Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies

Author: Cornetta, Gianluca

Publisher: IGI Global

Published: 2020-06-26

Total Pages: 333

ISBN-13: 1799838188

DOWNLOAD EBOOK

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.


Secure Edge Computing

Secure Edge Computing

Author: Mohiuddin Ahmed

Publisher: CRC Press

Published: 2021-08-13

Total Pages: 364

ISBN-13: 1000427323

DOWNLOAD EBOOK

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.


The Fourth Industrial Revolution and Its Impact on Ethics

The Fourth Industrial Revolution and Its Impact on Ethics

Author: Katharina Miller

Publisher: Springer Nature

Published: 2021-01-28

Total Pages: 372

ISBN-13: 3030570207

DOWNLOAD EBOOK

This book tackles the ethical problems of the “Fourth Industrial Revolution” (4IR) and offers readers an overview of the ethical challenges connected to Artificial Intelligence (AI), encryption and the finance industry. It specifically focuses on the situation of females in these industries, from women lawyers, judges, attorneys-at-law, investors and bankers, to portfolio managers, solicitors and civil servants. As the 4IR is more than “just” a technology-driven transformation, this book is a call to policymakers and business leaders to harness new technologies in order to create a more inclusive, human-centered future. It offers many practical cases of proactive change agents, and offers solutions to the ethical challenges in connection with implementing revolutionary disruptive products that often eliminate the intermediary. In addition, the book addresses sustainable finance in startups. In this context, education, training, agility and life-long learning in financial literacy are some of the key solutions highlighted here. The respective contributors supply a diverse range of perspectives, so as to promote a multi-stakeholder approach.


Visibilities and Invisibilities in Smart Cities: Emerging Research and Opportunities

Visibilities and Invisibilities in Smart Cities: Emerging Research and Opportunities

Author: McKenna, H. Patricia

Publisher: IGI Global

Published: 2021-06-11

Total Pages: 289

ISBN-13: 179983851X

DOWNLOAD EBOOK

Throughout history, humanity has sought the betterment of its communities. In the 21st century, humanity has technology on its side in the process of improving its cities. Smart cities make their improvements by gathering real-world data in real time. Still, there are many complexities that many do not catch—they are invisible. It is important to understand how people make sense at the urban level and in extra-urban spaces of the combined complexities of invisibilities and visibilities in their environments, interactions, and infrastructures enabled through their own enhanced awareness together with aware technologies that are often embedded, pervasive, and ambient. This book probes the visible and invisible dimensions of emerging understandings of smart cities and regions in the context of more aware people interacting with each other and through more aware and pervasive technologies. Visibilities and Invisibilities in Smart Cities: Emerging Research and Opportunities contributes to the research literature for urban theoretical spaces, methodologies, and applications for smart and responsive cities; the evolving of urban theory and methods for 21st century cities and urbanities; and the formulation of a conceptual framework for associated methodologies and theoretical spaces. This work explores the relationships between variables using a case study approach combined with an explanatory correlational design. It is based on an urban research study conducted from mid-2015 to mid-2020 that spanned multiple countries across three continents. The book is split into four sections: introduction to the concepts of visible and invisible, frameworks for understanding the interplay of the two concepts, associated and evolving theory and methods, and extending current research as opportunities in smart city environments and regions. Covering topics including human geography, smart cities, and urban planning, this book is essential for urban planners, designers, city officials, community agencies, business managers and owners, academicians, researchers, and students, including those who work across multiple domains such as architecture, environmental design, human-computer interaction, human geography, information technology, sociology, and affective computing.


Research Anthology on Privatizing and Securing Data

Research Anthology on Privatizing and Securing Data

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2021-04-23

Total Pages: 2188

ISBN-13: 1799889556

DOWNLOAD EBOOK

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.


Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Author: Sen, Devjani

Publisher: IGI Global

Published: 2020-08-07

Total Pages: 335

ISBN-13: 1799834891

DOWNLOAD EBOOK

Health and fitness apps collect various personal information including name, email address, age, height, weight, and in some cases, detailed health information. When using these apps, many users trustfully log everything from diet to sleep patterns. However, by sharing such personal information, end-users may make themselves targets to misuse of this information by unknown third parties, such as insurance companies. Despite the important role of informed consent in the creation of health and fitness applications, the intersection of ethics and information sharing is understudied and is an often-ignored topic during the creation of mobile applications. Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps is a key reference source that provides research on the dangers of sharing personal information on health and wellness apps, as well as how such information can be used by employers, insurance companies, advertisers, and other third parties. While highlighting topics such as data ethics, privacy management, and information sharing, this publication explores the intersection of ethics and privacy using various quantitative, qualitative, and critical analytic approaches. It is ideally designed for policymakers, software developers, mobile app designers, legal specialists, privacy analysts, data scientists, researchers, academicians, and upper-level students.


Research Anthology on Makerspaces and 3D Printing in Education

Research Anthology on Makerspaces and 3D Printing in Education

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2022-05-06

Total Pages: 771

ISBN-13: 1668462966

DOWNLOAD EBOOK

Education has changed dramatically in recent years as educational technologies evolve and develop at a rapid pace. Teachers and institutions must constantly update their practices and curricula to match this changing landscape to ensure students receive the best education possible. 3D printing has emerged as a new technology that has the potential to enhance student learning and development. Moreover, the availability of makerspaces within schools and libraries allows students to utilize technologies that drive creativity. Further study on the strategies and challenges of implementation is needed for educators to appropriately adopt these learning practices. The Research Anthology on Makerspaces and 3D Printing in Education considers the benefits these technologies provide in relation to education as well as the various ways they can be utilized in the classroom for student learning. The book also provides a review of the difficulties educators face when implementing these technologies into their curricula and ensuring student success. Covering topics such as educational technologies, creativity, and online learning, this major reference work is ideal for administrators, principals, researchers, scholars, practitioners, academicians, instructors, and students.


Real-Time and Retrospective Analyses of Cyber Security

Real-Time and Retrospective Analyses of Cyber Security

Author: Bird, David Anthony

Publisher: IGI Global

Published: 2020-09-04

Total Pages: 267

ISBN-13: 179983980X

DOWNLOAD EBOOK

Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.


Large-Scale Data Streaming, Processing, and Blockchain Security

Large-Scale Data Streaming, Processing, and Blockchain Security

Author: Saini, Hemraj

Publisher: IGI Global

Published: 2020-08-14

Total Pages: 285

ISBN-13: 1799834468

DOWNLOAD EBOOK

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.


Handbook of Research on Cyber Crime and Information Privacy

Handbook of Research on Cyber Crime and Information Privacy

Author: Cruz-Cunha, Maria Manuela

Publisher: IGI Global

Published: 2020-08-21

Total Pages: 753

ISBN-13: 1799857298

DOWNLOAD EBOOK

In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.