Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

"Security and Privacy From a Legal, Ethical, and Technical Perspective" ed. by Christos Kalloniatis, Carlos Travieso-Gonzalez

Posted By: exLib
"Security and Privacy From a Legal, Ethical, and Technical Perspective" ed. by Christos Kalloniatis, Carlos Travieso-Gonzalez

"Security and Privacy From a Legal, Ethical, and Technical Perspective" ed. by Christos Kalloniatis, Carlos Travieso-Gonzalez
ITExLi | 2020 | ISBN: 1838812067 9781838812065 1838812059 9781838812058 1838812075 9781838812072 | 202 pages | PDF | 13 MB

This book provides novel contributions and research efforts related to security and privacy by shedding light on the legal, ethical, and technical aspects of security and privacy. This book is perfect for both experienced readers and young researchers that wish to read about the various aspects of security and privacy.

Understanding and realizing the security and privacy challenges for information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems.
This book consists chapters divided in three groups.
The first contains works that discuss the ethical and legal aspects of security and privacy, the second contains works that focus more on the technical aspects of security and privacy, and the third contains works that show the applicability of various solutions in the aforementioned fields.


Contents
1.Legal Aspects of International Information Security
2.Ethical Issues in the New Digital Era: The Case of Assisting Driving
3.Social Media, Ethics and the Privacy Paradox
4.Security and Privacy in Three States of Information
5.The Role of Gamification in Privacy Protection and User Engagement
6.Risk Assessment in IT Infrastructure
7.Risks of Privacy-Enhancing Technologies: Complexity and Implications of Differential Privacy in the Context of Cybercrime
8.A Review of Several Privacy Violation Measures for Large Networks under Active Attacks
9.Beyond Differential Privacy: Synthetic Micro-Data Generation with Deep Generative Neural Networks
10.Machine Learning Applications in Misuse and Anomaly Detection
11.Multimodal Biometrics for Person Authentication
12.Hardware Implementation of Audio Watermarking Based on DWT Transform

1st true PDF with TOC BookMarkLinks