadi Sajid and Md. Al Amin12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text CommunicationNahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly DetectionMd. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan

    1 in stock

    £128.25

  • Managing the Insider Threat

    Taylor & Francis Ltd Managing the Insider Threat

    1 in stock

    Book SynopsisManaging the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success of and insight provided by the first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka rising tide) insider attacks.This edition is fully updated with coverage from the previous edition having undergone extensive review and revision, including updating citations and publications that have been published in the last decade. Three new chapters drill down into the advanced exploration of rising tide threats, examining the nuanced complexities and presenting new tools such as the loyalty ledger (Chapter 10) and intensity scale (Chapter 11). New explorations of ambiguous situations and options for thwarting hostile insiders touch on examples that call for tolerance, friction, or radical turnaround (Chapter 11).  Additionally, a more oblique discussion (Chapter 12) explores alternatiTable of ContentsI: Underpinnings 1: Problem and Limits of Accepted Wisdom 2: Groundbreaking Research and Findings 3: Agents of Changes—Corporate Sentinels 4: Agents of Changes—Leaders and Co-Pilots II: Sudden Impact Defenses 5: Rethinking Background Investigations 6: Deception and the Insider Threat 7: Lawful Disruption of the Insider Threat 8: Mortal Insider Threats III: Defenses for Uncertain and Rising Tide Insider Threats 9: Anomalous Insider Threats 10: Competing Loyalties and the Loyalty Ledger 11: Friction and Turnaround 12: Inoculation and Last Meal Case Study 13: Consulting for No Dark Corners Implementation 14: Answer Guide and Concluding Observations

    1 in stock

    £106.25

  • Real World AI Ethics for Data Scientists

    CRC Press Real World AI Ethics for Data Scientists

    1 in stock

    Book SynopsisIn the midst of the fourth industrial revolution, big data is weighed in gold, placing enormous power in the hands of data scientists the modern AI alchemists. But great power comes with greater responsibility. This book seeks to shape, in a practical, diverse, and inclusive way, the ethical compass of those entrusted with big data.Being practical, this book provides seven real-world case studies dealing with big data abuse. These cases span a range of topics from the statistical manipulation of research in the Cornell food lab through the Facebook user data abuse done by Cambridge Analytica to the abuse of farm animals by AI in a chapter co-authored by renowned philosophers Peter Singer and Yip Fai Tse. Diverse and inclusive, given the global nature of this revolution, this book provides case-by-case commentary on the cases by scholars representing non-Western ethical approaches (Buddhist, Jewish, Indigenous, and African) as well as Western approaches (consequentialism, deoTable of Contents1. Introduction: Moral Machines, 2. Introduction to Ethical Approaches in Data Science, 3. Research Ethics and the Scientific Method, 4. Machine Models in Court, 5. Synthetic Media and Political Violence, 6. Biometrics and Facial Recognition, 7. Content Moderation: Hate Speech and Genocide in Myanmar, 8. Mental Malware: Algorithms and Choice Architecture, 9. AI and Nonhuman Animals

    1 in stock

    £40.84

  • The Global Insurance Market and Change

    Taylor & Francis Ltd The Global Insurance Market and Change

    5 in stock

    Book SynopsisThis book focuses on the global landscape in which insurance is transacted, and where it is evolving, driven from within by transformative technologies and externally by the necessity to address risks like climate change and health crises, such as the COVID-19 pandemic.It discusses the dynamic challenges and opportunities that lie ahead for the industry in areas such as on-demand insurance, embedded insurance, parametric insurance, autonomous vehicles, the rise of fintech, the cyber risk landscape and through initiatives driven by distributed ledger technology or blockchain solutions.Moreover, it covers the major external challenges confronting the global insurance market, such as the growing insurance protection gap in relation to the affordability and insurability of natural catastrophes and climate change, and pandemics like COVID-19.This book examines innovations in insurance driven by the industry as well as externally imposed changes and dynamics impactingTable of ContentsList of Editors, List of Contributors, Chapter 1 Introduction, Chapter 2 Big Data, Artificial Intelligence and Insurance, Chapter 3 On-Demand Insurance, Chapter 4 Embedded Insurance, Chapter 5 Distributed Ledger Technology & Blockchain: Insurance, Chapter 6 Parametric Insurance, Chapter 7 Autonomous Vehicles: Liability and Insurance, Chapter 8 Autonomous Ships: Liability and Insurance, Chapter 9 Unmanned Aerial Vehicles: Liability and Insurance, Chapter 10 The Rise of Fintech: Liability and Insurance, Chapter 11 Cyber Risk and Insurance, Chapter 12 Professional Indemnity Insurance, Chapter 13 Pandemics and Insurance, Chapter 14 Climate Change and Insurance, Chapter 15 Climate Change: Liability Risk, Chapter 16 Conclusion: New and evolving challenges and opportunities

    5 in stock

    £275.50

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account