This book examines the effect of Information Technology on our lives, illustrating how a lack of proper social control over …
Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of …
An accessible synthesis of ethical issues raised by artificial intelligence that moves beyond hype and nightmare scenarios to address concrete …
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called …
Craft ethical AI projects with privacy, fairness, and risk assessment features for scalable and distributed systems while maintaining explainability and …
This book introduces a Responsible AI framework and guides you through processes to apply at each stage of the machine …
A New York Times Bestseller An audacious, irreverent investigation of human behavior—and a first look at a revolution in the …
Reimagining transparency and secrecy in the era of digital data When total data surveillance delimits agency and revelations of political …
You are under surveillance right now.Your cell phone provider tracks your location and knows who’s with you. Your online and …
The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational …
Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your …
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even …
I was tasked with building an online course in Cyber security for a major online university, and was assigned the …
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits …
Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have …
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible …
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It …
Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, …
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or …
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second …
With a foreword by Bill GatesFrom Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful …
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, …
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they …
This book provides insight and expert advice on the challenges of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for …
Faced with the exponential development of Big Data and both its legal and economic repercussions, we are still slightly in …
This book presents cutting edge research on the new ethical challenges posed by biomedical Big Data technologies and practices. ‘Biomedical …
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and …
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice …
This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice …
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy …
Silent Virtuesaddresses six areas of mental functioning namely patience, curiosity, privacy, intimacy, humility, and dignity. Each of the areas is …
Issues (Editions)YearIssue2020Volume: ??????2019Volume: 8234Volume: ??????2018Volume: 812Volume: 7134Volume: 6342017Volume: 6123Volume: 52342016Volume: 512Volume: 4242015Volume: 41Volume: 342014Volume: 3123Volume: 232013Volume: 212
Issues (Editions)YearIssue2021Volume: 1612020Volume: 1512342019Volume: 1412342018Volume: 1312342017Volume: 1212342016Volume: 111/2342015Volume: 1012342014Volume: 912342013Volume: 812342012Volume: 712342011Volume: 612/342010Volume: 512/342009Volume: 41/2342008Volume: 312342007Volume: 21/23/42006Volume: 11/23/4