Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Choose an application
Online surveillance of our behavior by private companies is on the increase, particularly through the Internet of Things and the increasing use of algorithmic decision-making. This troubling trend undermines privacy and increasingly threatens our ability to control how information about us is shared and used. Written by a computer scientist and a legal scholar, The Privacy Fix proposes a set of evidence-based, practical solutions that will help solve this problem. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. Bridging the gap between computer scientists, economists, lawyers, and public policy makers, this book provides theoretically and practically sound public policy guidance about how to preserve privacy in the onslaught of surveillance. It emphasizes the need to make tradeoffs among the complex concerns that arise, and it outlines a practical norm-creation process to do so.
Privacy, Right of. --- Self-realization. --- Electronic surveillance --- Artificial intelligence --- Electronic monitoring in the workplace --- Government policy. --- Law and legislation. --- Labor laws and legislation --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Fulfillment (Ethics) --- Self-fulfillment --- Ethics --- Success --- Satisfaction --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Law and legislation
Choose an application
Choose an application
"The wave of data breaches raises two pressing questions : Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better? : Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations"--
Computer networks --- Computer security --- Business --- Computer crimes --- Security measures --- Government policy. --- Data processing --- Security measures. --- Risk assessment.
Choose an application
Annotation
Internet --- Privacy, Right of. --- Computer security. --- Data protection. --- Droit à la vie privée --- Sécurité informatique --- Protection de l'information (Informatique) --- Moral and ethical aspects. --- Aspect moral --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Protection --- Security measures --- Law and legislation --- Information Technology --- General and Others
Choose an application
Computational learning theory --- Computer science. --- Computers. --- Algorithms. --- Mathematical logic. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Mathematical Logic and Formal Languages. --- Computation by Abstract Devices. --- Algorithm Analysis and Problem Complexity. --- Computational learning theory. --- Computer software. --- Informatics --- Software, Computer --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Science --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer systems --- Machine learning --- Artificial Intelligence. --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Foundations --- Computational learning theory - Congresses
Listing 1 - 6 of 6 |
Sort by
|