Research Anthology on Privatizing and Securing Data

Research Anthology on Privatizing and Securing Data

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2021-04-23

Total Pages: 2188

ISBN-13: 1799889556

DOWNLOAD EBOOK

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.


Big Data

Big Data

Author: Kiran Sood

Publisher: Emerald Group Publishing

Published: 2022-07-19

Total Pages: 283

ISBN-13: 1802626077

DOWNLOAD EBOOK

Striking a balance between the technical characteristics of the subject and the practical aspects of decision making, spanning from fraud analytics in claims management, to customer analytics, to risk analytics in solvency, the comprehensive coverage presented makes Big Data an invaluable resource for any insurance professional.


Artificial Intelligence-Enabled Blockchain Technology and Digital Twin for Smart Hospitals

Artificial Intelligence-Enabled Blockchain Technology and Digital Twin for Smart Hospitals

Author: Amit Kumar Tyagi

Publisher: John Wiley & Sons

Published: 2024-10-15

Total Pages: 500

ISBN-13: 1394287399

DOWNLOAD EBOOK

The book uniquely explores the fundamentals of blockchain and digital twin and their uses in smart hospitals. Artificial Intelligence-Enabled Blockchain Technology and Digital Twin for Smart Hospitals provides fundamental information on blockchain and digital twin technology as effective solutions in smart hospitals. Digital twin technology enables the creation of real-time virtual replicas of hospital assets and patients, enhancing predictive maintenance, operational efficiency, and patient care. Blockchain technology provides a secure and transparent platform for managing and sharing sensitive data, such as medical records and pharmaceutical supply chains. By combining these technologies, smart hospitals can ensure data security, interoperability, and streamlined operations while providing patient-centered care. The book also explores the impact of collected medical data from real-time systems in smart hospitals, and by making it accessible to all doctors via a smartphone or mobile device for fast decisions. Inevitable challenges such as privacy concerns and integration costs must, of course, be addressed. However, the potential benefits in terms of improved healthcare quality, reduced costs, and global health initiatives makes the integration of these technologies a compelling avenue for the future of healthcare. Some of the topics that readers will find in this book include: Wireless Medical Sensor Networks in Smart Hospitals ● DNA Computing in Cryptography ● Enhancing Diabetic Retinopathy and Glaucoma Diagnosis through Efficient Retinal Vessel Segmentation and Disease Classification ● Machine Learning-Enabled Digital Twins for Diagnostic And Therapeutic Purposes ● Blockchain as the Backbone of a Connected Ecosystem of Smart Hospitals ● Blockchain for Edge Association in Digital Twin Empowered 6G Networks ● Blockchain for Security and Privacy in Smart Healthcare ● Blockchain-Enabled Internet of Things (IoTs) Platforms for IoT-Based Healthcare and Biomedical Sector ● Electronic Health Records in a Blockchain ● PSO-Based Hybrid Cardiovascular Disease Prediction for Using Artificial Flora Algorithm ● AI and Transfer Learning Based Framework for Efficient Classification And Detection Of Lyme Disease ● Framework for Gender Detection Using Facial Countenances ● Smartphone-Based Sensors for Biomedical Applications ● Blockchain for Improving Security and Privacy in the Smart Sensor Network ● Sensors and Digital Twin Application in Healthcare Facilities Management ● Integration of Internet of Medical Things (IoMT) with Blockchain Technology to Improve Security and Privacy ● Machine Learning-Driven Digital Twins for Precise Brain Tumor and Breast Cancer Assessment ● Ethical and Technological Convergence: AI and Blockchain in Halal Healthcare ● Digital Twin Application in Healthcare Facilities Management ● Cloud-based Digital Twinning for Structural Health Monitoring Using Deep Learning. Audience The book will be read by hospital and healthcare providers, administrators, policymakers, scientists and engineers in artificial intelligence, information technology, electronics engineering, and related disciplines.


Big Data Security

Big Data Security

Author: Shibakali Gupta

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2019-10-08

Total Pages: 223

ISBN-13: 3110605961

DOWNLOAD EBOOK

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.


Big Data Governance and Perspectives in Knowledge Management

Big Data Governance and Perspectives in Knowledge Management

Author: Strydom, Sheryl Kruger

Publisher: IGI Global

Published: 2018-11-16

Total Pages: 320

ISBN-13: 1522570780

DOWNLOAD EBOOK

The world is witnessing the growth of a global movement facilitated by technology and social media. Fueled by information, this movement contains enormous potential to create more accountable, efficient, responsive, and effective governments and businesses, as well as spurring economic growth. Big Data Governance and Perspectives in Knowledge Management is a collection of innovative research on the methods and applications of applying robust processes around data, and aligning organizations and skillsets around those processes. Highlighting a range of topics including data analytics, prediction analysis, and software development, this book is ideally designed for academicians, researchers, information science professionals, software developers, computer engineers, graduate-level computer science students, policymakers, and managers seeking current research on the convergence of big data and information governance as two major trends in information management.


Exploring the Boundaries of Big Data

Exploring the Boundaries of Big Data

Author: Bart van der Sloot

Publisher:

Published: 2016

Total Pages: 0

ISBN-13: 9789462983588

DOWNLOAD EBOOK

In the investigation Exploring the Boundaries of Big Data The Netherlands Scientific Council for Government Policy (WRR) offers building blocks for developing a regulatory approach to Big Data.


The Googlization of Everything

The Googlization of Everything

Author: Siva Vaidhyanathan

Publisher: Univ of California Press

Published: 2012-03-13

Total Pages: 281

ISBN-13: 0520952456

DOWNLOAD EBOOK

In the beginning, the World Wide Web was exciting and open to the point of anarchy, a vast and intimidating repository of unindexed confusion. Into this creative chaos came Google with its dazzling mission—"To organize the world’s information and make it universally accessible"—and its much-quoted motto, "Don’t be evil." In this provocative book, Siva Vaidhyanathan examines the ways we have used and embraced Google—and the growing resistance to its expansion across the globe. He exposes the dark side of our Google fantasies, raising red flags about issues of intellectual property and the much-touted Google Book Search. He assesses Google’s global impact, particularly in China, and explains the insidious effect of Googlization on the way we think. Finally, Vaidhyanathan proposes the construction of an Internet ecosystem designed to benefit the whole world and keep one brilliant and powerful company from falling into the "evil" it pledged to avoid.


Securing 'the Homeland'

Securing 'the Homeland'

Author: Myriam Anna Dunn

Publisher: Routledge

Published: 2020-04-28

Total Pages: 229

ISBN-13: 1134069197

DOWNLOAD EBOOK

This edited volume uses a ‘constructivist/reflexive’ approach to address critical infrastructure protection (CIP), a central political practice associated with national security. The politics of CIP, and the construction of the threat they are meant to counter, effectively establish a powerful discursive connection between that the traditional and normal conditions for day-to-day politics and the exceptional dynamics of national security. Combining political theory and empirical case studies, this volume addresses key issues related to protection and the governance of insecurity in the contemporary world. The contributors track the transformation and evolution of critical infrastructures (and closely related issues of homeland security) into a security problem, and analyze how practices associated with CIP constitute, and are an expression of, changing notions of security and insecurity. The book explores aspects of ‘securitisation’ as well as at practices, audiences, and contexts that enable and constrain the production of the specific form of governmentality that CIP exemplifies. It also explores the rationalities at play, the effects of these security practices, and the implications for our understanding of security and politics today.