Narrow your search
Listing 1 - 6 of 6
Sort by

Book
Unauthorized Access : The Crisis in Online Privacy and Security
Author:
Year: 2014 Publisher: Taylor & Francis

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
The privacy fix : how to preserve privacy in the onslaught of surveillance
Authors: ---
ISBN: 1108762166 1108788130 1108787711 1108486711 Year: 2021 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Online surveillance of our behavior by private companies is on the increase, particularly through the Internet of Things and the increasing use of algorithmic decision-making. This troubling trend undermines privacy and increasingly threatens our ability to control how information about us is shared and used. Written by a computer scientist and a legal scholar, The Privacy Fix proposes a set of evidence-based, practical solutions that will help solve this problem. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. Bridging the gap between computer scientists, economists, lawyers, and public policy makers, this book provides theoretically and practically sound public policy guidance about how to preserve privacy in the onslaught of surveillance. It emphasizes the need to make tradeoffs among the complex concerns that arise, and it outlines a practical norm-creation process to do so.


Book
The privacy fix
Authors: ---
ISBN: 9781108762168 9781108486712 9781108708210 Year: 2021 Publisher: Cambridge Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Why don't we defend better? : data breaches, risk management, and public policy
Authors: ---
ISBN: 1351127306 1351127284 Year: 2019 Publisher: Boca Raton, FL : CRC Press/Taylor & Francis Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"The wave of data breaches raises two pressing questions : Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better? : Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations"--

Computational Learning Theory : 15th Annual Conference on Computational Learning Theory, COLT 2002, Sydney, Australia, July 8-10, 2002. Proceedings
Authors: --- ---
ISBN: 354043836X 9783540438366 3540454357 Year: 2002 Volume: 2375 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computational learning theory --- Computer science. --- Computers. --- Algorithms. --- Mathematical logic. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Mathematical Logic and Formal Languages. --- Computation by Abstract Devices. --- Algorithm Analysis and Problem Complexity. --- Computational learning theory. --- Computer software. --- Informatics --- Software, Computer --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Science --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer systems --- Machine learning --- Artificial Intelligence. --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Foundations --- Computational learning theory - Congresses

Listing 1 - 6 of 6
Sort by