This book examines the effect of Information Technology on our lives, illustrating how a lack of proper social control over …
Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of …
An accessible synthesis of ethical issues raised by artificial intelligence that moves beyond hype and nightmare scenarios to address concrete …
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called …
Craft ethical AI projects with privacy, fairness, and risk assessment features for scalable and distributed systems while maintaining explainability and …
This book introduces a Responsible AI framework and guides you through processes to apply at each stage of the machine …
A New York Times Bestseller An audacious, irreverent investigation of human behavior—and a first look at a revolution in the …
Reimagining transparency and secrecy in the era of digital data When total data surveillance delimits agency and revelations of political …
You are under surveillance right now.Your cell phone provider tracks your location and knows who’s with you. Your online and …
Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your …
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even …
I was tasked with building an online course in Cyber security for a major online university, and was assigned the …
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits …
Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have …
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible …
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It …
Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, …
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or …
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second …
With a foreword by Bill GatesFrom Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful …
Faced with the exponential development of Big Data and both its legal and economic repercussions, we are still slightly in …
This book presents cutting edge research on the new ethical challenges posed by biomedical Big Data technologies and practices. ‘Biomedical …
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and …
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice …
This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice …
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy …