1 option
Security and Privacy from a Legal, Ethical, and Technical Perspective.
- Format:
- Book
- Author/Creator:
- Kalloniatis, Christos.
- Language:
- English
- Subjects (All):
- Computer security--Moral and ethical aspects.
- Computer security.
- Computer security--Law and legislation.
- Physical Description:
- 1 online resource (226 pages)
- Edition:
- 1st ed.
- Place of Publication:
- London : IntechOpen, 2020.
- Summary:
- Understanding and realizing the security and privacy challenges for information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems. This book provides novel contributions and research efforts related to security and privacy by shedding light on the legal, ethical, and technical aspects of security and privacy. This book consists of 12 chapters divided in three groups. The first contains works that discuss the ethical and legal aspects of security and privacy, the second contains works that focus more on the technical aspects of security and privacy, and the third contains works that show the applicability of various solutions in the aforementioned fields. This book is perfect for both experienced readers and young researchers that wish to read about the various aspects of security and privacy.
- Contents:
- Security and Privacy From a Legal, Ethical, and Technical Perspective
- Contents
- Preface
- Section 1 Legal and Ethical Issues
- Chapter1 Legal Aspects of International Information Security
- Chapter2 Ethical Issues in the New Digital Era: The Case of Assisting Driving
- Chapter3 Social Media, Ethics and the Privacy Paradox
- Section 2 Technical Security and Privacy Issues
- Chapter4 Security and Privacy inThree States of Information
- Chapter5 The Role of Gamification in Privacy Protection and User Engagement
- Chapter6 Risk Assessment in IT Infrastructure
- Chapter7 Risks of Privacy-Enhancing Technologies: Complexity and Implications of Differential Privacy in the Context of Cybercrime
- Chapter8 A Review of Several PrivacyViolation Measures for Large Networks under Active Attacks
- Section 3 Applications
- Chapter9 Beyond Differential Privacy: Synthetic Micro-Data Generation with Deep Generative Neural Networks
- Chapter10 Machine Learning Applications in Misuse and Anomaly Detection
- Chapter11 Multimodal Biometrics for Person Authentication
- Chapter12 Hardware Implementation of AudioWatermarking Based on DWT Transform.
- Notes:
- Includes bibliographical references.
- Description based on publisher supplied metadata and other sources.
- OCLC:
- 1198601351
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.