Listing 1 - 8 of 8 |
Sort by
|
Choose an application
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved.
Business --- Data processing --- Security measures. --- IT-Security --- Business Process Management --- Security and Privacy --- Process Security --- Compliance --- Process Automation --- Process Modeling --- Petri Net --- Process Mining --- Data Mining
Choose an application
big data networks --- cybersecurity and privacy --- data mining and management --- machine learning and artificial intelligence --- medicine and public health --- Big data --- Big Data. --- Data Mining. --- Text Mining --- Mining, Data --- Mining, Text --- Data Science --- Big Data --- Data sets, Large --- Large data sets --- Data sets --- data science --- data mining --- big data networks --- big data security and privacy --- big data in healthcare --- Big data. --- Data Management
Choose an application
machine learning security --- adversarial machine learning --- ai security --- anonymization and de-identification technologies --- cloud computing and security and privacy threats in the cloud --- information-theoretic security --- Computer security --- Seguridad informática --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy).
Computer Security. --- Data protection. --- Privacy, Right of. --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Law and legislation --- Protection --- Security measures --- Open Access --- Human and societal aspects of security and privacy --- Information systems applications --- Privacy policies --- Social networks --- Social network security and privacy --- Privacy-enhancing technologies --- Social aspects of computer privacy --- Dret a la intimitat --- Protecció de dades --- Seguretat informàtica
Choose an application
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.
Technology: general issues --- History of engineering & technology --- cybersecurity --- critical Infrastructures --- privacy preservation --- risk management --- big data --- Internet of Things --- blockchain --- cyber threats --- cyber security and privacy policy --- hybrid war --- cybercrime --- COVID-19 pandemic --- coronavirus --- smart grids --- cyber security modeling and simulation --- cyber–physical systems --- industrial control systems --- network security and protocols --- cyber threat intelligence --- resiliency and security of cyber systems --- hardware security solutions --- intrusion detection --- secure communication protocols --- malware analysis --- attribution of cyber attacks --- simulation and test beds for security evaluation of critical infrastructures --- cybersecurity --- critical Infrastructures --- privacy preservation --- risk management --- big data --- Internet of Things --- blockchain --- cyber threats --- cyber security and privacy policy --- hybrid war --- cybercrime --- COVID-19 pandemic --- coronavirus --- smart grids --- cyber security modeling and simulation --- cyber–physical systems --- industrial control systems --- network security and protocols --- cyber threat intelligence --- resiliency and security of cyber systems --- hardware security solutions --- intrusion detection --- secure communication protocols --- malware analysis --- attribution of cyber attacks --- simulation and test beds for security evaluation of critical infrastructures
Choose an application
This book is open access under a CC BY 4.0 license. This timely book addresses the conflict between globalism and nationalism. It provides a liberal communitarian response to the rise of populism occurring in many democracies. The book highlights the role of communities next to that of the state and the market. It spells out the policy implications of liberal communitarianism for privacy, freedom of the press, and much else. In a persuasive argument that speaks to politics today from Europe to the United States to Australia, the author offers a compelling vision of hope. Above all, the book offers a framework for dealing with moral challenges people face as they seek happiness but also to live up to their responsibilities to others and the common good. At a time when even our most basic values are up for question in policy debates riddled with populist manipulation, Amitai Etzioni’s bold book creates a new frame which introduces morals and values back into applied policy questions. These questions span the challenges of jobless growth to the unanswered questions posed by the role of artificial intelligence in a wide range of daily life tasks and decisions. While not all readers will agree with the communitarian solutions that he proposes, many will welcome an approach that is, at its core, inclusive and accepting of the increasingly global nature of all societies at the same time. It is a must read for all readers concerned about the future of Western liberal democracy. Carol Graham, Leo Pasvolsky Senior Fellow, The Brookings Institution and College Park Professor/University of Maryland In characteristically lively, engaging, and provocative style Etzioni tackles many of the great public policy dilemmas that afflict us today. Arguing that we are trapped into a spiral of slavish consumerism, he proposes a form of liberal communitarian that, he suggests, will allow human beings to flourish in changing circumstances. Jonathan Wolff, Blavatnik Chair of Public Policy, Blavatnik School of Government, University of Oxford.
Philosophy. --- Political communication. --- Political philosophy. --- Ethics. --- Social sciences --- Political sociology. --- Political Philosophy. --- Political Sociology. --- Social Philosophy. --- Political Communication. --- Moral Philosophy. --- Social philosophy --- Social theory --- Deontology --- Ethics, Primitive --- Ethology --- Moral philosophy --- Morality --- Morals --- Philosophy, Moral --- Science, Moral --- Philosophy --- Values --- Political philosophy --- Political communication --- Political science --- Mental philosophy --- Humanities --- Mass political behavior --- Political behavior --- Sociology --- Sociological aspects --- Social sciences-Philosophy. --- Social sciences—Philosophy. --- Liberal Communitarianism --- Populism --- Communitarian Economics --- The Common Good --- Security and Privacy --- Freedom of the Press --- Bioethics --- Politics
Choose an application
This book focuses on a variety of interdisciplinary perspectives concerning the theory and application of artificial intelligence (AI) in medicine, medically oriented human biology, and healthcare. The list of topics includes the application of AI in biomedicine and clinical medicine, machine learning-based decision support, robotic surgery, data analytics and mining, laboratory information systems, and usage of AI in medical education. Special attention is given to the practical aspect of a study. Hence, the inclusion of a clinical assessment of the usefulness and potential impact of the submitted work is strongly highlighted.
Technology: general issues --- History of engineering & technology --- computational intelligence --- medical assistance --- instance-based learning --- healthcare --- clinical decision support systems --- deep neural networks --- medical imaging --- backdoor attacks --- security and privacy --- COVID-19 --- gastric cancer --- endoscopy --- deep learning --- convolutional neural network --- brain --- pituitary adenoma --- dysembryoplastic neuroepithelial tumor --- DNET --- ganglioglioma --- digital pathology --- computer vision --- machine learning --- CNN --- ATLAS --- HarDNet --- Swin transformer --- segmentation --- U-Net --- cerebral infarction --- CycleGAN --- advanced statistics --- schizophrenia --- aggression --- forensic psychiatry --- medical image segmentation --- CT image segmentation --- kernel density --- semi-automated labeling tool --- Bayesian learning --- neuroimaging --- feature selection --- kernel formulation --- mental disorders --- MRI --- visual acuity --- fundus images --- ophthalmology --- SVM --- computational intelligence --- medical assistance --- instance-based learning --- healthcare --- clinical decision support systems --- deep neural networks --- medical imaging --- backdoor attacks --- security and privacy --- COVID-19 --- gastric cancer --- endoscopy --- deep learning --- convolutional neural network --- brain --- pituitary adenoma --- dysembryoplastic neuroepithelial tumor --- DNET --- ganglioglioma --- digital pathology --- computer vision --- machine learning --- CNN --- ATLAS --- HarDNet --- Swin transformer --- segmentation --- U-Net --- cerebral infarction --- CycleGAN --- advanced statistics --- schizophrenia --- aggression --- forensic psychiatry --- medical image segmentation --- CT image segmentation --- kernel density --- semi-automated labeling tool --- Bayesian learning --- neuroimaging --- feature selection --- kernel formulation --- mental disorders --- MRI --- visual acuity --- fundus images --- ophthalmology --- SVM
Choose an application
Medical informatics --- Health services administration --- Information storage and retrieval systems --- Medical Informatics. --- Medical informatics. --- Data processing --- Medical care --- Data processing. --- Medical care. --- Clinical informatics --- Health informatics --- Medical information science --- Computer Science, Medical --- Health Information Technology --- Informatics, Clinical --- Informatics, Medical --- Information Science, Medical --- Clinical Informatics --- Medical Computer Science --- Medical Information Science --- Health Information Technologies --- Information Technologies, Health --- Information Technology, Health --- Medical Computer Sciences --- Medical Information Sciences --- Science, Medical Computer --- Technologies, Health Information --- Technology, Health Information --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Health administration --- Health care administration --- Health care management --- Health sciences administration --- Health services management --- Administration --- Management --- Information science --- Medicine --- Medical records --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Health planning --- Public health administration --- Health Informatics --- Informatics, Health --- Computational Biology --- Biomedical Technology --- American Recovery and Reinvestment Act --- Data centers --- Clinical decision support design, development, and implementation --- E-health --- Healthcare --- Impact of HISI on public and social policy --- IT applications and measurements in health organizations and practices --- IT security and privacy issues --- Management of healthcare technologies --- M-health --- Role of informatics specialists --- Telemedicine --- Virtual health technologies --- Médecine --- Services de santé --- Informatique
Listing 1 - 8 of 8 |
Sort by
|