Privacy and data protection Books
Business Science Reference Handbook of Research on Intelligent Data
Book SynopsisIntelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research.The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.
£282.00
HarperCollins Spooked: The Trump Dossier, Black Cube, and the
Book Synopsis
£26.24
Edward Elgar Publishing Ltd Identified, Tracked, and Profiled: The Politics
Book SynopsisRevealing the politics underlying the rapid globalization of facial recognition technology (FRT), this topical book provides a cutting-edge, critical analysis of the expanding global market for FRT, and the rise of the transnational social movement that opposes it.With the use of FRT for policing, surveillance, and business steadily increasing, this book provides a timely examination of both the benefits of FRT, and the threats it poses to privacy rights, human rights, and civil liberties. Interviews with analysts and activists with expertise in FRT find that the anti-FRT movement is highly uneven, with disproportionate influence in Western democracies and relatively little influence in authoritarian states and low-income countries in the developing world. Through a global analysis of the uptake and regulation of FRT, chapters create a holistic understanding of the politics behind this technology. Concluding with a look towards the future prospects of FRT in the face of the growing size, reach, and power of its opposition, the book reflects more broadly on the power of transnational social movements and civil society activism to prevent the globalization and normalization of new technologies.A visionary exploration of FRT, this book will be invaluable to students and scholars of politics and policy, alongside activists, stakeholders, and policy makers interested in the growing power of social movements to resist new technology.Trade Review‘Facial recognition technologies (FRT) are spreading rapidly worldwide, and have become embedded in numerous everyday government and corporate practices. This widespread adoption has prompted extensive criticism, particularly from civil society groups concerned about human rights abuses and discriminatory impacts for marginalized and vulnerable communities. In Identified, Tracked, and Profiled, Peter Dauvergne provides a much-needed and thoroughly comprehensive overview of the regulatory issues and policy disputes around FRT. This book is essential reading for those interested in political contests over our changing digital landscape.’ -- Ron Deibert, University of Toronto, CanadaTable of ContentsContents: PART I INTRODUCTION 1. Introducing facial recognition technology 2. Resisting the normalization of facial recognition PART II REINING IN FACIAL RECOGNITION TECHNOLOGY 3. The movement to oppose facial recognition 4. The politics of facial recognition bans in the United States 5. Regulating facial recognition in the United States 6. Rising global opposition to face surveillance PART III THE GLOBAL POLITICAL ECONOMY OF FACIAL RECOGNITION 7. The corporate politics of facial recognition 8. The everyday politics of facial recognition in China 9. The globalization of facial recognition technology PART IV CONCLUSIONS 10. The future of facial recognition technology Appendix: interviews Index
£69.35
Berghahn Books The Politics of Personal Information:
Book Synopsis In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation. During this era of cultural change and political polarization, the expansion, bureaucratization, and computerization of population surveillance disrupted the norms that had governed the exchange and use of personal information in earlier decades and gave rise to a set of distinctly postindustrial social conflicts centered on the use of personal information as a means of social governance in the welfare state. Combining vast archival research with a groundbreaking theoretical analysis, this book gives a definitive account of the politics of personal information in West Germany at the dawn of the information society.Trade Review “This is an important book crafted by a master of intellectual history. It will be widely consumed and discussed among German historians and a wide range of intellectuals interested in the origins of the modern surveillance state. Essential.” • Choice “This book unites disparate episodes in West German history into a careful and illuminating exploration of Germans’ attitudes toward the privacy of their own personal data, the changing implications for those attitudes as technological capacity expands, and the very conception of governmentality as the state inescapably can see more and more into the intimate lives of its citizens.” • Kenneth Ledford, Case Western Reserve University “Frohman has done a truly masterful job of capturing the debates around privacy and surveillance, demonstrating with the help of the West German case how these concepts have evolved alongside information technologies. For those looking for a path forward, a way out of the panopticon or Big Brother’s grasp, the book’s most vital contribution is its use of privacy not only to theorize the information state but to actively contest the new forms of power that state pursues.” • Karrin Hanshew, Michigan State UniversityTable of Contents List of Illustrations List of Abbreviations Acknowledgements Introduction: Surveillance, Privacy, and Power in the Information Society Part I: Population Registration, Power, and Privacy Chapter 1. The Federal Population Registration, Administrative Power, and the Politicization of Privacy Part II: Negotiating Communicative Norms in the Computer Age: The Information Question and the Federal Privacy Protection Law, 1970–1990 Chapter 2. Rethinking Privacy in the Age of the Mainframe: From the Private Sphere to Informational Self-Determination Chapter 3. The Legislative Path to the Federal Privacy Protection Law, 1970-77 Chapter 4. “Only Sheep Let Themselves Be Counted”: The 1983/87 Census Boycotts, the Census Decision, and the Question of Statistical Governance Chapter 5. Out of the Frying Pan and into the Fire: The Census Decision, Party Politics, and the Revision of the Federal Privacy Protection Law Part III: The Precautionary Turn: Security, Surveillance, and the Changing Nature of the State Chapter 6. Paper, Power, and Policing: The Federal Criminal Police on the Cusp of the Computer Age Chapter 7. The Quest for Security and the Meaning of Privacy: Computers, Networks, and the Securitization of Space, Place, Movement, and Identity Chapter 8. Mapping the Radical Milieu: Terrorism, Counterterrorism, and the New Police Surveillance Chapter 9. The Reform of Police Law: Datenschutz, the Defense of Law, and the Debate over Precautionary Surveillance Conclusion Selected Bibliography
£32.40
Byline Books The Little Black Book of Data and Democracy: From
Book Synopsis
£9.49
Byline Books The Little Black Book of Social Media
Book Synopsis
£9.49
Packt Publishing Limited CISA – Certified Information Systems Auditor
Book SynopsisThis CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA’s latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questionsKey Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization’s security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.Table of ContentsTable of Contents Audit Planning Audit Execution IT Governance IT Management Information Systems Acquisition and Development Information Systems Implementation Information System Operations Business Resilience Information Asset Security and Control Network Security and Control Public Key Cryptography and Other Emerging Technologies Security Event Management
£31.49
Pastor Publishing Ltd Cyber Incident Response
Book Synopsis
£35.38
IT Governance Publishing The Data Governance Imperative: A Business Strategy for Corporate Data
Book SynopsisAttention to corporate information has never been more important than now. The ability to generate accurate business intelligence, accurate financial reports and to understand your business relies on better processes and personal commitment to clean data. Every byte of data that resides inside your company, and some that resides outside its walls, has the potential to make you stronger by giving you the agility, speed and intelligence that none of your competitors yet have. Data governance is the term given to changing the hearts and minds of your company to see the value of such information quality. The Data Governance Imperative is a business person's view of data governance. This practical book covers both strategies and tactics around managing a data governance initiative. The author, Steve Sarsfield, works for a major enterprise software company and is a leading expert in data quality and data governance, focusing on the business perspectives that are important to data champions, front-office employees, and executives. Steve runs an award-winning and world-recognized blog called the Data Governance and Data Quality Insider, offering practical wisdom.Table of ContentsChapter 1: The need for Data Governance 20 Sins of the Past 21 Where Are The Metrics? 24 Unnecessary Complexity 26 ETL and Data Warehouse 27 Building More Efficiency 29 Reducing Risk and Improving Compliance 36 The Value of an Acquisition 30 Decisions Based on Gut 33 Data Governance and Being Green 33 Why Data Governance? 36 Who Needs Data Governance? 38 Chapter 2: What is data governance? 40 How do different groups see data governance? 40 Defining Data Governance by its Benefits 45 Chapter 3: Defining Data Governance Success 50 Generic Data Governance Success Factors 50 Specific Data Governance Success 55 Chapter 4: Getting Funded for IQ projects 57 The Data Champion 57 Return on Investment 61 Picking the Right Projects 62 Building Credibility 64 Leveraging a Crisis 64 Conversation Starters 65 The 'Do Nothing' Option 70 Overcoming Objections to Data Governance 71 Chapter 5: People - What does a data governance team look like? 77 Data Governance Roles and Responsibilities 77 Data Governance Council 80 Team Performance Goals 82 Methodologies 83 Chapter 6: Painting the Picture 86 Mission Statement 86 Communication Strategies 87 Having Productive Meetings 88 Getting the Data 93 Data Governance Workshops 94 Building a Useful Data Quality Scorecard 95 Views of Data Quality Scorecard 96 Which Key Metrics Do I Track? 97 chapter 7 - Fixing your data 114 Causes and Actions 114 Information Quality and Data Intensive Projects 121 The Six Phases of a Data Intensive Project 121 Phase One: Project Preparation 122 Phase Two: Making the Blueprint 126 Phase Three: Implement 131 Phase Four: Rollout Preparation 133 Phase Five: Go Live 136 Phase Six: Maintain 139 Chapter 8: technologies that support data governance 141 Types of Data Governance Technologies 142 PREVENTATIVE 142 Diagnostic and Health 145 Infrastructure 149 Enrichment 154 Chapter 9: WHAT'S NEXT 155 ITG Resources 157
£35.29
£6.62
Lycan Books A Simpler Guide to Online Security for Everyone:
Book Synopsis
£9.05
Urbane Publications Scams Security and OverSharing Controlling your
Book SynopsisThis book isnât about cybersecurity, itâs about life. Specifically, connected life in the 21st century. Itâs about the behaviours we need to change and the threats we need to be aware of to ensure that we can keep ourselves and our families as safe as possible in the new connected world.
£12.99
Scribe Publications We See It All: liberty and justice in the age of
Book SynopsisWhat are citizens of a free country willing to tolerate in the name of public safety? Jon Fasman journeys from the US to London — one of the most heavily surveilled cities on earth — to China and beyond, to expose the legal, political, and moral issues surrounding how the state uses surveillance technology. Automatic licence-plate readers allow police to amass a granular record of where people go, when, and for how long. Drones give the state eyes — and possibly weapons — in the skies. Algorithms purport to predict where and when crime will occur, and how big a risk a suspect has of reoffending. Specially designed tools can crack a device’s encryption keys, rending all privacy protections useless. And facial recognition technology poses perhaps a more dire and lasting threat than any other form of surveillance. Jon Fasman examines how these technologies help police do their jobs, and what their use means for our privacy rights and civil liberties, exploring vital questions, such as: Should we expect to be tracked and filmed whenever we leave our homes? Should the state have access to all of the data we generate? Should private companies? What might happen if all of these technologies are combined and put in the hands of a government with scant regard for its citizens’ civil liberties? Through on-the-ground reporting and vivid storytelling, Fasman explores one of the most urgent issues of our time.Trade Review‘[A] deeply reported and sometimes chilling look at mass surveillance technologies in the American justice system … Fasman avoids alarmism while making a strong case for greater public awareness and tighter regulations around these technologies. This illuminating account issues an essential warning about a rising threat to America’s civil liberties.’ * Publishers Weekly *‘A cogent critique of the age of ubiquitous surveillance … An urgent examination of police-state intrusions on the privacy of lawful and law-abiding citizens.’ * Kirkus Reviews *‘If you want to understand the stakes and the landscape of surveillance in your life — yes, yours right now — We See It All is an outstanding place to start. Fasman walks his readers through a meticulously balanced review of how police, corporations, local businesses, governments, and ordinary people conspire to exchange real privacy for the feeling of safety. An evocative storyteller, Fasman lays out his case that, because government regulation lags impossibly behind technological advances, the only salve for our predicament is collective awareness. And collective action. The writing is sober and sobering. And, though the recent fires of Minneapolis, Atlanta, Portland, and the nation have not centred squarely on surveillance, Fasman argues convincingly that the next ones very well might.’ -- Phillip Atiba Goff, co-founder and CEO of the Centre for Policing Equity, and professor of African American studies and psychology at Yale University‘This powerful, engrossing book will challenge your assumptions about persistent surveillance. Jon Fasman makes a clear case for civil liberties and explains how our laws and public safety infrastructure must keep pace with the advancement of technology. It's a must-read for anyone interested in the future and the unintended consequences of artificial intelligence, data, encryption and recognition technology.’ -- Amy Webb, founder of The Future Today Institute, author of The Big Nine and The Signals are Talking‘Jon Fasman has given us a stellar account of the use of surveillance technologies by the police. It's comprehensive, even-handed, informative, and fun to read.’ -- Barry Friedman, Jacob D. Fuchsberg professor at New York University School of Law‘This lively book is a call to action.’ -- David Anderson * Literary Review *‘Attempts to shake us out of our complacency … We See It All is a brutal reminder of the ‘perpetual’ surveillance powers of the police and government.’ -- Bernard E. Harcourt * TLS *Praise for The Unpossessed City: ‘Bestseller Fasman … takes a compassionate look at the hard truths of modern-day Russia in his absorbing second novel … The bio-thriller aspect of the plot provides a loose frame for Fasman's real concerns … and, more importantly, the trials and tribulations of the new Russia itself.’ * Publishers Weekly *Praise for The Geographer's Library: ‘A brainy noir … [A] winningly cryptic tale … [A] cabinet of wonders written by a novelist whose surname and sensibility fit comfortably on the shelf between Umberto Eco and John Fowles.’ * Los Angeles Times *Praise for The Geographer's Library: ‘One of the year's most literate and absorbing entertainments.’ -- Kirkus Reviews
£15.29
£11.21
Technics Publications LLC Audacity to Spy: How Government, Business &
Book SynopsisEver get the feeling you are being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet. The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalise their own services and to sell to other advertisers for behavioural marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasn''t enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users'' valuable personal and financial information. More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.
£17.84
Forefront Books The Secret to Cybersecurity: A Simple Plan to
Book Synopsis
£18.89
Springer Nature Switzerland AG Privacy and Identity Management. Fairness,
Book SynopsisThis book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological. Table of ContentsA Causal Bayesian Networks Viewpoint on Fairness.- Sharing is caring, a boundary object approach to mapping and discussing personal data processing.- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice.- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report.- Towards Empowering the Human for Privacy Online.- Trust and Distrust: On Sense and Nonsense in Big Data.- GDPR transparency requirements and data privacy vocabularies.- Glycos: the basis for a peer-to-peer, private online social network.- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved.- Privacy Patterns for Pseudonymity.- Implementing GDPR in the Charity Sector: A Case Study.- Me and My Robot! Sharing Information with a New Friend.- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change.- Is Privacy Controllable?.- Assessing Theories for Research on Personal Data Transparency.- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised?.- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency?
£62.99
Springer Nature Switzerland AG Face Recognition Technology: Compulsory
Book SynopsisThis book examines how face recognition technology is affecting privacy and confidentiality in an era of enhanced surveillance. Further, it offers a new approach to the complex issues of privacy and confidentiality, by drawing on Joseph K in Kafka’s disturbing novel The Trial, and on Isaiah Berlin’s notion of liberty and freedom. Taking into consideration rights and wrongs, protection from harm associated with compulsory visibility, and the need for effective data protection law, the author promotes ethical practices by reinterpreting privacy as a property right. To protect this right, the author advocates the licensing of personal identifiable images where appropriate.The book reviews American, UK and European case law concerning privacy and confidentiality, the effect each case has had on the developing jurisprudence, and the ethical issues involved. As such, it offers a valuable resource for students of ethico-legal fields, professionals specialising in image rights law, policy-makers, and liberty advocates and activists.Table of Contents
£82.49
Springer Nature Switzerland AG The CISO’s Transformation: Security Leadership in a High Threat Landscape
Book SynopsisThe first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. In our new cyber threat-saturated world, CISOs have begun to show their market value. Wall Street is more likely to reward companies with good cybersecurity track records with higher stock valuations. To ensure that security is always a foremost concern in business decisions, CISOs should have a seat on corporate boards, and CISOs should be involved from beginning to end in the process of adopting enterprise technologies.The second and third sections of this book focus on building strong security teams, and exercising prudence in cybersecurity. CISOs can foster cultures of respect through careful consideration of the biases inherent in the socio-linguistic frameworks shaping our workplace language and through the cultivation of cyber exceptionalism. CISOs should leave no stone unturned in seeking out people with unique abilities, skills, and experience, and encourage career planning and development, in order to build and retain a strong talent pool. The lessons of the breach of physical security at the US Capitol, the hack back trend, and CISO legal liability stemming from network and data breaches all reveal the importance of good judgment and the necessity of taking proactive stances on preventative measures. This book will target security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs. Risk personnel, CROs, IT, security auditors and security researchers will also find this book useful.Table of ContentsCISOs – Leading from the front!.- More CISOs on Corporate Boards.- Cyber program turnaround by a new CISO.- CISOs - the next step!.- CISO Maturity Model.- CISO guidance on some Emerging and Disruptive Technologies.- See Something, Do Something.- My journey as a writer.- Defensive measures in the wake of the SolarWinds fallout.- Cyber Exceptionalism.- Special Needs, Disability, and Cybersecurity: often, a great fit.- Bias-free lexicon.- The grass is not always greener on the other side.- Let not any outage go to waste.- If you can’t hire them, then develop them.- Should you accept Counteroffers?.- Importance of 1:1 Conversations.- The Cyber Hygiene Mantra.- Cybersecurity lessons from the breach of physical security at US Capitol building.- Protect society, the commonwealth, and the infrastructure - post COVID-19.- Self-Service Recovery Options for Bricked Windows Devices.- Certification and Accreditation.- Hack back or not.- CISOs need Liability Protection.- Enable Secure work-from-home.
£49.49
Springer Nature Switzerland AG Modern Socio-Technical Perspectives on Privacy
Book SynopsisThis open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.Table of Contents1. Introduction and Overview.- Part I: Privacy Theory and Methods.- 2. Privacy Theories and Frameworks.- 3. Revisiting APCO.- 4. Privacy and Behavioral Economics.- 5. The Development of Privacy Norms.- 6. Privacy Beyond the Individual Level.- Part II: Domains.- 7. Social Media and Privacy.- 8. Privacy-Enhancing Technologies.- 9. Tracking and Personalization.- 10. Healthcare Privacy.- 11. Privacy and the Internet of Things.- Part III: Audiences.- 12. Cross-Cultural Privacy Differences.- 13. Accessible Privacy.- 14. Privacy in Adolescence.- 15. Privacy and Vulnerable Populations.- Part IV: Moving Forward.- 16. User-Tailored Privacy.- 17. The Ethics of Privacy in Research and Design: Principles, Practices, and Potential.- 18. EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital Era.- 19. Reflections: Bringing Privacy to Practice.
£40.49
Springer Nature Switzerland AG Modern Socio-Technical Perspectives on Privacy
Book SynopsisThis open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.Table of Contents1. Introduction and Overview.- Part I: Privacy Theory and Methods.- 2. Privacy Theories and Frameworks.- 3. Revisiting APCO.- 4. Privacy and Behavioral Economics.- 5. The Development of Privacy Norms.- 6. Privacy Beyond the Individual Level.- Part II: Domains.- 7. Social Media and Privacy.- 8. Privacy-Enhancing Technologies.- 9. Tracking and Personalization.- 10. Healthcare Privacy.- 11. Privacy and the Internet of Things.- Part III: Audiences.- 12. Cross-Cultural Privacy Differences.- 13. Accessible Privacy.- 14. Privacy in Adolescence.- 15. Privacy and Vulnerable Populations.- Part IV: Moving Forward.- 16. User-Tailored Privacy.- 17. The Ethics of Privacy in Research and Design: Principles, Practices, and Potential.- 18. EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital Era.- 19. Reflections: Bringing Privacy to Practice.
£31.49
Springer International Publishing AG Big Data Privacy and Security in Smart Cities
Book SynopsisThis book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security. During the past five years, digital cities have been emerging as a technology reality that will come to dominate the usual life of people, in either developed or developing countries. Particularly, with big data issues from smart cities, privacy and security have been a widely concerned matter due to its relevance and sensitivity extensively present in cybersecurity, healthcare, medical service, e-commercial, e-governance, mobile banking, e-finance, digital twins, and so on. These new topics rises up with the era of smart cities and mostly associate with public sectors, which are vital to the modern life of people. This volume summarizes the recent advances in addressing the challenges on big data privacy and security in smart cities and points out the future research direction around this new challenging topic.Table of Contents1. Introduction.- 2. Deep Digital Identity for Big Data Privacy and Security.- 3. Behavioral Biometrics for Security in Smart Cities.- 4. Identity Spoofing and Cyber Attacks.- 5. Intrusion Detection via Deep Learning.- 6. Biometric Blockchain in e-Governance.- 7. e-Voting and Transparent Democracy.- 8. Secured e-Trading with Blockchain.- 9. Healthcare Biometric Blockchain.- 10. Medical Data and Security.- 11. Digital Passport.- 12. Social Smart Cities.- 13. Forensics and Legislation.- 14. Soft Border Control with Digital IDs.
£80.99
Springer International Publishing AG Artificial Intelligence and Cybersecurity: Theory and Applications
Book SynopsisThis book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity.During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies.Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference. Table of ContentsPart I Cybersecurity ConcernsUse of Artificial Intelligence in a Cybersecurity EnvironmentPetri Vähäkainu and Martti LehtoA Review of Cyber Threat (Artificial) Intelligence in SecurityManagementMartin Lundgren and Ali PadyabModel Based Resilience Engineering for Design and Assessment ofMission Critical Systems Containing AI ComponentsAutomation of CybersecurityWorkArtificial Intelligence for Cybersecurity Education and TrainingOffensive Machine Learning Methods and the Cyber Kill ChainDefensive Machine Learning Methods and the Cyber Defence Chain . Part II Privacy and EthicsDifferential Privacy: An Umbrella ReviewAI in Cyber Operations: Ethical and Legal Considerations for End-UsersPart III ApplicationsAndroid Malware Detection Using Deep LearningArtificial Intelligence Enabled Radio Signal IntelligenceDeep Learning Quantile Regression for Robustness, Confidence andPlanningModel Fooling Threats Against Medical Imaging
£125.99
Springer International Publishing AG Autonomous Intelligent Cyber Defense Agent
Book SynopsisThis book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA.Today’s cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they don’t plan and execute recovery activities. Response and recovery – core elements of cyber resilience – are left to human cyber analysts, incident responders and system administrators. This is about to change. The authors advocate this vision, provide detailed guide to how such a vision can be realized in practice, and its current state of the art.This book also covers key topics relevant to the field, including functional requirements and alternative architectures of AICA, how it perceives and understands threats and the overall situation, how it plans and executes response and recovery, how it survives threats, and how human operators deploy and control AICA. Additionally, this book covers issues of testing, risk, and policy pertinent to AICA, and provides a roadmap towards future R&D in this field.This book targets researchers and advanced students in the field of cyber defense and resilience. Professionals working in this field as well as developers of practical products for cyber autonomy will also want to purchase this book.Table of ContentsChapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and OverviewChapter. 2. Alternative Architectural ApproachesChapter. 3. Perception of EnvironmentChapter. 4. Perception of Cyber ThreatsChapter. 5. Situational Understanding and DiagnosticsChapter. 6. Learning about the AdversaryChapter. 7. Response PlanningChapter. 8. Recovery PlanningChapter. 9. Strategic Cyber CamouflageChapter. 10. Adaptivity & AntifragilityChapter. 11. Negotiation and CollaborationChapter. 12. Human InteractionsChapter. 13. Testing and MeasurementsChapter. 14. Deployment and OperationChapter. 15. Command in AICA-intensive OperationsChapter. 16. Risk ManagementChapter. 17. Policy IssuesChapter. 18. Development ChallengesChapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense AgentChapter. 20. Case Study B: AI Agents for Tactical EdgeChapter. 21. Case Study C: the Sentinel Agents
£123.49
Springer International Publishing AG Cognitive Security: A System-Scientific Approach
Book SynopsisThis book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker’s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields.Table of ContentsChapter. 1. IntroductionChapter. 2. System-Scientific MethodsChapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex SystemsChapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive VulnerabilitiesChapter. 5. ADVERT: Defending against Reactive Attention AttacksChapter. 6. RADAMS: Defending against Proactive Attention AttacksChapter. 7. Summary and Conclusions
£37.99
Springer International Publishing AG Continuous Biometric Authentication Systems: An
Book SynopsisThis book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable to devices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.Table of ContentsIntroduction.- Traditional Authentication.- Continuous Authentication.- Biometrics for Continuous Authentication.- Considerations and Challenges.- Conclusion.
£37.99
Springer International Publishing AG Cognitive Computing – ICCC 2023: 7th
Book SynopsisThis book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China, during December 17–18, 2023.The 9 full papers in this book were carefully reviewed and selected from 14 submissions. They are organized in topical sections as follows: Cognitive Computing Technologies and Infrastructure, Cognitive Computing Applications, Sensing Intelligence, Cognitive Analysis, Mobile Services, Cognitive Computing on Smart Home, and Cognitive Computing on Smart City.Table of ContentsResearch Track.- High-Precision Detection of Suicidal Ideation on Social Media Using Bi-LSTM and BERT Models.- P-Reader: A Clue-inspired Model for Machine Reading Comprehension.- An Unsupervised Method for Sarcasm Detection with Prompts.- ENER: Named Entity Recognition Model for Ethnic Ancient Books Based on Entity Boundary Detection.- An Enhanced Opposition-Based Golden-Sine Whale Optimization Algorithm.- T4S: Two-stage Screenplay Synopsis Summary Generation with Turning Points.- Application Track.- Multi-factor Water Level Prediction Based on InnRNN-Attention.- Ethereum Public Opinion Analysis Based on Attention Mechanism.- Prompt Tuning Models on Sentiment-Aware for Explainable Recommendation.
£42.74
Springer Malware
Book SynopsisPart I Theoretical foundation and modeling.- Chapter 1 Classifying Malware using Tensor Decomposition.- Chapter 2 Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks.- Chapter 3 Mathematical models for malware propagation: state of art and perspectives.- Chapter 4 Botnet Defense System: A System to Fight Botnets with Botnets.- Part II Machine learning for malware classification.- Chapter 5 Machine Learning-Based Malware Detection in a Production Setting.- Chapter 6 Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research.- Chapter 7 Conventional Machine Learning-based Android Malware Detectors.- Chapter 8 Conventional Machine Learning-based Android Malware Detectors.- Chapter 9 Method to automate the classification of PE32 malware using Word2vec and LSTM.- Part III Social and legal.- Chapter 10 The South African and Senegalese legislative response to malware facilitated cybercrime.- Chapter 11Malware as a Geopolitical Tool.-Part IV Malware analysis in practice and evasions.- Chapter 12 Advancements in Malware Evasion: Analysis Detection and the Future Role of AI.-Chapter 13 Unpacking malware in the real world: a step by step guide.- Chapter 14 Forensic Analysis of CapraRAT Android Malware.- Chapter 15 Hidden Realms: Exploring Steganography Methods in Games for Covert Malware Delivery.- Part V Malware ecosystem.- Chapter 16 The Malware as a Service ecosystem.- Chapter 17Preventing and detecting malware in smart environments. The smart home case.
£179.99
Springer Privacy Enhancing Techniques
Book Synopsis
£39.99
Springer International Publishing AG Differential Privacy and Applications
Book SynopsisThis book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications.Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis. Data publishing focuses on how to modify the original dataset or the queries with the guarantee of differential privacy. Privacy data analysis concentrates on how to modify the data analysis algorithm to satisfy differential privacy, while retaining a high mining accuracy. The authors also introduce several applications in real world applications, including recommender systems and location privacy Advanced level students in computer science and engineering, as well as researchers and professionals working in privacy preserving, data mining, machine learning and data analysis will find this book useful as a reference. Engineers in database, network security, social networks and web services will also find this book useful.Table of ContentsPreliminary of Differential Privacy.- Differentially Private Data Publishing: Settings and Mechanisms.- Differentially Private Data Publishing: Interactive Setting.- Differentially Private Data Publishing: Non-interactive Setting.- Differentially Private Data Analysis.- Differentially Private Deep Learning.- Differentially Private Applications: Where to Start?.- Differentially Private Social Network Data Publishing.- Differentially Private Recommender System.- Privacy Preserving for Tagging Recommender Systems.- Differential Location Privacy.- Differentially Private Spatial Crowdsourcing.- Correlated Differential Privacy for Non-IID Datasets.- Future Directions.
£116.99
Springer International Publishing AG Cinderella's Stick: A Fairy Tale for Digital
Book SynopsisThis book explains the main problems related to digital preservation using examples based on a modern version of the well-known Cinderella fairy tale. Digital preservation is the endeavor to protect digital material against loss, corruption, hardware/software technology changes, and changes in the knowledge of the community.Τhe structure of the book is modular, with each chapter consisting of two parts: the episode and the technical background. The episodes narrate the story in chronological order, exactly as in a fairy tale. In addition to the story itself, each episode is related to one or more digital preservation problems, which are discussed in the technical background section of the chapter. To reveal a more general and abstract formulation of these problems, the notion of pattern is used. Each pattern has a name, a summary of the problem, a narrative describing an attempt to solve the problem, an explanation of what could have been done to avoid or alleviate this problem, some lessons learned, and lastly, links to related patterns discussed in other chapters.The book is intended for anyone wanting to understand the problems related to digital preservation, even if they lack the technical background. It explains the technical details at an introductory level, provides references to the main approaches (or solutions) currently available for tackling related problems, and is rounded out by questions and exercises appropriate for computer engineers and scientists. In addition, the book's website, maintained by the authors, presents the contents of Cinderella's “real USB stick,” and includes links to various tools and updates.Trade Review“‘Cinderella’s Stick’ is an excellent book for all readers in research libraries. It provides the right concepts in a very smart and innovative way, and it underlines that the amount of digital information that we alone produce is immense and the challenges of fragility are here to stay.” (Giannis Tsakonas, Liber Quarterly, Vol. 29(1), 2019)Table of Contents1 A Few Words About Digital Preservation And Book Overview.- 2 The Fairy Tale Of Cinderella.- 3 Daphne (A Modern Cinderella).- 4 Reading the Contents of the USB Stick.- 5 First Contact with the Contents of the USB Stick.- 6 The File Poem.html: On Reading Characters.- 7 The File MyPlace.png: On Getting the Provenance of a Digital Object.- 8 The File todo.csv – On Understanding Data Values.- 9 The File destroyAll.exe: On Executing Proprietary Software.- 10 The File Mymusic.class: On Decompiling Software.- 11 The File yyy.java: On Compiling And Running Software.- 12 The File myFriendsBook.war: On Running Web Applications.- 13 The File roulette.BAS: On Running Obsolete Software.- 14 The Folder myExperiment: On Verifying and Reproducing Data.- 15 The File MyContacts.con: On Reading Unknown Digital Resources.- 16 The File SecretMeeting.Txt: On Authenticity Checking.- 17 The Personal Archive Of Robert: On Preservation Planning.- 18 The Meta-Pattern: Toward a Common Umbrella.- 19 How Robert Eventually Found Daphne.- 20 Daphne’s Dream.- 21 Epilogue.
£41.24
Springer Fachmedien Wiesbaden Privatheit und selbstbestimmtes Leben in der
Book SynopsisPrivatheit ist eine wichtige Grundlage für ein selbstbestimmtes Leben. In einer immer stärker vernetzten digitalen Welt ist sie von vielen Seiten bedroht. Die Beiträge des Buches untersuchen aktuelle Herausforderungen für Privatheit und Datenschutz aus multidisziplinärer Perspektive. Thematisiert wird dabei u.a., welche Rolle Privatheit in der Gesellschaft einnimmt, wie Bürger diese heute verstehen und wie sie mit den zunehmenden Angriffen darauf umgehen. Darüber hinaus befassen sich die Beiträge mit der europäischen Datenschutzpolitik und neuen Regelungsformen für einen wirksameren Datenschutz.Table of ContentsPrivatheit, Öffentlichkeit und digitales Leben.- Wandel rechtlicher Normen in der digitalen Welt.- Privatheit in Kommunikation und Wirtschaft.- Technische Ansätze zum Schutz von Privatheit.
£49.49
Springer Fachmedien Wiesbaden Grundrechtsschutz im Smart Car: Kommunikation,
Book SynopsisDie Integration von Fahrzeugtechnik, Informationstechnik und Kommunikation verändert den Charakter des Automobils und des Autofahrens von Grund auf. Vom Sinnbild für Eigentum und Bewegungsfreiheit, Individualität und Privatheit wird es durch die Vernetzung zum Bestandteil eines komplexen Mobilitätssystems und potenziell zum Objekt ständiger Überwachung. Die Beiträge analysieren Herausforderungen, erörtern Lösungen und entwerfen Gestaltungsvorschläge für Technik, Recht und Organisation vernetzten Fahrens.Table of ContentsGrundrechtskonflikte im vernetzten Fahrzeug.- Vertragsgestaltungen und Verantwortungserfüllung.- Verfügungs- und Nutzungsbefugnisse.- Das Auto im Internet und das Internet im Auto.- Sicherheitsgewährleistung und Datenschutz.- Ausländische Erfahrungen und Konzepte.
£62.99
Springer Fachmedien Wiesbaden Die Zukunft der Datenökonomie: Zwischen
Book SynopsisDigitale Daten gelten sowohl als Quelle für Wirtschaftswachstum, Innovation und Arbeitsplätze wie auch als Treiber der datenbasierten Reorganisation praktisch aller gesellschaftlichen Bereiche („Datafizierung“). Die datenökonomisch befeuerten Transformationsprozesse des Sozialen werfen dementsprechend vielfältige Fragen auf: Welche Daten sollen von wem wie verwertbar sein? Wie lässt sich legitime Verfügungsmacht gestalten? Usw. Der Band behandelt diese Fragen aus interdisziplinärer Perspektive.Trade Review“... Das Werk enthält vielmehr scharfe Analysen und innovative Gedanken renommierter Forscher unterschiedlichster Fachrichtungen. Damit lädt es nicht nur, wie es der Titel vermuten lässt, zu einem Blick in die Zukunft unserer „datengetriebenen“ Zeit, sondern vor allem auch zu einem Blick über den Tellerrand ein.” (Dr. Alexander Golland, in: DATENSCHUTZ - BERATER, Jg. 43, Heft 12, 2019)Table of ContentsDatenökonomische Geschäftsmodelle.- Kollektivgut & Gemeinwohl in der Datenökonomie.- Handlungsspielräume in der Datenökonomie.- Verfügungsmacht in der Datenökonomie.- Gestaltung der Datenökonomie.
£49.49
Springer Fachmedien Wiesbaden Informationssicherheit und Datenschutz
Book SynopsisIn diesem Buch werden die Anforderungen der EU-Datenschutz-Grundverordnung (EU-DSGVO) und des Informationssicherheitsmanagements eingeführt. Es wird aufgezeigt, welche wesentlichen Bestandteile für ein integriertes, einfaches und effektives Management-Instrumentarium erforderlich sind. Durch die Kombination mit Enterprise Architecture Management, IT-Servicemanagement und weiteren Disziplinen in ein integriertes Managementsystem kann die Wirksamkeit noch erhöht werden. Neben einer Einführung erhält der Leser Tipps und Tricks für die typischen Fallstricke in der Praxis sowie unmittelbar anwendbare Leitfäden und Empfehlungen – und dies kurz und prägnant. In der 2. Auflage wurden kleinere Fehler korrigiert. Table of ContentsEinleitung.- Herausforderungen in der Informationssicherheit und im Datenschutz.- Integriertes Managementsystem für Datenschutz und Informationssicherheit.- EAM & CMDB als Erfolgsfaktor für ein wirksames ISMS.
£9.99
Springer Fachmedien Wiesbaden Die Zukunft von Privatheit und Selbstbestimmung:
Book SynopsisDie in diesem Open-Access-Buch zusammengeführten interdisziplinären Untersuchungen des „Forums Privatheit“ gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal ändern. Nahezu jede Lebensregung hinterlässt Datenspuren, ermöglicht vielfältige und intensive Datensammlungen über Menschen, unterstützt Verhaltensbeeinflussungen und verstärkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die ökonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, ökonomisch und rechtlich gestaltet werden können, um Privatheit und Selbstbestimmung zu schützen.Table of ContentsEinleitung.- Neue Konzepte für den Grundrechtsschutz in der digitalen Welt.- Governance der EU-Datenschutzpolitik: Harmonisierung und Technikneutralität in und Innovationswirkung der DSGVO.- Zum Zusammenspiel zwischen Unternehmen und Verbrauchern in der Datenökonomie: Herausforderungen und neue Gestaltungsansätze.- Privatheit und Digitalität: Zur soziotechnischen Transformation des selbstbestimmten Lebens.- Privatheit, Ethik und demokratische Selbstregulierung in einer digitalen Gesellschaft.- Von Schutzbedürfnissen und Schutzverhalten: Einemedienpsychologische Analyse des individuellen Privatheitsschutzes.- Digitaler Fußabdruck.- Datenschutz und Privatheitsschutz durch Gestaltung der Systeme.
£31.49
Springer Fachmedien Wiesbaden Datenschutz: Einführung in technischen
Book SynopsisDieses Lehrbuch behandelt im ersten Teil schwerpunktmäßig technische Maßnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewährleistung von Anonymität im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen Überblick über gängige Verfahren des Identitätsmanagements (z. B. OpenID Connect) und die in elektronischen Ausweisdokumenten (z. B. im Personalausweis) verwendeten Sicherheitsmaßnahmen. Die Datenschutz-Garantien der vermittelten Ansätze werden im Detail behandelt. Im Bereich des World Wide Web erfährt der Leser, wo die Probleme aus Sicht des Datenschutzes liegen und wie diese Lücken geschlossen werden können. Anonyme Bezahlverfahren und eine Untersuchung von Bitcoin runden den technischen Teil des Buches ab. Der Leser lernt Ansätze aus der Praxis kennen, um so je nach Anforderungen in der Systementwicklung das passende Verfahren auswählen zu können.Im zweiten Teil werden die Grundlagen des Datenschutzrechts behandelt. Denn technische Maßnahmen sollen unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im Datenschutzrecht können technische Maßnahmen nicht richtig implementiert werden. Zum besseren Verständnis erfolgt ein Überblick über die Rechtsordnung insgesamt, in die das Datenschutzrecht eingeordnet wird. Betrachtet werden die europäische und die verfassungsrechtliche Dimension des Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der Datenschutz-Grundverordnung. Dabei werden auch besonders häufig vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das Webtracking erörtert. Beispielhaft werden datenschutzrechtliche Fälle bearbeitet.Trade Review“... Im rechtlichen Teil ist hervorzuheben, dass ... Grundlagen des Rechtsverständnisses zielgruppenbezogen für Informatikerinnen und Informatiker dargestellt werden. ... Es bildet die technischen Themen umfassend ab und bietet für das rechtliche Verständnis aktueller Fragestellungen eine solide Grundlage.” (Rudi Kramer, in: AWV-Informationen, 14. Februar 2023) Table of ContentsEinführung in den Technischen Datenschutz - Anonymitätsmaße - Anonymität im Internet - Identitätsmanagement - Anonymes Bezahlen und Bitcoin - Datenschutz im World Wide Web - Instant Messaging - Elektronische Ausweisdokumente - Weitere Privacy-Enhancing Technologies - Datenschutzrecht - Einführung in die Rechtsordnung - Wichtige Gesetze, wichtige Grundbegriffe - Erlaubte und unerlaubte Datenverarbeitungen, Rechtsgrundlagen - Rechenschaftspflicht - technische und organisatorische Maßnahmen (toM) - Betroffenenrechte (Auskunft, Kopie, Berichtigung, Löschung usw.) - Wichtige Verarbeitungssituationen (Videoüberwachung, Fotoaufnahmen, Tracking, Cloud Computing usw.) - Zertifizierung, Akkreditierung - Betriebliche Datenschutzbeauftragte - Datenschutz-Aufsichtsbehörde
£26.59
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Behind the Cloud: A Theory of the Private Without
Book SynopsisThoughts are free - but they are no longer secret. Today, our data is automatically stored and analyzed by algorithms ”behind the cloud” - where we no longer have control over our data. Our most private and secret information is entrusted to the internet and permanently collected, stacked and linked to our digital twins. With and without our consent. "Privacy is dead", as Mark Zuckerberg put it. The question is: How did we get there? And, if the actors behind the cloud know everything: what is still private today, and are there any personal secrets at all when the "gods" behind the cloud possibly know us better than our friends and family?The book uses a wealth of case studies (e.g. cryptocurrencies, journalism, digital traces of sexual preferences) to develop a typology of privacy in the history of ideas. Furthermore, it shows the areas of life in which big data and artificial intelligence have already made inroads. This book is a translation of the original German 2nd edition Die Rückseite der Cloud by Peter Seele and Lucas Zapf, published by Springer-Verlag GmbH Germany, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation.Table of ContentsIntroduction: The reverse side of the cloud.- Part 1: The secret private - introduction and derivation.- "Privacy is dead": How could it come to this?- Part 2: Symptoms of the structural change of the private.- Symptoms of an immanent digital omniscience.- Part 3: Theory of the structural change of the private.- Functional systematics of the structural change of the private.- Summary of the theory or: Thoughts are free - but no longer secret.- Conclusions.- Outlook: Digital authenticity - an immersive consumer experience.
£24.74
Books on Demand Nothing to hide?: Warum wir alle etwas zu
Book Synopsis
£9.52
Pentagon Press LLP Cyber Diplomacy
Book Synopsis
£37.99
Books on Demand Tor Anonymity Network 101: En introduktion til
Book Synopsis
£21.38
Bernan Distribution Data Stewardship and the Role of National
Book Synopsis
£25.46
HarperCollins India Private and Controversial: When Privacy and
Book SynopsisSet against the background of the COVID pandemic, creation of the National Digital Health Mission, and the ongoing debate on data protection, the collection of essays in Private and Controversial will explore the intersection between privacy and public health.
£18.27
Amsterdam University Press The Handbook of Privacy Studies: An
Book SynopsisThe Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and explains how to understand and properly evaluate them.The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes and debates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues.Trade ReviewThis new handbook represents an impressive attempt to summarise encyclopaedically the state of the art of relevant legal and social science knowledge on privacy in general. For a topic that is subject to constant mutations from intermittent technological change, and where cultural differences lead to dissimilar rules, perceptions and practices in different jurisdictions and different cultural communities, this is a tall order. The editors deserve credit and praise for having undertaken this unparalleled task - in a hardcopy publication on top of that. (...) The impressive breadth of this project makes it stand out; indeed, there seems to be no direct competition on the book market. - dr. J. Kornbeck, Journal of Data Protection & PrivacyTable of ContentsIntroduction - Bart van der Sloot & Aviva de Groot Chapter I Privacy from a Historical Perspective - Sjoerd Keulen & Ronald Kroeze Snippet I Legislating Privacy: Technology, Social Values, and Public Policy - Priscilla Regan Chapter II Privacy from a Legal Perspective - Bart van der Sloot Snippet II Three Dimensions of Privacy - Beate Roessler Chapter III Privacy from an Ethical Perspective - Marijn Sax Snippet III Nudging: A Very Short Guide - Cass R. Sunstein Chapter IV Privacy from an Economic Perspective - Edo Roos Lindgreen Snippet IV Security, Privacy, and the Internet of Things - Mikko Hypponen Chapter V Privacy from an Informatics Perspective - Matthijs Koot & Cees de Laat Snippet V Political Science and Privacy - Charles Raab Chapter VI Privacy from an Intelligence Perspective - Willemijn Aerdts & Giliam de Valk Snippet VI A privacy Doctrine for the Cyber Age - Amitai Etzioni Chapter VII Privacy from an Archival Perspective - Tjeerd Schiphof Snippet VII Medical Privacy: Where Deontology and Consequentialism Meet - Robin Pierce Chapter VIII Privacy from a Medical Perspective - Wouter Koelewijn Snippet VIII Privacy Law: on the Books and on the Ground - Kenneth A. Bamberger & Deirdre K. Mulligan Chapter IX Privacy from a Media Studies Perspective - Jo Pierson & Ine Van Zeeland Snippet IX Diversity and Accountability in Data-Rich Market - Viktor Mayer-Schönberger Chapter X Privacy from a Communication Science Perspective - Sandra Petronio Snippet X Still Uneasy: a Life with Privacy - Anita LaFrance Allen Chapter XI Privacy from an Anthropological Perspective - Sjaak van der Geest
£27.99
World Scientific Publishing Co Pte Ltd Code Based Secret Sharing Schemes: Applied
Book SynopsisSecret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.
£76.00
Springer Verlag, Singapore Personalized Privacy Protection in Big Data
Book SynopsisThis book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets.The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.Table of Contents· Chapter 1: Introductiono Privacy research landscape o Personalized privacy overview o Contribution of this book o Remainder of the book · Chapter 2: Current Methods of Privacy Protection o Cryptography based methods o Differential privacy methods o Anonymity-based methods o Clustering-base methods o Machine learning and AI methods · Chapter 3: Privacy Attacks o Attack classification o Rationale of the attacks o The comparison of attacks · Chapter 4: Personalize Privacy Defense o Personalized privacy in cyber-physical systems o Personalized privacy in social networks o Personalized privacy in smart city o Personalized privacy in location-based services o Personalized privacy on the rise · Chapter 5: Future Directions o Trade-off optimization o Decentralized privacy protection o Privacy-preserving federated learning o Federated generative adversarial nets · Chapter6: Summary and Outlook
£49.49
Springer Verlag, Singapore Privacy-Preserving Machine Learning
Book SynopsisThis book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.Table of ContentsIntroduction.- Secure Cooperative Learning in Early Years.- Outsourced Computation for Learning.- Secure Distributed Learning.- Learning with Differential Privacy.- Applications - Privacy-Preserving Image Processing.- Threats in Open Environment.- Conclusion.
£42.74
Springer Verlag, Singapore Privacy Preservation in IoT: Machine Learning
Book SynopsisThis book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates. Table of Contents· Chapter 1: Introduction o Privacy research landscape o Machine learning driven privacy preservation overview o Contribution of this monograph o Outline of the monograph · Chapter 2: Current Methods of Privacy Protection in IoTs o Cryptography based methods o Differential privacy methods o Anonymity-based methods o Clustering-based methods · Chapter 3: Decentralized Privacy Protection of IoTs using Blockchain-Enabled Federated Learning o Overview o System Modelling o Decentralized Privacy Protocols o Blockchain-enabled Federated Learning · Chapter 4: Personalized Privacy Protection of IoTs using GAN-Enhanced Differential Privacy o Overview o System Modelling o Personalized Privacy o GAN-Enhanced Differential Privacy · Chapter 5: Hybrid Privacy Protection of IoT using Reinforcement Learning o Overview o System Modelling o Hybrid Privacy o Markov Decision Process and Reinforcement Learning · Chapter 6: Future Directions o Trade-off optimization o Privacy preservation of digital twin o Privacy-preserving federated learning o Federated generative adversarial nets · Chapter 7: Summary and Outlook
£42.74