Legal aspects Books
Taylor & Francis Ltd Building in Security at Agile Speed
Today''s high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to
£42.74
Taylor & Francis Wearable Technology in Elite Sport
Book SynopsisWearable devices are being used by an increasing number of elite-level sports teams to manage and control the health, performance, and productivity of their athletes. Drawing upon a wide range of interdisciplinary resources, Wearable Technology in Elite Sport reveals how wearable devices are used to quantify athletic bodies in ways that have a number of undesirable consequences for the embodied subject. This book identifies some of the problematic consequences of excessive âdataveillanceâ in sport by interrogating the process by which wearable data is produced, represented, and enacted in the governance of athletic behaviour.The book provides a set of conceptual resources for thinking critically about the powerful role played by measurement systems in shaping athletic embodiment. The themes that this book examines include an exploration of how technological devices serve an important disciplinary function in elite sport and how wearable-derived data might act to affectTable of Contents1. Elite sport and the cult of measurement. 2. Datafication and the cultivation of the neoliberal subject. 3. Producing data. 4. Exploring the representation and enactment of wearable data. 5. Sensing data: Navigating an algorithmic world. 6. The social and ethical implications of excessive datafication.
£121.50
CRC Press Big Data Analytics in Cybersecurity
Book SynopsisBig data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, oïers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators.Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, Table of ContentsApplying Big Data into Different Cybersecurity Aspects. The Power of Big Data in Cybersecurity. Big Data for Network Forensics. Dynamic Analytics-Driven Assessment of Vulnerabilities and Exploitation. Root Cause Analysis for Cybersecurity. Data Visualization for Cybersecurity. Cybersecurity Training. Machine Unlearning: Repairing Learning Models in Adversarial Environments. Big Data in Emerging Cybersecurity Domains. Big Data Analytics for Mobile App Security. Security, Privacy, and Trust in Cloud Computing. Cybersecurity in Internet of Things (IoT). Big Data Analytics for Security in Fog Computing. Analyzing Deviant Socio-Technical Behaviors Using Social Network Analysis and Cyber Forensics-Based Methodologies. Tools and Datasets for Cybersecurity. Security Tools. Data and Research Initiatives for Cybersecurity Analysis. Index.
£42.74
Taylor & Francis The Routledge Handbook of Privacy and Social
Book SynopsisThis volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors â such as culture, gender, and trust â and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy.This handbook will be a valuTable of ContentsPart 1: Perspectives on Social Media Privacy 1. Definitions of Privacy 2. Individualistic Privacy Theories 3. Privacy Theory – Social, Networked, Relational, Collective 4. Institutional Perspectives on Privacy 5. Group Privacy 6. A Situational Perspective on Privacy in Social Media 7. Privacy Calculus: Theory, Studies, and New Perspectives 8. Online Privacy Cues and Heuristics Part 2: Factors Shaping Social Media Privacy 9. Social Media Affordances and Privacy 10. Privacy and Trust 11. Challenges in Studying Social Media Privacy Literacy 12. Privacy Breaches 13. Privacy Cynicism: Resignation in the Face of Agency Constraints 14. Intercultural Privacy 15. Privacy and Gender Part 3: Populations and Their Social Media Privacy 16. The Translucent Family: Sharenting and Privacy Negotiations between Children and Parents 17. An Intimate Relation: Adolescent Development, Self-disclosure, and Privacy 18. Privacy in Later Life 19. Toward a Better Understanding of Minorities’ Privacy in Social Media 20.Inequalities and Privacy in the Context of Social Media Part 4: Algorithms and Privacy 21. Privacy in Interactions with Machines and Intelligent Systems 22. Social Credit System and Privacy 23. Microtargeting, Privacy, and the Need for Regulating Algorithms 24. Health Data and Privacy Part 5: Solutions to Preserve Social Media Privacy 25. Nudges (and Deceptive Patterns) for Privacy: Six Years Later 26. Communicating Information Security 27. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy 28. Regulating Privacy on Online Social Networks 29. Consumer Privacy and Data Protection in the EU 30. The Role of Participants in Online Privacy Research: Ethical and Practical Considerations
£209.00
CRC Press Intelligent CyberPhysical Systems Security for
Book SynopsisIntelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management presents new cyber-physical security findings for Industry 4.0 using emerging technologies like artificial intelligence (with machine/deep learning), data mining, applied mathematics. All these are the essential components for processing data, recognizing patterns, modeling new techniques, and improving the advantages of data science.Featuresâ Presents an integrated approach with Cyber-Physical Systems, CPS security, and Industry 4.0 in one place â Exposes the necessity of security initiatives, standards, security policies, and procedures in the context of industry 4.0 â Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security â Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security forTable of Contents1. Intelligent Cyber-Physical Systems Security for Industry 4.0: An Introduction. 2. Issues in Authentication in Augmented Reality Systems. 3. An Automated Cover Text Selection System for Text Steganography Algorithms. 4. Cyber Attacks and Countermeasures in RPL-based Industrial Internet of Things. 5. Cyber Physical Attacks and IoT. 6. Chaos Based Advanced Encryption Algorithm Using Affine Transformation in S-Box and its Implementation in FPGA. 7. Cyber-Physical Systems Attacks and Countermeasures. 8. Deep Learning Methods to Resolve Cyber Security Issues. 9. Application of Temporal Logic for Construction of Threat Models for Intelligent Cyber-Physical Systems. 10. Software-Defined Network Security. 11. A Review on AI-ML based Cyber-Physical Systems Security for Industry 4.0 12. Triangulation Augmented AI-Algorithm for Achieving Intelligent Flight Stabilizing Performance CapabilitiesBibhorr, Chirag R. Anand. 13. Forecasting based Authentication Schemes for Network Resource Management in Vehicular Communication Network. 14. Intelligent Cyber-Physical Systems Security for Industry 4.0: Concluding Remarks.
£100.00
Taylor & Francis Ltd Cybersecurity Ethics
Book SynopsisThis textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI, and Big Data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy, and philosophy of science, three ethical frameworks virtue ethics, utilitarian ethics, and communitarian ethics and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance, and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, Big Data, and cyberwarfare. The overall aims of the book are to: Provide ethical frameworks to aid decision-making Present the key ethical issues in relation to computer security Highlight the connection betweeTrade Review‘This book is a rich and valuable resource for students to learn more about non-technical aspects of cybersecurity.’ Markus Christen, Managing Director, Digital Society Initiative, University of Zurich, Switzerland ‘The authoritative text on cybersecurity ethics, covering a wide selection of topics including privacy, intellectual property theft, artificial intelligence and big data. This is a terrific resource for students in Europe and beyond.’ Max Smeets , ETH Zurich, Center for Security Studies (CSS) and Director of European Cyber Conflict Research Initiative 'A comprehensive tour de force in cybersecurity ethics. This illuminating book weaves together ethical frameworks that address the evolving nature of some of the most complicated cyber issues in the 21st century. Are we prepared to understand and respond to the ethical challenges that continue to emerge across cyber domains and technological advances? The author addresses these challenges head on and this book will prove to be an excellent resource to those who wish to advance their understanding of cybersecurity ethics.' William Travis Morris, Director, Norwich University Peace and War Center, USA 'This book is relevant and accessible, providing clear definitions and real-world examples connecting theory and practice. Computational and communications technologies continue to evolve and transform daily life and military operations, and also conceptions of peace and war, identity, and agency. Dr. Manjikian’s text proceeds from a premise that is now widely recognized: the design and use of cyber-related technologies are value-laden activities. This book promotes the kind of critical thinking and discussion about cyber and information warfare that we need in military and civilian classrooms today.' Karen Guttieri, Army Cyber Institute at West Point, USA Praise for the 1st edition: 'This book is a bold and innovative synthesis of thinking from diverse yet interlinked disciplines. It is vital reading for scholars, policymakers, security professionals and organizational leaders. Manjikian's explication of the ACM Code of Ethics shows why it is a foundational concept for cybersecurity.' Steven Metz, U.S. Army War College, USA ‘As cyber conflict, espionage and crime increasingly challenge nations and their citizens, Manjikian's Cybersecurity Ethics provides a comprehensive and needed addition to the cyber literature cannon. This work constitutes a robust framework for decisions and actions in cyberspace and is essential reading for policymakers, practitioners, and students engaging the field of cybersecurity.’ Aaron F. Brantly, Army Cyber Institute, United States Military Academy, West Point 'Mary Manjikian’s introduction to cybersecurity ethics nicely links philosophy to practical cyber concerns of students, corporate and government information managers, and even cyber warriors. Complicated concepts are easy to understand and relevant to personal decision-making.' J John A. Gentry, Georgetown University, USA 'Dr Manjikian has done a masterful job of outlining ethical standards to the constantly evolving cybersecurity domain. This book is a vital reference for those who are concerned with ethics related to hacking, privacy, surveillance, and cyberwarfare in an ever changing virtual environment that transcends boundaries and cultures and challenges the traditional ways that humans have dealt with each other. Ground-breaking and should be required reading for any serious cybersecurity professional.' Keith Dayton, George C. Marshall European Center for Security Studies, Germany 'A great introductory text to complex conceptual and practical issues in cybersecurity.' Heather Roff, Arizona State University, USA 'Mary Manjikian's excellent textbook, Cybersecurity Ethics, delivers an eminently readable perspective for the experienced professional as well as a casual cyberspace consumer. ...Overall, Cybersecurity Ethics excellently fulfills the stated goal to provide an ethical framework and illustrate several current issues regarding cybersecurity through a new textbook. The construction was splendid, material assembled coherently, and sources presented thoroughly and accurately. This book is an excellent introduction to ethical processes associated with cyberspace.' Mark Peters, Strategic Studies Quarterly 'Cybersecurity Ethics is a comprehensive and timely textbook that offers to help educate members to understand the ethics of current and imagined future technologies and their applications.' Darren Cronshaw, The Cove, USA Table of ContentsPart I 1. What is Ethics? 2. Three Ethical Frameworks 3. The Ethical Hacker Part II 4. The Problem of Privacy 5. The Problem of Surveillance 6. The Problems of Intellectual Property Part III 7. Ethics of Artificial Intelligence 8. Cybersecurity, Diversity, Equity, and Inclusion 9. Big Data and the Ethics of Cybersecurity 10. Military Aspects of Cybersecurity Ethics
£118.75
Taylor & Francis Ltd Cybersecurity Operations and Fusion Centers
Book SynopsisCybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for anyone involved in the establishment and operation of a Cybersecurity Operations and Fusion Center (SOFC). Think of a combination cybersecurity SOC and cybersecurity Threat Intelligence Center (TIC). In this book, Dr. McLaughlin, who is a well-respected cybersecurity expert, provides a comprehensive guide to the critical importance of having an SOFC and the various options available to organizations to either build one from scratch or purchase a ready-made solution. The author takes the reader through the crucial steps of designing an SOFC model, offering expert advice on selecting the right partner, allocating resources, and building a strong and effective team. The book also provides an in-depth exploration of the design and implementation of the SOFC infrastructure and toolset, including the use of virtual tools, the physicalTable of ContentsPart I. Building and Deployment, 1. What Is a Cybersecurity Operations and Fusion Center (SOFC) and Why Do You Need One?, 2. Designing the SOFC Model, 3. SOFC: Building the Core Team, Part II. Tools and Operations, 4. SOFC Infrastructure and Toolset, 5. Cybersecurity Operations and Fusion Center: Daily Operations, 6. Foundations of Security Operations or SecOps, 7. Detection, Response, and Remediation, Part III. Reporting and Metrics, 8. SOFC Reporting, 9. SOFC Metrics, Part IV. Leadership Alignment and Support, 10. SOFC Alignment and Support, 11. Key Components of a Turnkey SOFC, 12. Conclusion
£42.74
Taylor & Francis Ltd Bankers Like Us
Book SynopsisThis book will resonate with anyone no matter where you reside on this journey, whether newbie or old guard. If you want to be part of this change, you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn't resonate, then I suggest you think about stepping aside. Curt Queyrouze, President, Coastal Community BankThe world is going digital, and so is bankingin fits, starts, and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits, mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about, not by external heroes and saviours, not by a generation yet to be born, but people just like us. People who understand thTrade Review"I know I will read this again. And again. I need it as a reminder in the work ahead…."—Trygve Aasheim, Lead Architect, Technology and Digital Channels, Corporate Banking, DNBBankers Like Us is about love and innovation at the Fintech Frontier of an inhospitable industry: banking.—Ronit Ghose, Future of Finance Head, Citibank N.A."An insightful read, based on lessons learned over a long career driving change in and outside the banking industry. Leda dives deep into the plumbing – systems, processes and culture – in large organisations, uncovering legacy tech and legacy mindsets with humour and humanity. These are real-world problems with real-world solutions from an expert in digital transformation."—Joy Macknight, Editor, The Banker"In banking, we are in that rare moment of time where worlds are colliding. As Leda writes "The challenge is that up until now, the industry has evolved. Now it has to transform." As a long-time banker and newly-minted digital transformation leader, I know too well that years of ‘existing’ in banking created strong muscle memory that now thrashes against the pace of change. It pulls us back to what feels familiar and comfortable. This opportunity for transformation isn’t about new ways of doing the old things, but more about completely new models of how serve the customer, and how we do so with completely new profit schemes. This book will resonate with anyone no matter where you reside on this journey, whether newbie or old guard. If you want to be part of this change, you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate, then I suggest you think about stepping aside. As Leda explains, this change will need all sorts of talent and skills all the way down to the "friends in low places," but the one big thing to remember is this transformation is coming and won’t care if you don’t buy in."—Curt Queyrouze, President, CCBX, A Division of Coastal Community Bank"With personal and professional experiences beautifully weaved throughout, the book shares – in the most relatable way – that you don’t need to compromise your principles to achieve business results, and that you don’t need to sacrifice business aspirations to be a decent human being. Leda’s narrative exquisitely captures so many of the industry’s ideas and its participants’ contemplations."—Tanya Andreasyan, Editor-in-Chief, FinTech FuturesTable of Contents1. FinTech, Bad Habits and Great People: The Main Ingredients of the Story Ahead 2. Why This, Why Now and Why Working Towards a Big Dream Doesn’t Feel Big and Dreamy 3. Bankers Behaving Badly 4. Painting by Numbers: Diversity, Innovation and Why Lip Service Won’t Move the Needle 5. Fierce Grace: What Drives Us on, Despite Our Bad Habits and Demographic Constraints 6. So (Now) What?
£28.49
CRC Press Advances in Cyber Security and Intelligent
Book SynopsisWe live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyTable of Contents1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework D. SANTHADEVI AND B. JANET4 Exploring the possibility of blockchain and smart contract-based digital certificate P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH6 Addressing the cybersecurity issues in cloud computing SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD7 Role of medical image encryption algorithms in cloud platform for teleradiology applications SIJU JOHN AND S. N. KUMAR8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things THULASI M. SANTHI AND M. C. HELEN MARY9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issuesANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID11 A detailed cram on artificial intelligence industrial systems 4.0 P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI12 Ensuring liveliness property in safety-critical systems ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR13 Machine learning for intelligent analytics JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL14 Secure 3D route optimization of combat vehicles in war field using IoV ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH16 Containerization in cloud computing for OS-level virtualization MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK17 An adaptive deep learning approach for stock price forecasting RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA
£94.99
Taylor & Francis Ltd Philosophy through Computer Science
Book SynopsisWhat do philosophy and computer science have in common? It turns out, quite a lot!In providing an introduction to computer science (using Python), Daniel Lim presents in this book key philosophical issues, ranging from external world skepticism to the existence of God to the problem of induction. These issues, and others, are introduced through the use of critical computational concepts, ranging from image manipulation to recursive programming to elementary machine learning techniques. In illuminating some of the overlapping conceptual spaces of computer science and philosophy, Lim teaches readers fundamental programming skills and allows them to develop the critical thinking skills essential for examining some of the enduring questions of philosophy.Key Features Teaches readers actual computer programming, not merely ideas about computers Includes fun programming projects (like digital image manipulation and Game of Life simulation)Trade Review"Philosophy and computer science have fascinating interconnections concerning knowledge, reality, and morality. With clarity and insight, Daniel Lim’s book provides an excellent introduction to computing and philosophical investigation. He valuably shows how philosophical arguments and computer programs can combine to address deep questions about thinking and the world."Paul Thagard, University of Waterloo, Canada Table of ContentsPreface 1: Philosophy and Computer Science 2: Python 3: Algorithms 4: Logic 5: Iteration 6: Image Manipulation 7: Skepticism 8: Functions 9: Mind 10: Game of Life 11: Free Will 12: Recursion 13: God 14: Data 15: Machine Learning 16: Induction 17: AI Ethics 18. Solutions Appendix
£32.29
Taylor & Francis Ltd Ransomware and Cybercrime
Book SynopsisIn May 2021, Jim Gosler, known as the Godfather and commander of US agenciesâ cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced.Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security.This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online.There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We needâno, we must demandâchange. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.Table of ContentsForeword. Preface. Chapter 1 Stuxnet to Sunburst and Ransomware Development. Chapter 2 Not Secure, F and 0… Chapter 3 Ransomware Lessons Being Learned… Chapter 4 Colonial Pipeline and CI Companies. Chapter 5 CNA Ransomware Attack and Cyber Insurance. Chapter 6 BA, easyJet, and the Travel Industry. Chapter 7 Destabilising the United States, Courts, Law Enforcement, and Way of Life. Chapter 8 Deterrence Theory and the Five Eyes Faux Pas. Chapter 9 Ensuring the Security of Insecurity. Chapter 10 Traditional Warfare, the Fat Man, Mistakes Made, and Lessons Still Being Learned and Ignored. Chapter 11 Survivorship Bias. Chapter 12 Air India Ransomware Faux Pas. Chapter 13 Most Common Website Vulnerabilities and Attacks. Chapter 14 The Old Lady of Threadneedle Street and the FCA. Chapter 15 MITRE CWE and Ransom Task Force. Chapter 16 Critical National Infrastructure: The Collapse of a Nation. Chapter 17 US State Attacks and the Continued Oversight of Security. Chapter 18 Conflicts of Interest. Chapter 19 Innovation and Disbelief. Chapter 20 Blackbaud, Cyberattacks, and Class Action Lawsuits. Chapter 21 The World’s Largest Global Economic Shift. Chapter 22 It Is Not Setting Goals Too High, but Setting Them Too Low and Achieving Them. Chapter 23 Avoiding the Apocalypse. Chapter 24 If a Clever Person Learns from Their Mistakes and a Wise Person Learns from the Mistakes of Others, What Is a Person Who Learns from Neither Known As? Index.
£28.49
Taylor & Francis Ltd Cyber Security and Business Intelligence
Book SynopsisTo cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information, and government.The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber Table of Contents1. Leveraging Business Intelligence to Enhance Cyber Security InnovationSarika Faisal, Syed Far Abid Hossain, Saba Fahmida and Rayisa Rayhana2. Cyber Risk and the Cost of Unpreparedness of Financial InstitutionsNaveenan R.V and Suresh G 3. Cyber Security in Banking SectorMohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa4. Is the Application of Blockchain Technology in Accounting Feasible? A Developing Nation PerspectiveEmon Kalyan Chowdhury5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity SalaryMahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter6. Test Plan for Immersive Technology-Based Medical Support SystemMohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert 7. Current Challenges of Hand-Based Biometric SystemsKaterina Prihodova, and Miloslav Hub8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion DetectionSad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model InterpretabilityMahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early StagesMahmudul Hasan, Sad Wadi Sajid and Md. Al Amin12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text CommunicationNahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly DetectionMd. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan
£128.25
Taylor & Francis Ltd Managing the Insider Threat
Book SynopsisManaging the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success of and insight provided by the first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka rising tide) insider attacks.This edition is fully updated with coverage from the previous edition having undergone extensive review and revision, including updating citations and publications that have been published in the last decade. Three new chapters drill down into the advanced exploration of rising tide threats, examining the nuanced complexities and presenting new tools such as the loyalty ledger (Chapter 10) and intensity scale (Chapter 11). New explorations of ambiguous situations and options for thwarting hostile insiders touch on examples that call for tolerance, friction, or radical turnaround (Chapter 11). Additionally, a more oblique discussion (Chapter 12) explores alternatiTable of ContentsI: Underpinnings 1: Problem and Limits of Accepted Wisdom 2: Groundbreaking Research and Findings 3: Agents of Changes—Corporate Sentinels 4: Agents of Changes—Leaders and Co-Pilots II: Sudden Impact Defenses 5: Rethinking Background Investigations 6: Deception and the Insider Threat 7: Lawful Disruption of the Insider Threat 8: Mortal Insider Threats III: Defenses for Uncertain and Rising Tide Insider Threats 9: Anomalous Insider Threats 10: Competing Loyalties and the Loyalty Ledger 11: Friction and Turnaround 12: Inoculation and Last Meal Case Study 13: Consulting for No Dark Corners Implementation 14: Answer Guide and Concluding Observations
£106.25
CRC Press Real World AI Ethics for Data Scientists
Book SynopsisIn the midst of the fourth industrial revolution, big data is weighed in gold, placing enormous power in the hands of data scientists the modern AI alchemists. But great power comes with greater responsibility. This book seeks to shape, in a practical, diverse, and inclusive way, the ethical compass of those entrusted with big data.Being practical, this book provides seven real-world case studies dealing with big data abuse. These cases span a range of topics from the statistical manipulation of research in the Cornell food lab through the Facebook user data abuse done by Cambridge Analytica to the abuse of farm animals by AI in a chapter co-authored by renowned philosophers Peter Singer and Yip Fai Tse. Diverse and inclusive, given the global nature of this revolution, this book provides case-by-case commentary on the cases by scholars representing non-Western ethical approaches (Buddhist, Jewish, Indigenous, and African) as well as Western approaches (consequentialism, deoTable of Contents1. Introduction: Moral Machines, 2. Introduction to Ethical Approaches in Data Science, 3. Research Ethics and the Scientific Method, 4. Machine Models in Court, 5. Synthetic Media and Political Violence, 6. Biometrics and Facial Recognition, 7. Content Moderation: Hate Speech and Genocide in Myanmar, 8. Mental Malware: Algorithms and Choice Architecture, 9. AI and Nonhuman Animals
£40.84
Taylor & Francis Ltd The Global Insurance Market and Change
Book SynopsisThis book focuses on the global landscape in which insurance is transacted, and where it is evolving, driven from within by transformative technologies and externally by the necessity to address risks like climate change and health crises, such as the COVID-19 pandemic.It discusses the dynamic challenges and opportunities that lie ahead for the industry in areas such as on-demand insurance, embedded insurance, parametric insurance, autonomous vehicles, the rise of fintech, the cyber risk landscape and through initiatives driven by distributed ledger technology or blockchain solutions.Moreover, it covers the major external challenges confronting the global insurance market, such as the growing insurance protection gap in relation to the affordability and insurability of natural catastrophes and climate change, and pandemics like COVID-19.This book examines innovations in insurance driven by the industry as well as externally imposed changes and dynamics impactingTable of ContentsList of Editors, List of Contributors, Chapter 1 Introduction, Chapter 2 Big Data, Artificial Intelligence and Insurance, Chapter 3 On-Demand Insurance, Chapter 4 Embedded Insurance, Chapter 5 Distributed Ledger Technology & Blockchain: Insurance, Chapter 6 Parametric Insurance, Chapter 7 Autonomous Vehicles: Liability and Insurance, Chapter 8 Autonomous Ships: Liability and Insurance, Chapter 9 Unmanned Aerial Vehicles: Liability and Insurance, Chapter 10 The Rise of Fintech: Liability and Insurance, Chapter 11 Cyber Risk and Insurance, Chapter 12 Professional Indemnity Insurance, Chapter 13 Pandemics and Insurance, Chapter 14 Climate Change and Insurance, Chapter 15 Climate Change: Liability Risk, Chapter 16 Conclusion: New and evolving challenges and opportunities
£275.50
Taylor & Francis The EU Artificial Intelligence Act
Book SynopsisAI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence.The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brainâcomputer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for mind reading or dream hacking throuTrade ReviewForemost expert in the international field of legal synaesthesia, Rostam Neuwirth reminds us in this engagingly complex critique of proposed EU regulation in AI systems, that in this age of paradox and oxymora, the mind, with its elaborately interactive sensory intersectionality involving cognition, knowledge, and reality, is a site precariously positioned for manipulation through systems of artificial intelligence that seek to control awareness and perception through subliminal techniques emboldened by irresponsible regulation. Law must protect our foundational freedom as humans to think, to feel, and engage with thoughts, feelings, and the reality that comes from this chaotic overlap.Sarah Marusek, University of Hawai‘i Hilo (USA) and author of "Synesthetic Legalities: Sensory Dimensions of Law and Jurisprudence"Rostam J. Neuwirth’s book on the subliminal effects of AI is both original and timely. It is original because Neuwirth combines discourses from the fields of vulnerability theory, AI and neuroscience in a unique manner. The book is timely because the earlier one understands AI’s subliminal effects, the higher is the chance that we can avoid that the concept of ‘private thought’ becomes an oxymoron. Neuwirth’s latest book is thus essential reading for anyone committed to the protection of human dignity and human autonomy in the digital realm.Valentin Jeutner, Lund University (Sweden) and author of "Irresolvable Norm Conflicts in International Law: The Concept of a Legal Dilemma"The global challenges of the XXI century spur humans to deal with Complex Systems. In my book, entitled "Untangling Complex Systems: A Grand Challenge for Science", I show that Artificial Intelligence (AI) turns out to be a valuable tool to tackle Complexity. The development of AI brings humanity to the brink of a fourth technological revolution that will fundamentally alter the way humans live, work, and conceive themselves. There are intelligent machines that "assist", others that "augment" humans, and finally others that are "autonomous". These intelligent machines, which interact with humans, help face complex scenarios but raise ethical questions. The brilliant and farsighted Neuwirth’s book presents the general context of the future regulation of AI. It specifically addresses the regulatory challenges related to the planned prohibition of "the use of an AI system that deploys subliminal techniques beyond a person’s consciousness". Through a transdisciplinary examination of AI's legal, technological, linguistic and cognitive aspects, Neuwirth legitimately concludes that control of the mind should remain the personal domain of every human and the term "private thought" should not become an oxymoron. Neuwirth’s book is a "must-read" for anyone who wants to know more about the regulation of subliminal AI systems.Pier Luigi Gentili, Department of Chemistry, Biology and Biotechnology, University of Perugia (Italy)A highly important and timely discussion of the concept of subliminal manipulation at a time when the EU prepares to be one of the first major regulators of artificial intelligence. It is crucial that more experts like Professor Neuwirth contribute to the topic of reducing the risks of AI manipulation.Risto Uuk, Policy Researcher, Future of Life Institute (FLI)Table of ContentsPrefaceIntroduction1. The European Union’s Proposed Artificial Intelligence Act (AIA)A. Background and ContextB. The Prohibition of AI Systems Deploying Subliminal TechniquesC. The Scope and Nature of AI Systems with Subliminal Aspects2. Subliminal Perception and the LawA. Motivational Research and "Hidden Persuaders"B. Laws Prohibiting Subliminal AdvertisingC. Subliminal Perception and the Senses: Between Individuality and Unity3. The Future Regulation of Subliminal AI SystemsA. The Prohibition of Subliminal Techniques in AI Systems, RevisitedB. Wider Ramifications for Law: Towards a Right to Cognitive FreedomC. Legal Synaesthesia: Greater Unity of the Senses Leads to Greater Unity of Law?Conclusion
£47.49
Taylor & Francis Ltd The Change Agent
Book SynopsisJohn Taylor has been hired to transform the underperforming internal audit unit at InSports. The auditors are not reviewing what the audit committee and executive leadership consider essential for the organization's success, their methodology is subpar, and their relationships with their clients are strained. The audit committee has been patient, but not anymore. Their mandate is clear: make clear improvements in one year or the function will be outsourced.This is the story of a visionary leader who needs a strategy to transform processes and deliver better results for stakeholders at all levels within the organization. The audit committee, all levels of management, and employees expect more from internal audit. Now, John must lead the group through 12 challenging months as they focus on what matters most when performing audit and advisory services. They must communicate results faster and better, leverage existing quality control and data analytics techniques, and, with everTable of ContentsWinter, 1. Conditions and Urgent Need for Change, 2. The Underperforming Internal Audit Department, 3. Building a Coalition: Outreach, Summary: Winter, Spring, 4. Creating a Vision and Strategy, 5. Updating the Methodology, 6. Improved Reporting, 7. Training, Development, Coaching, and Mentoring, 8. Communicating the Vision: Outreach, Summary: Spring, Summer, 9. Measurement and Methodology Changes and Performance Evaluations, 10. Providing Advisory Services, 11. Empowering Employees, 12. Remove Barriers to Action, 13. Determining Future Resource Needs, 14. Setback and Generating Short-Term Wins, Summary: Summer, Fall, 15. Build on the Change and Consolidate Gains, 16. Quality Assurance and Improvement Program (QAIP), 17. Institutionalize and Produce Even More Change, Summary: Fall
£40.84
Taylor & Francis The Digitalisation of AntiCorruption in Brazil
Book SynopsisThis book investigates how digital technologies, such as social media and artificial intelligence, can contribute to combatting corruption in Brazil.Brazil, with its long history of scandals and abundant empirical data on digital media usage, serves as a perfect case study to trace the development of bottom-up and top-down digital anti-corruption technologies and their main features. This book highlights the connections between anti-corruption reforms and the rapid implementation of innovative solutions, primarily developed by tech-savvy public officials and citizens committed to anti-corruption efforts. The book draws on interviews with experts, activists and civil servants, as well as open-source materials and social media data to identify key actors, their practices, challenges and limitations of anti-corruption technologies. The result is a thorough analysis of the process of digitalisation of anti-corruption in Brazil, with a theoretical framework which can also be applied to other countries. The book introduces the concept of âœintegrity techiesâ to encompass social and political actors who develop and facilitate anti-corruption technologies, and discusses different outcomes and issues associated with digital innovation in anti-corruption.This book will be a key resource for students, researchers and practitioners interested in technologies and development in Brazil and Latin America, as well as corruption and anti-corruption studies more broadly.
£47.49
Taylor & Francis Ltd PKI Implementation and Infrastructures
Book SynopsisThe concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream. This is mostly because implementing a PKI is time consuming and difficult. Maintaining a PKI is equally time consuming and even more difficult within the real world of mergers and acquisitions against a backdrop of ever-changing technology. Many organisations simply give up and hand everything over to a third party who promises to manage everything on their behalf. This is generally not a good idea and simply delays the inevitability of failures and misunderstood complexity. This book explores all the aspects of implementing and maintaining a PKI that the other books on the subject seem to miss. It reflects decades of hard-won experience, not only in PKI, not only in IT, not only in electronics, but in business, government agencies and academia alike. The book also explores the existence of a PKI alongside other technologies, such as biometrics, and against an ever-changing world of development methodologies. This last point is particularly relevant at this time as we are in the middle of a quiet, but all encompassing revolution in this respect. Consequently, this is the one book on PKI that you have to have on your shelf, whether you be a company director, IT manager, government minister or teacher of IT. It is the book which fills in all the gaps left in the literature and treads paths which others fear to tread. You will enjoy it enormously if you are from an IT background.Table of Contents1. What exactly is a PKI? The original concept, 2. How does PKI work? The nuts and bolts of PKI, 3. What are the primary applications for a PKI? How applications are changing, 4. What exactly is a digital certificate? The contents of a certificate, 5. What about encryption? How a public key infrastructure is used for encryption, 6. Biometrics and PKI: The possibilities of biometric certificates, 7. What is the conventional wider infrastructure? Different infrastructure models explained, 8. Kubernetes, containers and PKI: The container model and its implications for PKI, 9. Trust and certificates: The original concept has changed, 10. How may a localised infrastructure work? Keeping things simple, 11. What happens when certificates expire? What can go wrong?, 12. How do we ensure that certificates do not expire? Methodologies for security, 13. How does the human interaction work? Managing things manually, 14. Can we organise everything ourselves? Understanding what to do, 15. How long does it take to implement a proper PKI? Understanding the scale of the problem, 16. What skills are required for operational personnel? Understanding associated technologies, 17. How do we embed a PKI culture in the workplace? Communication, 18. How do we keep it working as we grow? Planning and documentation, 19. What happens if we acquire other companies? Merging public key infrastructures, 20. Who should be responsible for it all? Accountability, 21. PKI, the cloud and the Internet of things: What we should understand, 22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure, 23. PKI and government legislation: Ensuring that legislation is compatible, 24. Consequences: What happens when it all goes wrong
£33.24
Taylor & Francis Ltd Hidden in White Sight
Book SynopsisArtificial Intelligence was meant to be the great social equalizer that helps promote fairness by removing human bias from the equation, but is this true? Given that the policing and judicial systems can display human bias, this book explores how the technology they use can also reflect these prejudices.From healthcare services to social scoring in exams, to applying for and getting loans, AI outcomes often restrict those most in need of these services. Through personal stories from an esteemed Black Data Scientist and AI expert, this book attempts to demystify the algorithmic black box.AI pervades all aspects of modern society and affects everyone within it, yet its internal biases are rarely confronted. This book advises readers on what they can do to fight against it, including the introduction of a proposed AI Bill of Rights, whilst also providing specific recommendations for AI developers and technologists. https://hiddeninwhitesight.com/ Trade Review"An excellent book…is every day life, practical, visionary, and opens unique thoughts and ways to solving pervasive daily problems."--Antonio Smith Sr., Technologist, Serial Entrepreneur, Leader, Author, Inventor, Mentor, Activist"This book a must read. It can be used to educate those in the impacted communities, the developers and companies on the issues, and any interested party. It emphasizes the urgent need to address them now. If not, this country – and our global society – may sustain some of our systemic racial structures. It is a call to action to address the issues and enable AI/ML to fulfill its true promise; becoming a major impetus to improving our global quality of life."—Sandra K. Johnson, Ph.D., CEO, SKJ Visioneering; Former CEO IBM Central, East and West Africa"As technology becomes a driver in delivering government services, it is essential that the technologists, policy makers and leaders understand the value and risks of this evolving world. Government technology leaders must be at the forefront of establishing the guideposts for the fair and equitable use of technology that impacts the citizens and businesses that they support. Hidden in White Sight provides valuable insights on the impact of technology decisions that are being made today but more importantly, what technology leaders must do in the future."--Teri Takai, Senior Vice President, Center for Digital Government; Former State and Federal CIO."As a white, middle-aged senior executive who has mentored Calvin on how to navigate the corporate world and was mentored by Calvin on how to better engage with the Black community, when Calvin first told me he wanted to write a book about AI from his perspective, that of a black man who grew up in urban America and Urban Atlanta, I thought it was a fabulous idea for so many reasons. We discussed making the book approachable even to people without a technical degree. Possibly even to uneducated populations. It is important that the less educated and non-technical population, especially from the black and brown community, understand how AI impacts their lives every day - in some ways innocuous, and in others that impact their health, their wealth, and their livelihood….After reading the book, I was pleasantly stunned by how he was able to convey highly technical challenges and opportunities of AI from real-world examples from his friends and community members. This is a must-read for any person of color, but perhaps more important for the white community to read to begin to empathize with the challenges of the black community…Remember AI is just math and math is not intrinsically biased or hurtful, the math learns from the data that enshrines all the bad, hateful, and harmful decisions of the white community in the past. This is a must-read for all."—Seth Dobrin, Ph.D., President, Responsible AI Institute, CEO, Trustwise AI"An excellent book…is every day life, practical, visionary, and opens unique thoughts and ways to solving pervasive daily problems."--Antonio Smith Sr., Technologist, Serial Entrepreneur, Leader, Author, Inventor, Mentor, Activist"An excellent book…is every day life, practical, visionary, and opens unique thoughts and ways to solving pervasive daily problems."--Antonio Smith Sr., Technologist, Serial Entrepreneur, Leader, Author, Inventor, Mentor, Activist"As a white, middle-aged senior executive who has mentored Calvin on how to navigate the corporate world and was mentored by Calvin on how to better engage with the Black community, when Calvin first told me he wanted to write a book about AI from his perspective, that of a black man who grew up in urban America and Urban Atlanta, I thought it was a fabulous idea for so many reasons. We discussed making the book approachable even to people without a technical degree. Possibly even to uneducated populations. It is important that the less educated and non-technical population, especially from the black and brown community, understand how AI impacts their lives every day - in some ways innocuous, and in others that impact their health, their wealth, and their livelihood. I was hopeful that he would be able to achieve these goals, but skeptical even Calvin could achieve this. After reading the book, I was pleasantly stunned by how he was able to convey highly technical challenges and opportunities of AI from real-world examples from his friends and community members. This is a must-read for any person of color, but perhaps more important for the white community to read to begin to empathize with the challenges of the black community, especially those that have risen from being very economically challenged to those who have spent their life better off, but are still impacted by the systemic and structural racism that is embedded in the data used to train past and the current version of AI. Remember AI is just math and math is not intrinsically biased or hurtful, the math learns from the data that enshrines all the bad, hateful, and harmful decisions of the white community in the past. This is a must-read for all."-- Dr Seth Dobrin, PhD, President, Responsible AI Institute, CEO, Trustwise AI"As technology becomes a driver in delivering government services, it is essential that the technologists, policy makers and leaders understand the value and risks of this evolving world. Government technology leaders must be at the forefront of establishing the guideposts for the fair and equitable use of technology that impacts the citizens and businesses that they support. Hidden in White Sight provides valuable insights on the impact of technology decisions that are being made today but more importantly, what technology leaders must do in the future."--Teri Takai, Senior Vice President, Center for Digital Government; Former State and Federal CIO.Table of ContentsChapter 1: Listening Ears, Chapter 2: The Racist Algorithm, Chapter 3: The American Dream, Chapter 4: AI Gone Wild, Chapter 5: An Enduring Legacy, Chapter 6: Our Authentic Selves, Chapter 7: Mass Unemployment, Chapter 8: Medically Induced Trauma, Chapter 9: Colored Ads, Chapter 10: Weapons of Mass Destruction, Chapter 11: Designers’ Dilemma, Chapter 12: Corporate Choice, Chapter 13: Algorithmic Justice
£21.84
Taylor & Francis Ltd Hidden in White Sight
Book SynopsisArtificial Intelligence was meant to be the great social equalizer that helps promote fairness by removing human bias from the equation, but is this true? Given that the policing and judicial systems can display human bias, this book explores how the technology they use can also reflect these prejudices.From healthcare services to social scoring in exams, to applying for and getting loans, AI outcomes often restrict those most in need of these services. Through personal stories from an esteemed Black Data Scientist and AI expert, this book attempts to demystify the algorithmic black box.AI pervades all aspects of modern society and affects everyone within it, yet its internal biases are rarely confronted. This book advises readers on what they can do to fight against it, including the introduction of a proposed AI Bill of Rights, whilst also providing specific recommendations for AI developers and technologists. https://hiddeninwhitesight.com/ Trade Review"An excellent book…is every day life, practical, visionary, and opens unique thoughts and ways to solving pervasive daily problems."--Antonio Smith Sr., Technologist, Serial Entrepreneur, Leader, Author, Inventor, Mentor, Activist"This book a must read. It can be used to educate those in the impacted communities, the developers and companies on the issues, and any interested party. It emphasizes the urgent need to address them now. If not, this country – and our global society – may sustain some of our systemic racial structures. It is a call to action to address the issues and enable AI/ML to fulfill its true promise; becoming a major impetus to improving our global quality of life."—Sandra K. Johnson, Ph.D., CEO, SKJ Visioneering; Former CEO IBM Central, East and West Africa"As technology becomes a driver in delivering government services, it is essential that the technologists, policy makers and leaders understand the value and risks of this evolving world. Government technology leaders must be at the forefront of establishing the guideposts for the fair and equitable use of technology that impacts the citizens and businesses that they support. Hidden in White Sight provides valuable insights on the impact of technology decisions that are being made today but more importantly, what technology leaders must do in the future."--Teri Takai, Senior Vice President, Center for Digital Government; Former State and Federal CIO."As a white, middle-aged senior executive who has mentored Calvin on how to navigate the corporate world and was mentored by Calvin on how to better engage with the Black community, when Calvin first told me he wanted to write a book about AI from his perspective, that of a black man who grew up in urban America and Urban Atlanta, I thought it was a fabulous idea for so many reasons. We discussed making the book approachable even to people without a technical degree. Possibly even to uneducated populations. It is important that the less educated and non-technical population, especially from the black and brown community, understand how AI impacts their lives every day - in some ways innocuous, and in others that impact their health, their wealth, and their livelihood….After reading the book, I was pleasantly stunned by how he was able to convey highly technical challenges and opportunities of AI from real-world examples from his friends and community members. This is a must-read for any person of color, but perhaps more important for the white community to read to begin to empathize with the challenges of the black community…Remember AI is just math and math is not intrinsically biased or hurtful, the math learns from the data that enshrines all the bad, hateful, and harmful decisions of the white community in the past. This is a must-read for all."—Seth Dobrin, Ph.D., President, Responsible AI Institute, CEO, Trustwise AI"An excellent book…is every day life, practical, visionary, and opens unique thoughts and ways to solving pervasive daily problems."--Antonio Smith Sr., Technologist, Serial Entrepreneur, Leader, Author, Inventor, Mentor, Activist"An excellent book…is every day life, practical, visionary, and opens unique thoughts and ways to solving pervasive daily problems."--Antonio Smith Sr., Technologist, Serial Entrepreneur, Leader, Author, Inventor, Mentor, Activist"As a white, middle-aged senior executive who has mentored Calvin on how to navigate the corporate world and was mentored by Calvin on how to better engage with the Black community, when Calvin first told me he wanted to write a book about AI from his perspective, that of a black man who grew up in urban America and Urban Atlanta, I thought it was a fabulous idea for so many reasons. We discussed making the book approachable even to people without a technical degree. Possibly even to uneducated populations. It is important that the less educated and non-technical population, especially from the black and brown community, understand how AI impacts their lives every day - in some ways innocuous, and in others that impact their health, their wealth, and their livelihood. I was hopeful that he would be able to achieve these goals, but skeptical even Calvin could achieve this. After reading the book, I was pleasantly stunned by how he was able to convey highly technical challenges and opportunities of AI from real-world examples from his friends and community members. This is a must-read for any person of color, but perhaps more important for the white community to read to begin to empathize with the challenges of the black community, especially those that have risen from being very economically challenged to those who have spent their life better off, but are still impacted by the systemic and structural racism that is embedded in the data used to train past and the current version of AI. Remember AI is just math and math is not intrinsically biased or hurtful, the math learns from the data that enshrines all the bad, hateful, and harmful decisions of the white community in the past. This is a must-read for all."-- Dr Seth Dobrin, PhD, President, Responsible AI Institute, CEO, Trustwise AI"As technology becomes a driver in delivering government services, it is essential that the technologists, policy makers and leaders understand the value and risks of this evolving world. Government technology leaders must be at the forefront of establishing the guideposts for the fair and equitable use of technology that impacts the citizens and businesses that they support. Hidden in White Sight provides valuable insights on the impact of technology decisions that are being made today but more importantly, what technology leaders must do in the future."--Teri Takai, Senior Vice President, Center for Digital Government; Former State and Federal CIO.Table of ContentsChapter 1: Listening Ears, Chapter 2: The Racist Algorithm, Chapter 3: The American Dream, Chapter 4: AI Gone Wild, Chapter 5: An Enduring Legacy, Chapter 6: Our Authentic Selves, Chapter 7: Mass Unemployment, Chapter 8: Medically Induced Trauma, Chapter 9: Colored Ads, Chapter 10: Weapons of Mass Destruction, Chapter 11: Designers’ Dilemma, Chapter 12: Corporate Choice, Chapter 13: Algorithmic Justice
£54.14
CRC Press The Privacy Leader Compass
Book Synopsis#1 bestselling privacy book from Taylor & Francis in 2023 and 2024!Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your company. Or maybe you are an experienced CPO/DPO, and you wonder â what can I learn from other successful privacy experts to be even more effective? Or perhaps you are considering a move from a different career path and deciding if this is the right direction for you.Seasoned award-winning Privacy and Cybersecurity leaders Dr. Valerie Lyons (Dublin, Ireland) and Todd Fitzgerald (Chicago, IL USA) have teamed up with over 60 award-winning CPOs, DPOs, highly respected privacy/data protection leaders, data protection authorities, and privacy standard setters who have fought the tough battle.Just as the #1 best-selling and CANON Cybersecurity Hall of Fame winning CISO Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers boTable of ContentsSECTION I. THE PRIVACY LEADER ROADMAP, 1. The Privacy Landscape: Context and Challenges, 2. The McKinsey 7-S Framework Applied to Privacy Leadership, SECTION II. STRATEGY, 3. Developing an Effective Privacy Program Strategy, SECTION III. STRUCTURE, 4. The Privacy Organization Structure, SECTION IV. SYSTEMS, 5. Privacy Frameworks, Standards, and Certifications, 6. Privacy Risk Governance, SECTION V. SHARED VALUES, 7. Privacy and Data Protection: Laws and Principles, 8. Privacy Ethics, and Responsible Privacy, SECTION VI. STAFF, 9. Forging and Maintaining Effective Privacy Teams, SECTION VII. SKILLS, 10. The Privacy Leader’s Key Skills, SECTION VIII. STYLE, 11. Privacy Leadership Styles, SECTION IX. CONCLUSION, 12. Privacy Leadership: Beyond This Book?
£40.84
Taylor & Francis Ltd The Psychology of Insider Risk
Book SynopsisClinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. After a career in counterterrorism, Dr. Shaw spent the last 20 years concentrating on insidersemployees who commit espionage, sabotage, intellectual property theft, present risks of harm to self and others, and other workplace risks, especially those influenced by mental health conditions.Dr. Shaw is the author of the Critical Pathway to Insider Risk (CPIR) which addresses the characteristics, experiences and connections at-risk employees bring to our organizations, the stressors that trigger higher levels of risk, the concerning behaviors that signal this risk has increased and the action or inaction by organizations that escalate insider risk. The CPIR also examines what these employees look like when they have broken bad and the personalTable of ContentsIntroduction.Chapter 1: Three Cases, Three Roles.Chapter 2: Overview of The Critical Pathway to Insider Risk (CPIR) Framework.Chapter 3: Special Drivers Down the Pathway—Disgruntlement, Personality and Problematic Organizational Responses.Chapter 4: Investigative Tools—the CPIR Risk Score.Chapter 5: Psycholinguistic Tools.Chapter 6: Case Study of Cyber Extortion and Mass Destruction Violence Risk.Chapter 7: Putting Together the CPIR and Psycholinguistics—Corporate Leaks and Erotomania.Chapter 8: Detecting Dangerous Extremism Versus Conspiracy Beliefs.Chapter 9: Reflections, Summary and Challenges.Additional References.Index.
£40.84
Taylor & Francis Ltd Global Digital Data Governance
Book SynopsisThis book provides a nuanced exploration of contemporary digital data governance, highlighting the importance of cooperation across sectors and disciplines in order to adapt to a rapidly evolving technological landscape. Most of the theory around global digital data governance remains scattered and focused on specific actors, norms, processes, or disciplinary approaches. This book argues for a polycentric approach, allowing readers to consider the issue across multiple disciplines and scales.Polycentrism, this book argues, provides a set of lenses that tie together the variety of actors, issues, and processes intertwined in digital data governance at subnational, national, regional, and global levels. Firstly, this approach uncovers the complex array of power centers and connections in digital data governance. Secondly, polycentric perspectives bridge disciplinary divides, challenging assumptions and drawing together a growing range of insights about the complexities of digitTable of Contents1. Introduction: Polycentric Perspectives on Digital Data Governance PART I Perspectives 2. Nudging the Ostroms’ Vision of the Commons on Polycentric Governance into the Digital Environment 3. Internet Interoperability and Polycentric Attributes in Global Digital Data Ordering 4. The Challenges of Governance in a Datascape: Theorizing the Role of Non-extractive Methodologies in the 2030 Agenda 5. Grassroots Data Activism and Polycentric Governance: Perspectives from the Margins 6. Questions as a Device for Data Responsibility: Making Data Science Responsible by Formulating Questions in a Polycentric Way PART II Controversies 7. Decentralized but Coordinated: Probing Polycentricity in EU Data Protection Cross-border Enforcement 8. Trade Agreements and Cross-border Disinformation: Patchwork or Polycentric? 9. Trackers and Chasers: Governance Challenges in Disinformation Datafication 10. Privacy Governance from a Polycentric Perspective PART III Technologies 11. Global Data Governance by Internet Interconnection 12. The Distributions of Distributed Governance: Power, Instability and Complexity in Polycentric Data Ordering 13. Polycentric Theory Diffusion and AI Governance 14. Conclusion: The End of a Beginning
£35.14
Taylor & Francis Ltd Living with Digital Surveillance in China
Book SynopsisDigital surveillance is a daily and all-encompassing reality of life in China. This book explores how Chinese citizens make sense of digital surveillance and live with it. It investigates their imaginaries about surveillance and privacy from within the Chinese socio-political system.Based on in-depth qualitative research interviews, detailed diary notes, and extensive documentation, Ariane Ollier-Malaterre attempts to de-Westernise' the internet and surveillance literature. She shows how the research participants weave a cohesive system of anguishing narratives on China's moral shortcomings and redeeming narratives on the government and technology as civilising forces. Although many participants cast digital surveillance as indispensable in China, their misgivings, objections, and the mental tactics they employ to dissociate themselves from surveillance convey the mental and emotional weight associated with such surveillance exposure.The book is intended for academics Trade Review‘Surveillance operated by the Chinese Social Credit system has attracted much criticism from Western countries but few trouble to discover how Chinese people themselves understand and respond to surveillance. Living with Digital Surveillance engages directly, through vivid interviews, with Chinese citizens in three cities, showing how their surveillance imaginaries display distinctive features. A sensitive and illuminating contribution to our understanding of both Chinese and surveillance studies.’ Prof. David Lyon, Queen's University, Canada‘Living with Digital Surveillance in China is an essential resource for anyone interested in digital surveillance in China. It provides insightful analysis that will help students, scholars and practitioners better understand how authorities in China use digital technologies for social governance and how Chinese citizens live with it. The book draws from multiple literatures and rich fieldwork to shed light on citizens’ attitudes, behavior, and narratives regarding digital surveillance. It is an important reminder that surveillance practices must be analyzed within a country’s historical, socioeconomic and political context. This lively book is a must-read for the times we live in.’Prof. Genia Kostka, Institute for Chinese Studies, Freie Universität Berlin, Germany‘Surveillance has become ever more a fact of daily life in China, and a necessary object of study to understand the evolving ways in which the Communist Party of China governs society. However, lacking from view has been the way in which Chinese individuals see and engage with this surveillance state. In Living with Digital Surveillance in China, Ariane Ollier-Malaterre paints a rich and complex picture that will be of interest to China scholars and surveillance specialists in equal measure.’Prof. Rogier Creemers, Modern Chinese Studies, Leiden University, The Netherlands‘Amidst persistent misunderstandings of China’s social credit systems, Living with Digital Surveillance in China provides a much needed, empirically grounded, and innovative account of Chinese citizens’ narratives of technology and surveillance as well as their coping strategies. Ollier-Malaterre carefully documents how certain hegemonic ideas of techno-nationalism such as the identity narrative of national humiliation and technological solutionism are reproduced and negotiated in everyday life, shaping citizens’ surveillance imaginaries. This book will be a valuable read for those who are interested in critical approaches to surveillance studies that challenge Eurocentric epistemology and center the agency and lived lives of communities beyond the West.’Prof. Chenchen Zhang, Durham University, UKTable of ContentsIntroduction; PART I Privacy, surveillance, and the social credit systems; 1 Privacy and surveillance; 2 Surveillance in China: from Dang’an and Hukou to the social credit systems; PART II Anguishing narratives of moral shortcomings; 3 Rules and monitoring will raise people’s ‘moral quality’; 4 National humiliations and the civilisation dream; 5 Saving face: privacy as hiding shameful information; PART III Redeeming narratives of digital protection ; 6 The government as protection and order; 7 Technology as a magic bullet; PART IV The mental and emotional weight of surveillance; 8 Mental tactics to dissociate oneself from surveillance; 9 Misgivings and objections; 10 Self-censorship; 11 Conclusion
£35.14
Taylor & Francis Ltd Ethnomethodological Conversation Analysis in
Book SynopsisThis volume discusses current and emerging trends in Ethnomethodological Conversation Analysis (EMCA). Focusing on step-by-step procedures of talk and interaction in real time, EMCA explores how people through locally-produced, public, and common-sensical practices accomplish activities together and thereby make sense and create social order as part of their everyday lives.The volume is divided into four parts, and it provides a timely methodological contribution by exploring new questions, settings, and recording technologies in EMCA for the study of social interaction. It addresses the methodical diversity in EMCA, including current practices as well as those testing its boundaries, and paves the way for the development of future interaction research. At the same time, the book offers readers a glimpse into the ways in which human and non-human participants operate with each other and make sense of the world around them. The authors represent diverse fields of research, sTrade ReviewThe field of ethnomethodological conversation analysis (“EMCA”), like the people whose interactions EMCA researchers investigate, is in motion. This important collection showcases cutting-edge approaches in the quest to understand the multimodal, embodied, and material domains of social interaction – while critically addressing fundamental questions about what EMCA research is, should, and can be.Elizabeth Stokoe, London School of Economics and Political Science, UKTable of ContentsList of ContributorsAcknowledgementsIntroduction 1. Tiina Eilittä, Pentti Haddington, Antti Kamunen, Laura Kohonen-Aho, Tuire Oittinen, Iira Rautiainen & Anna Vatanen. Ethnomethodological conversation analysis in motion: An introductionPart 1 – Exploring ‘being a member’ 2. Federico Rossano. How to study interactional history in non-human animals? Challenges and opportunities3. Hannah Pelikan. Transcribing human-robot interaction: Methodological implications of participating machines4. Brian Due. Ocularcentric participation frameworks: Dealing with a blind member’s perspectivePart 2 – Broadening analyst’s access to member’s perspective by using various video materials5. Iuliia Avgustis & Florence Oloff. Collecting and analysing multi-source video data: Grasping the opacity of smartphone use in face-to-face encounters6. Laura Kohonen-Aho & Pentti Haddington. From distributed ecologies to distributed bodies in interaction: Capturing and analyzing ‘dual embodiment’ in virtual environments7. Pirkko Raudaskoski. 360-cameras used by a team participating in a mobile gathering Part 3 – Augmenting analyses of member’s perspective with multiple research materials and methods 8. Antti Kamunen, Tuire Oittinen, Iira Rautiainen & Pentti Haddington. Inductive approach in EMCA: The role of accumulated ethnographic knowledge and video based observations in studying crisis management training9. Joe Blythe, Francesco Possemato, Josua Dahmen, Caroline de Dear, Rod Gardner & Lesley Stirling. A satellite view of spatial points in conversation10. Melisa Stevanovic. EMCA informed experimentation as a way of investigating (also) “non-accountable” interactional phenomena Part 4 – Enhancing transparency of analytical processes 11. Paul McIlvenny & Jacob Davidsen. Beyond Video: Using Practice-based VolCap Analysis to Understand Analytical Practices Volumetrically 12. Eric Laurier & Tobias Boelt Back. Recurrent problems and recent experiments in transcribing video: live transcribing in data sessions and depicting perspectiveIndex
£37.99
Taylor & Francis Ltd SecurityFirst Compliance for Small Businesses
Book SynopsisOrganizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization's attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements.This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Starting from the premise that with security comes compliance, this book starts by defining security-first and then walking readers through the process of creating a holistic security and compliance program.Table of ContentsChapter 1 Into the Mind of a Malicious ActorChapter 2 Reviewing the Compliance LandscapeChapter 3 Compliance RiskChapter 4 Looking at Risk through a Security LensChapter 5 How to Set ControlsChapter 6 Continuous MonitoringChapter 7 Vendor Risk Management: Securing the Supply ChainChapter 8 Calculating the Total Cost of ComplianceChapter 9 Information Security Audit: The What, How, and Why Chapter 10 Cyber Liability InsuranceChapter 11 Cybersustai nability: Ethical Data Handling for Corporate ResponsibilityChapter 12 Magic 8 Ball Says "Yes"
£42.74
Taylor & Francis Ltd Becoming a Computational Thinker
Book SynopsisThis book has a single purpose: to help everyone become computational thinkers. Computational thinking (CT) is thinking informed by the digital age, and a computational thinker is someone who can apply that thinking everywhere and anywhere. Through practical examples and easy-to-grasp terminology, this book is a guide to navigating the digital world and improving one's efficiency, productivity, and success immediately.Given its pervasiveness, knowledge and experience of computation is a cornerstone of productivity, and improved thinking will lead to advances in every aspect of one's life. In this way, CT can be thought of as the mutual reinforcement of thinking and knowledge of computation in the digital age. Comprising a rich collection of self-contained articles that can be read separately, and illustrated by pictures, images and article-end crossword puzzles, this book is an engaging and accessible route to Becoming a Computational Thinker' and achieving Success in the DigTable of ContentsPrefaceComputational Thinking: An Introduction1. Everyday Computational Thinking Can Save Lives2. Digital Technologies in the COVID-19 Fight3. The Metamorphosis of TV4. Smart About Smartphones5. Cyber Security – How Not to Be a Fish6. Computers: More Than Meets the Eye7. Home Sweet Homepage :-)8. Cloud Computing for Everyone9. A Pattern Here and a Pattern There10. AI: Aiming for Intelligence11. Let’s Chat About AI12. A World of 1’s and 0’s13. Secrets of the Can-Do Machine14. Encryption in the Digital Age15. Bitcoin Is No Coin16. Central Bank Digital Currency17. Logic & Logical Thinking18. 1 Plus 1 Equals 1019. Cache – Efficiency Thinking20. Time for Location, Location, Location21. Face to Face with the Interface22. Protocols Are Interface Rules23. Computer Programming by Chickens and Rabbits24. Don’t Stop – Do It Again!25. Internet of What? Things!26. Chips Are Everywhere27. Problem Solving: Algorithmic & Recursive28. Problem Solving: Backtracking & Heuristics29. Problem Solving: Paradigms & Applications30. Parallel Computing: Ways to CooperateBecoming a Computational Thinker: A SummaryIndex
£35.14
Taylor & Francis Ltd Digital Technologies for Sustainable Futures
Book SynopsisThis book critically examines the interplay between digitalization and sustainability. Amid escalating environmental crises, some of which are now irreversible, there is a noticeable commitment within both international and domestic policy agendas to employ digital technologies in pursuit of sustainability goals.This collection gathers a multitude of voices interrogating the premise that increased digitalization automatically contributes to greater sustainability. By exploring the planetary links underpinning the global digital economy, the book exposes the extractive logics ingrained within digital capitalism and introduces alternatives like digital degrowth and the circular economy as viable, sustainable paths for the digital era. Through a combination of theoretical reflections and detailed contextual analyses from Italy, New Zealand, and the UKincluding initiatives in participatory planning and technology co-designit articulates the dual role of digital technology: its po
£34.19
Taylor & Francis Ltd Cyber Resilience in Critical Infrastructure
Book SynopsisCritical infrastructure sectors are those whose assets, systems, and networks, whether physical or virtual, are deemed so important to nations that their incapacitation or destruction would have a crippling effect on national security, national economic security, national public health or safety, or any combination of these. Each country might define their unique critical infrastructure. In this book, we compiled nine critical infrastructure sectors: Emergency Services, Energy, Finance, Food, Government, Health, Telecommunications, Transport, and Water. The continuity of services in these sectors is vital for the daily lives of societies and economies. This study introduces 49 case studies from various parts of the world.This book investigates Cyber Resilience in Critical Infrastructure by paying attention to recommending a national-level cyber resilience framework for all nations to use. Furthermore, we present sectoral analysis and case studies for each infrastructTable of Contents1. Critical Infrastructure and Cyber Resilience Frameworks. 2. Emergency Services Sector. 3. Energy Sector. 4. Finance Sector. 5. Food Sector. 6. Government Sector. 7. Healthcare Sector. 8. Telecommunications Sector. 9. Transportation Sector. 10. Water Sector. 11Conclusion. Index.
£42.74
Taylor & Francis Ltd Cross Reality XR and Immersive Learning
Book SynopsisThis timely volume highlights the novel ways in which cutting-edge virtual and augmented reality (VR and AR) technology is being used in STEM education.Today, there are many exciting advances occurring in Immersive Learning Environments (ILEs) and innovative applications in STEM education. Recent breakthroughs in technologies such VR, AR, and Mixed Reality (MR) as well as Cross Reality (XR) that leverages VR, AR, and MR are finally making it feasible for educators in STEM to adopt ILEs in their classrooms in a scalable manner. Edited by experienced XR researchers in STEM education, Wang, Ryoo, and Winkelmann, the book focuses on the use of ILEs for creating experiences that excite, inspire, and engage learners in STEM disciplines. Chapters include research studies and practical applications addressing the challenges and opportunities associated with adopting technologies. This book covers the entire spectrum of immersive platform types and ILEs such as desktop, mobile, wearabTable of ContentsIntroduction: Cross Reality (XR) and Immersive Learning Environments (ILE) in education 1. Team-based mobile learning supported by an intelligent system: case study of STEM students 2. Probability learning in mathematics using augmented reality: impact on students’ learning gains and attitudes 3. Reply to which post? An analysis of peer reviews in a high school SPOC 4. The SOR (stimulus-organism-response) paradigm in online learning: an empirical study of students’ knowledge hiding perceptions 5. Design and implementation of data collection mechanism for 3D design course based on xAPI standard 6. Learning gains and attitudes of students performing chemistry experiments in an immersive virtual world 7. Investigating high school students’ perceptions and presences under VR learning environment
£128.25
CRC Press Foundations of Artificial Intelligence and
Book SynopsisArtificial intelligence (AI) is a complicated science that combines philosophy, cognitive psychology, neuroscience, mathematics and logic (logicism), economics, computer science, computability, and software. Meanwhile, robotics is an engineering field that compliments AI. There can be situations where AI can function without a robot (e.g., Turing Test) and robotics without AI (e.g., teleoperation), but in many cases, each technology requires each other to exhibit a complete system: having smart robots and AI being able to control its interactions (i.e., effectors) with its environment. This book provides a complete history of computing, AI, and robotics from its early development to stateâofâtheâart technology, providing a roadmap of these complicated and constantly evolving subjects.Divided into two volumes covering the progress of symbolic logic and the explosion in learning/deep learning in natural language and perception, this second volume goes more inâdepth into the his
£85.49
CRC Press AI for Humanitarianism
Book SynopsisThis book explores the transformative potential of artificial intelligence (AI) in addressing critical humanitarian challenges. It examines AIâs role in enhancing emergency responses, poverty alleviation, and healthcare.Chapters authored by a diverse group of international contributors cover topics such as AIâs application in disease prediction, ethical AI practices, and innovative resource distribution. This book uniquely blends theoretical insights with practical case studies, providing a road map for leveraging AI in humanitarian efforts. Readers will benefit from detailed explorations of AIâs capabilities and challenges, gaining insights into how AI can drive social change and improve global humanitarian outcomes.Targeted at policymakers, researchers, practitioners, and anyone interested in the intersection of AI and humanitarianism, this book offers valuable perspectives on ensuring AI technologies are both advanced and ethically sound.
£46.54
CRC Press Using Blockchain Technology in Healthcare
Book Synopsis
£46.54
CRC Press Optimal Spending on Cybersecurity Measures
Book SynopsisThe aim of this book is to demonstrate the use of business- driven risk assessments to meet the requirements within privacy laws. This book introduces the cyber risk investment model and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of privacy and data protection laws. This can be used by various stakeholders involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organizationâs risk management decision- making process to demonstrate the mechanisms in place to fund cybersecurity measures to meet privacy laws and demonstrates the application of the process using two case studies: CatchMyData and Rapid Cloud Migration. This book also discusses the elements used within the cybersecurity risk management process and defines a strategic approach to minimize cybersecurity risks. Features Aims to strengthen the readerâs understanding of industry
£42.74
CRC Press Offensive and Defensive Cyber Security Strategies
Book SynopsisThe aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks.
£28.49
CRC Press Insecure Digital Frontiers
Book SynopsisInsecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize. From the shadows of cybercriminal exploits to the sophisticated dance of advanced persistence threats, this book delves into the vulnerabilities that define our interconnected world. With a panoramic lens, the book navigates through the challenges and opportunities that shape the global cybersecurity landscape, offering readers a comprehensive understanding of the insecurities that permeate our digital existence.Insecure Digital Frontiers is not just a book; it is an exploration of the insecurities that define our digital age. It matters because it goes beyond the surface, unraveling the complexities of cyber threats while providing actionable insights for individuals, organizations, and policymakers. In a world where the digital frontier is both a promise and a peril, this book serves a
£42.74
Taylor & Francis Digital Identity in the Age of Big Tech
Book SynopsisAn accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and the implications it can have.Each of us has a digital identity, compiled of multiple identities, which has been built over the years as we have interacted with various technologies and apps. This book explores how the data generated through these online activities is used by third parties to form our digital identity and how this identity can then determine where we live, what job we have, what we buy, who we vote for, what healthcare we can access, and much more. Featuring real-world examples, discussion questions and activities throughout, the book aims to help students understand the impact of their digital identity on everyday life. By understanding how technologies are used by apps, businesses, governments and third parties, they can then begin to manage their digital identity and regain control of the way they are represented to the world.An important guide to digital identity for undergraduate students, this book will be especially useful to those studying topics such as big data and society, digital literacy, media and communication, social media and society, and beyond.
£37.99
CRC Press Sustainable DualTrack Development
£47.49
CRC Press Embedded Software Development for SafetyCritical Systems Third Edition
Book SynopsisSafety-critical devices, whether medical, rail, automotive or industrial are dependent on the correct operation of sophisticated software. Many standards describe how such systems should be designed, built and verified. Developers who previously had to know only how to program devices for their industry must now understand and deploy additional development practices and be prepared to justify their work to external assessors. The third edition of Embedded Software Development for Safety-Critical Systems is about the creation of dependable embedded software. It is written for system designers, implementers and verifiers who are experienced in general embedded software development, but who are now facing the prospect of developing a software-based system for safety-critical applications. In particular, it is aimed at those creating a product that must satisfy one or more of the international standards relating to safety critical applications, including IEC 61508, ISO 26262, EN 50716, UL 4600, ISO 21448, ISO/PAS 8800 or IEC 62304.This book has evolved from a course text used by QNX for a three-day training module on building embedded software for safety-critical systems Although it describes open source tools for most applications, it also provides enough information for you to seek out commercial vendors if thatâs the route you decide to pursue. All of the techniques described in this book may be further explored through several hundred references to articles that the author has personally found helpful as a professional software developer. Almost all of these references are available for free download.
£104.50
Edward Elgar Publishing Ltd Financial Services Law and Distributed Ledger
Book SynopsisTable of ContentsContents: 1 Introduction to Financial Services Law and Distributed Ledger Technology PART I THE NATURE AND USE OF DISTRIBUTED LEDGER TECHNOLOGY IN FINANCIAL SERVICES 2 Blockchain and distributed ledger technology 3 Digital assets and the token economy 4 The application of DLT in financial services: Benefits and use cases 5 Risks and the regulatory issues arising from the use of DLT PART II THE FINANCIAL SERVICES REGULATORY FRAMEWORK 6 Financial services regulation Part 1: The proprietary status of cryptoassets 7 Financial services regulation Part 2: The regulated activities 8 Financial services regulation Part 3: Other applicable provisions PART III REGULATING SPECIFIC USE CASES 9 Regulating trade in securities tokens 10 Cryptoassets in payments and payment services 11 Crypto lending platforms 12 Decentralised insurance PART IV JURISDICTION AND REMEDIES 13 Jurisdiction and applicable law 14 Dispute resolution and remedies 15 Conclusion: Regulating distributed ledger technology through financial services law
£171.00
Edward Elgar Publishing Ltd Research Handbook on the Law of Artificial
Book SynopsisTable of ContentsContents: Forward: Curtis E. A. Karnow Part I Introduction to Law and Artificial Intelligence 1. Towards a Law of Artificial Intelligence Woodrow Barfield 2. Accelerating AI John O. McGinnis 3. Finding the Right Balance in Artificial Intelligence and Law L. Thorne McCarty 4. Learning Algorithms and Discrimination Nizan Packin and Yafit Lev-Aretz 5. The Principal Japanese AI and Robot Strategy and Research Toward Establishing Basic Principles Fumio Shimpo Part II Regulation of Artificial Intelligence 6. Artificial Intelligence and Private Law Shawn Bayern 7. Regulation of Artificial Intelligence John Frank Weaver 8. Legal Personhood in the Age of Artificially Intelligent Robots Robert van den Hoven van Genderen 9. Autonomous Driving: Regulatory Challenges Raised by Artificial Decision-Making and Tragic Choices Antje von Ungern-Sternberg Part III Fundamental Rights and Constitutional Law Issues 10. Artificial Intelligence and Privacy- AI Enters the House Through the Cloud Ronald Leenes and Silvia De Conca 11. Future Privacy: A Real Right to Privacy for Artificial Intelligence S. J. Blodgett-Ford 12. Artificial Intelligence and the First Amendment Toni M. Massaro and Helen Norton 13. Data Algorithms and Privacy in Surveillance: On Stages, Numbers, and the Human Factor Arno R. Lodder and Ronald P. Loui 14. The Impact of AI on Criminal Law, and its Twofold Procedures Ugo Pagallo and Serena Quattrocolo Patrt IV Intellectual Property 15. The Law of Artificial Intelligence Intellectual Property Jeremy A. Cubert and Richard G. A. Bone 16. Kinematically Abstract Claims in Surgical Robotics Patents Andrew Chin 17. Artificial Intelligence and the Patent System: Can a New Tool Render a Once Patentable Idea Obvious? William Samore 18. Thinking Machines and Patent Law Liza Vertinsky 19. Artificial Intelligence and the Creative Industry: New Challenges for the EU Paradigm for Art and Technology by Autonomous Creation Madeleine de Cock Buning Part V Applications of Artificial Intelligence 20. Free Movement of Algorithms: Artificially Intelligent Persons Conquer the European Union’s Internal Market Thomas Burri 21. The Artificially Intelligent Internet of Things and Article 2 of the Uniform Commercial Code Stacy-Ann Elvy 22. Artificial Intelligence and Robotics, the Workplace, and Workplace-Related Law Isabelle Wildhaber 23. Robotics Law 1.0: On Social System Design for Artificial Intelligence Yueh-Hsuan Weng 24. Antitrust, Algorithmic Pricing and Tacit Collusion Maurice E. Stucke and Ariel Ezrachi 25. Robots in the Boardroom: Artificial Intelligence and Corporate Law Florian Möslein Index
£44.60
Edward Elgar Publishing Research Handbook on the Law of Artificial
Book SynopsisThis second edition provides a broad range of perspectives on the legal implications of artificial intelligence (AI) across different global jurisdictions. Contributors identify the potential threats that AI poses to the protection of rights and human wellbeing, anticipating future developments in technological and legal infrastructures.
£280.25
Edward Elgar Publishing Ltd Hashtags and Trade Marks
Book SynopsisTrade Review‘With a focus on US and German law, Aslani’s analysis of the legal protection of hashtags highlights persistent problems of doctrinal incoherence and inconsistency in two very different trade mark regimes. While providing scholarly rigor and depth, Hashtags and Trade Marks: A Comparative Legal Approach also offers practical solutions and a taxonomy of hashtag categories that will assist lawyers, judges, and administrative authorities dealing with real-world questions of registration and scope of protection for these unconventional marks. The implications of this multifaceted study could reach beyond the example of hashtags alone; as the opportunities afforded by digital technology exercise their profound influence on human relations in every sphere, the principles outlined in this book may well be applied to as-yet unimagined modes of future communication.’ -- Barbara Lauriat, Texas Tech University, US‘This is a must read for anyone who has an interest in hashtags and trademark law. A very timely, first-of-its kind publication, this insightful work covers three crucial jurisdictions, the US, the EU and Germany to unpack the underlying fundamental issues of freedom of expression, competition and trade mark protection in the current information space.’ -- Frederick Mostert, King’s College London, UKcTable of ContentsContents: PART I #SETTINGTHESTAGE: FOUNDATIONS, ANCESTRY AND TAXONOMY OF HASHTAGS 1 Introduction: hashtags as trade marks and trade marks as hashtags 2 Ancestry and uses of hashtags PART II NAVIGATING THE HASHTAG LEGAL LANDSCAPE: IN-DEPTH ANALYSIS 3 Registered rights and hashtags 4 Hashtag mark infringement 5 Defences/fair use PART III CLOSING ARGUMENTS: REACHING A CONCLUSION 6 Conclusion: addressing the conundrum of hashtag trade marks Index
£100.00
Edward Elgar Publishing Decentralized Autonomous Organizations in the
Book Synopsis
£138.56
CRC Press Auditing Artificial Intelligence
Book SynopsisArtificial Intelligence (AI) is revolutionizing industries, yet its rapid evolution presents unprecedented challenges in governance, ethics, and security. Auditing Artificial Intelligence is an essential guide for IT auditors, information security experts, and risk management professionals seeking to understand, evaluate, and mitigate AI-related risks.This book provides a structured framework for auditing AI systems, covering critical areas such as governance, compliance, algorithm transparency, ethical accountability, and system performance. With 24 insightful chapters, it explores topics including: AI Governance & Ethics â Establishing frameworks to ensure fairness, accountability, and transparency in AI deployments. Risk Management & Compliance â Addressing the legal and regulatory landscape, including GDPR, the EU AI Act, and ISO standards. Bias & Trustworthiness â Evaluating AI decision-making to detect bias and ensure equitable outcomes. Security & Continuous Monitoring â Safeguarding AI systems from adversarial attacks and ensuring operational consistency. Model Performance & Explainability â Assessing AI outputs, refining accuracy, and ensuring alignment with business objectives.Designed for professionals tasked with assessing AI systems, this book combines practical methodologies, industry standards, and real-world audit questions to help organizations build responsible and resilient AI practices and assess associated risks. Whether you are assessing AI governance, monitoring AI-driven risks, or ensuring compliance with emerging regulations, this handbook provides the guidance you need to navigate and assess the complexities of AI systems with confidence.Stay ahead in your role and responsibility for assessing the rapidly evolving deployment and use of AI across the organization â equip yourself with the knowledge and tools to ensure its responsible, safe, approved, secure, and ethical use.
£42.74
Cambridge University Press Monitoring Laws
Book SynopsisOur world and the people within it are increasingly interpreted and classified by automated systems. At the same time, automated classifications influence what happens in the physical world. These entanglements change what it means to interact with governance, and shift what elements of our identity are knowable and meaningful. In this cyber-physical world, or ''world state'', what is the role for law? Specifically, how should law address the claim that computational systems know us better than we know ourselves? Monitoring Laws traces the history of government profiling from the invention of photography through to emerging applications of computer vision for personality and behavioral analysis. It asks what dimensions of profiling have provoked legal intervention in the past, and what is different about contemporary profiling that requires updating our legal tools. This work should be read by anyone interested in how computation is changing society and governance, and what it is aboutTrade Review'Jake Goldenfein's brilliant and theoretically sophisticated reconstruction of legal identity in the era of automated profiling serves notice to our would-be digital overlords: the days when they could imagine that legal and policy frameworks were too hopelessly outdated to keep up are over. Monitoring Laws is a crucial contribution to contemporary discussions of privacy and profiling that provides the conceptual and historical resources for developing a regulatory regime that protects personal identity and legal rights in an era of ubiquitous monitoring.' Mark Andrejevic, Monash University'How thrilling it is to read a work that stretches ideas of what legal thought and practice have been, and what they might yet become. Monitoring Laws is such a book. In captivating, pellucid prose, Jake Goldenfein retells the story of two centuries of profiling practice - from photography to neural nets, from dossiers to data analytics - and the legal, representational and relational thinking imbricated therein. Throughout, Goldenfein shows, legal notions of identity have been modulated, challenged and reworked along with developments in surveillance technology. And those notions may yet still be, he shows, by thinking juridically with data, rather than through, against, or in spite of our contemporary informational existence. To the broad range of readers likely to find this book of interest, Goldenfein urges paying close attention to how the world and we who live here are being structured and actioned informationally, and extending our thinking about legal subjects accordingly. And once one does attend to this book's thoughtful refiguring of the stakes of digital surveillance, it is indeed hard to look away.' Fleur Johns, University of New South Wales, Sydney'You are being observed, monitored and profiled in more areas of life than you know. In this brilliant book, Jake Goldenfein explains the history and theory of the laws of monitoring, and provides a roadmap to the future. If you want to understand how we got to this point, and what's at stake in a panoptical society, then you need to read this book.' Dan Hunter, Executive Dean, Queensland University of TechnologyTable of Contents1. Monitoring laws; 2. The image and institutional identity; 3. Images and biometrics: privacy and stigmatization; 4. Dossiers, behavioural data, and secret speculation; 5. Data subject rights and the importance of access; 6. Automation, actuarial identity, and law enforcement informatics; 7. Algorithmic accountability and the statistical legal subject; 8. From image to computer vision: identity in the world state; 9. Person, place, and contest in the world state; 10. Law and legal automation in the world state; Index.
£26.09
Taylor & Francis Ltd Walling Out the Insiders
Book SynopsisInsider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.Table of Contents1. Introduction: How This Book Will Help to Build a Security Philosophy and Strategy. 2. Identifying What to Protect and Who to Protect It from. 3. Developing a Plan to Improve Security and Reduce the Insider Threat. 4. Increasing Awareness, Diligence, and Vigilance. 5. Developing Policies and Training Employees. 6. Evaluating Security Services and Security Products. 7. Establishing an Identification Program for Employees, Business Partners, Customers, and Other Visitors. 8. Implementing Strong Access Controls. 9. Managing Relationships with Vendors, Business Partners, and Customers. 10. Developing Methods to Monitor Security Threats and Needs. 11. Investigating and Responding to Security Incidents.12. Using Surveillance Technologies and Techniques. 13. What to Do When Hiring New Employees. 14. Conducting Periodic Reviews of Security and Threats.
£66.49