Research Anthology on Privatizing and Securing Data

Research Anthology on Privatizing and Securing Data

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2021-04-23

Total Pages: 2188

ISBN-13: 1799889556

DOWNLOAD EBOOK

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.


Artificial Intelligence-Enabled Blockchain Technology and Digital Twin for Smart Hospitals

Artificial Intelligence-Enabled Blockchain Technology and Digital Twin for Smart Hospitals

Author: Amit Kumar Tyagi

Publisher: John Wiley & Sons

Published: 2024-10-15

Total Pages: 500

ISBN-13: 1394287399

DOWNLOAD EBOOK

The book uniquely explores the fundamentals of blockchain and digital twin and their uses in smart hospitals. Artificial Intelligence-Enabled Blockchain Technology and Digital Twin for Smart Hospitals provides fundamental information on blockchain and digital twin technology as effective solutions in smart hospitals. Digital twin technology enables the creation of real-time virtual replicas of hospital assets and patients, enhancing predictive maintenance, operational efficiency, and patient care. Blockchain technology provides a secure and transparent platform for managing and sharing sensitive data, such as medical records and pharmaceutical supply chains. By combining these technologies, smart hospitals can ensure data security, interoperability, and streamlined operations while providing patient-centered care. The book also explores the impact of collected medical data from real-time systems in smart hospitals, and by making it accessible to all doctors via a smartphone or mobile device for fast decisions. Inevitable challenges such as privacy concerns and integration costs must, of course, be addressed. However, the potential benefits in terms of improved healthcare quality, reduced costs, and global health initiatives makes the integration of these technologies a compelling avenue for the future of healthcare. Some of the topics that readers will find in this book include: Wireless Medical Sensor Networks in Smart Hospitals ● DNA Computing in Cryptography ● Enhancing Diabetic Retinopathy and Glaucoma Diagnosis through Efficient Retinal Vessel Segmentation and Disease Classification ● Machine Learning-Enabled Digital Twins for Diagnostic And Therapeutic Purposes ● Blockchain as the Backbone of a Connected Ecosystem of Smart Hospitals ● Blockchain for Edge Association in Digital Twin Empowered 6G Networks ● Blockchain for Security and Privacy in Smart Healthcare ● Blockchain-Enabled Internet of Things (IoTs) Platforms for IoT-Based Healthcare and Biomedical Sector ● Electronic Health Records in a Blockchain ● PSO-Based Hybrid Cardiovascular Disease Prediction for Using Artificial Flora Algorithm ● AI and Transfer Learning Based Framework for Efficient Classification And Detection Of Lyme Disease ● Framework for Gender Detection Using Facial Countenances ● Smartphone-Based Sensors for Biomedical Applications ● Blockchain for Improving Security and Privacy in the Smart Sensor Network ● Sensors and Digital Twin Application in Healthcare Facilities Management ● Integration of Internet of Medical Things (IoMT) with Blockchain Technology to Improve Security and Privacy ● Machine Learning-Driven Digital Twins for Precise Brain Tumor and Breast Cancer Assessment ● Ethical and Technological Convergence: AI and Blockchain in Halal Healthcare ● Digital Twin Application in Healthcare Facilities Management ● Cloud-based Digital Twinning for Structural Health Monitoring Using Deep Learning. Audience The book will be read by hospital and healthcare providers, administrators, policymakers, scientists and engineers in artificial intelligence, information technology, electronics engineering, and related disciplines.


Big Data

Big Data

Author: Kiran Sood

Publisher: Emerald Group Publishing

Published: 2022-07-19

Total Pages: 283

ISBN-13: 1802626077

DOWNLOAD EBOOK

Striking a balance between the technical characteristics of the subject and the practical aspects of decision making, spanning from fraud analytics in claims management, to customer analytics, to risk analytics in solvency, the comprehensive coverage presented makes Big Data an invaluable resource for any insurance professional.


Big Data Security

Big Data Security

Author: Shibakali Gupta

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2019-10-08

Total Pages: 223

ISBN-13: 3110605961

DOWNLOAD EBOOK

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.


Exploring the Boundaries of Big Data

Exploring the Boundaries of Big Data

Author: Bart van der Sloot

Publisher:

Published: 2016

Total Pages: 0

ISBN-13: 9789462983588

DOWNLOAD EBOOK

In the investigation Exploring the Boundaries of Big Data The Netherlands Scientific Council for Government Policy (WRR) offers building blocks for developing a regulatory approach to Big Data.


The Googlization of Everything

The Googlization of Everything

Author: Siva Vaidhyanathan

Publisher: Univ of California Press

Published: 2012-03-13

Total Pages: 281

ISBN-13: 0520952456

DOWNLOAD EBOOK

In the beginning, the World Wide Web was exciting and open to the point of anarchy, a vast and intimidating repository of unindexed confusion. Into this creative chaos came Google with its dazzling mission—"To organize the world’s information and make it universally accessible"—and its much-quoted motto, "Don’t be evil." In this provocative book, Siva Vaidhyanathan examines the ways we have used and embraced Google—and the growing resistance to its expansion across the globe. He exposes the dark side of our Google fantasies, raising red flags about issues of intellectual property and the much-touted Google Book Search. He assesses Google’s global impact, particularly in China, and explains the insidious effect of Googlization on the way we think. Finally, Vaidhyanathan proposes the construction of an Internet ecosystem designed to benefit the whole world and keep one brilliant and powerful company from falling into the "evil" it pledged to avoid.


Data Protection Law in the EU

Data Protection Law in the EU

Author: Brendan Van Alsenoy

Publisher:

Published: 2019

Total Pages: 0

ISBN-13: 9781780688282

DOWNLOAD EBOOK

Practically every organisation in the world processes personal data. European data protection law imposes a series of requirements designed to protect individuals against the risks that result from the processing of their data. It also distinguishes among different types of actors involved in the processing and sets out different obligations for each type of actor. The most important distinction in this regard is the distinction between 'controllers' and 'processors'. This book seeks to determine whether EU data protection law should continue to maintain its current distinction.


Securing 'the Homeland'

Securing 'the Homeland'

Author: Myriam Anna Dunn

Publisher: Routledge

Published: 2020-04-28

Total Pages: 229

ISBN-13: 1134069197

DOWNLOAD EBOOK

This edited volume uses a ‘constructivist/reflexive’ approach to address critical infrastructure protection (CIP), a central political practice associated with national security. The politics of CIP, and the construction of the threat they are meant to counter, effectively establish a powerful discursive connection between that the traditional and normal conditions for day-to-day politics and the exceptional dynamics of national security. Combining political theory and empirical case studies, this volume addresses key issues related to protection and the governance of insecurity in the contemporary world. The contributors track the transformation and evolution of critical infrastructures (and closely related issues of homeland security) into a security problem, and analyze how practices associated with CIP constitute, and are an expression of, changing notions of security and insecurity. The book explores aspects of ‘securitisation’ as well as at practices, audiences, and contexts that enable and constrain the production of the specific form of governmentality that CIP exemplifies. It also explores the rationalities at play, the effects of these security practices, and the implications for our understanding of security and politics today.


Knowledge to Policy

Knowledge to Policy

Author: Fred Carden

Publisher: IDRC

Published: 2009-04-06

Total Pages: 238

ISBN-13: 8178299305

DOWNLOAD EBOOK

Investigates the effects of research in the field of international development.. Examines the consequences of 23 research projects funded by Canada's International Development Research Centre in developing countries. Shows how research influence public policy and decision-making and how can contribute to better governance.


Surveillance Valley

Surveillance Valley

Author: Yasha Levine

Publisher: PublicAffairs

Published: 2018-02-06

Total Pages: 352

ISBN-13: 1610398033

DOWNLOAD EBOOK

The internet is the most effective weapon the government has ever built. In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to a Pentagon counterinsurgency surveillance project. A visionary intelligence officer, William Godel, realized that the key to winning the war in Vietnam was not outgunning the enemy, but using new information technology to understand their motives and anticipate their movements. This idea -- using computers to spy on people and groups perceived as a threat, both at home and abroad -- drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology. But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news -- and the device on which you read it.