語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data protection in a post-pandemic s...
~
Hewage, Chaminda.
FindBook
Google Book
Amazon
博客來
Data protection in a post-pandemic society = laws, regulations, best practices and recent solutions /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Data protection in a post-pandemic society/ edited by Chaminda Hewage, Yogachandran Rahulamathavan, Deepthi Ratnayake.
其他題名:
laws, regulations, best practices and recent solutions /
其他作者:
Hewage, Chaminda.
出版者:
Cham :Springer International Publishing : : 2023.,
面頁冊數:
xiv, 239 p. :ill., digital ;24 cm.
內容註:
Chapter. 1. Post-Covid-19 Metaverse Cybersecurity and Data Privacy-Present and Future Challenges -- Chapter. 2. Keeping it Low-Key: Modern-day approaches to Privacy-Preserving Machine Learning -- Chapter. 3. Security Analysis of Android Hot Cryptocurrency Wallet Applications -- Chapter. 4. Exploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing - A Systematic Review -- Chapter. 5. Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People's Right to Privacy -- Chapter. 6. Federated Learning: Data privacy and cyber security in edge-based machine learning Mobile Malware Detection Using Consortium -- Chapter. 7. Emerging Computer Security Laws and Regulations across the Globe: A Comparison between Sri Lankan and Contemporary International Computer Acts -- Chapter. 8. Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities.
Contained By:
Springer Nature eBook
標題:
Data protection - Law and legislation. -
電子資源:
https://doi.org/10.1007/978-3-031-34006-2
ISBN:
9783031340062
Data protection in a post-pandemic society = laws, regulations, best practices and recent solutions /
Data protection in a post-pandemic society
laws, regulations, best practices and recent solutions /[electronic resource] :edited by Chaminda Hewage, Yogachandran Rahulamathavan, Deepthi Ratnayake. - Cham :Springer International Publishing :2023. - xiv, 239 p. :ill., digital ;24 cm.
Chapter. 1. Post-Covid-19 Metaverse Cybersecurity and Data Privacy-Present and Future Challenges -- Chapter. 2. Keeping it Low-Key: Modern-day approaches to Privacy-Preserving Machine Learning -- Chapter. 3. Security Analysis of Android Hot Cryptocurrency Wallet Applications -- Chapter. 4. Exploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing - A Systematic Review -- Chapter. 5. Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People's Right to Privacy -- Chapter. 6. Federated Learning: Data privacy and cyber security in edge-based machine learning Mobile Malware Detection Using Consortium -- Chapter. 7. Emerging Computer Security Laws and Regulations across the Globe: A Comparison between Sri Lankan and Contemporary International Computer Acts -- Chapter. 8. Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities.
This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g., Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT) In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.
ISBN: 9783031340062
Standard No.: 10.1007/978-3-031-34006-2doiSubjects--Topical Terms:
661635
Data protection
--Law and legislation.
LC Class. No.: K3264.C65 / D38 2023
Dewey Class. No.: 342.0858
Data protection in a post-pandemic society = laws, regulations, best practices and recent solutions /
LDR
:03864nmm a2200325 a 4500
001
2332731
003
DE-He213
005
20230711162349.0
006
m d
007
cr nn 008maaau
008
240402s2023 sz s 0 eng d
020
$a
9783031340062
$q
(electronic bk.)
020
$a
9783031340055
$q
(paper)
024
7
$a
10.1007/978-3-031-34006-2
$2
doi
035
$a
978-3-031-34006-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
K3264.C65
$b
D38 2023
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
342.0858
$2
23
090
$a
K3264.C65
$b
D232 2023
245
0 0
$a
Data protection in a post-pandemic society
$h
[electronic resource] :
$b
laws, regulations, best practices and recent solutions /
$c
edited by Chaminda Hewage, Yogachandran Rahulamathavan, Deepthi Ratnayake.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
xiv, 239 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter. 1. Post-Covid-19 Metaverse Cybersecurity and Data Privacy-Present and Future Challenges -- Chapter. 2. Keeping it Low-Key: Modern-day approaches to Privacy-Preserving Machine Learning -- Chapter. 3. Security Analysis of Android Hot Cryptocurrency Wallet Applications -- Chapter. 4. Exploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing - A Systematic Review -- Chapter. 5. Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People's Right to Privacy -- Chapter. 6. Federated Learning: Data privacy and cyber security in edge-based machine learning Mobile Malware Detection Using Consortium -- Chapter. 7. Emerging Computer Security Laws and Regulations across the Globe: A Comparison between Sri Lankan and Contemporary International Computer Acts -- Chapter. 8. Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities.
520
$a
This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g., Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT) In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.
650
0
$a
Data protection
$x
Law and legislation.
$3
661635
650
0
$a
Data protection
$x
Government policy.
$3
3627388
650
0
$a
COVID-19 Pandemic, 2020-
$x
Influence.
$3
3538348
650
1 4
$a
Privacy.
$3
528582
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Risk Management.
$3
608953
700
1
$a
Hewage, Chaminda.
$3
3662846
700
1
$a
Rahulamathavan, Yogachandran.
$3
3662847
700
1
$a
Ratnayake, Deepthi.
$3
3662848
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-34006-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9458936
電子資源
11.線上閱覽_V
電子書
EB K3264.C65 D38 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入