Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Public Policy Issues (K.4.1) > Privacy (K.4.1...)  
 
Options:
 
  1-10 of 109 Reviews about "Privacy (K.4.1...)": Date Reviewed
  Machines we trust: perspectives on dependable AI
Pelillo M., Scantamburlo T., MIT Press, Boston, MA, 2021. 174 pp.  Type: Book (978-0-262542-09-8)

Skynet is here. This was my mindset when I undertook to review Machines we trust. The book comprises an introduction plus eight chapters divided into three parts: “Setting the Stage” (chapters 2 and 3); &...

May 24 2022
  Data privacy and trust in cloud computing: building trust in the cloud through assurance and accountability
Lynn T., Mooney J., van der Werff L., Fox G., Palgrave Macmillan, Switzerland, 2021. 170 pp.  Type: Book (978-3-030546-59-5)

The book is a compilation of chapters that investigates issues related to cloud (computing) service providers (CSPs), specifically customer trust and service-level requirements (SLRs). The majority of the chapters (except the last one)...

Mar 18 2022
  How the Internet really works: an illustrated guide to protocols, privacy, censorship, and governance
ARTICLE 19 ., No Starch Press, San Francisco, CA, 2021. 120 pp.  Type: Book (978-1-718500-29-7)

The authors have backgrounds in privacy, online anonymity, Internet freedom, human rights, and Internet governance, and this book is intended as “supplementary to a practice, such as in a workshop or a course, or for Internet...

Mar 4 2021
  Designing for privacy and its legal framework: data protection by design and default for the Internet of Things
Tamò-Larrieux A., Springer International Publishing, New York, NY, 2018. 254 pp.  Type: Book (978-3-319986-23-4)

Rarely have I seen a book on such a contemporary sociotechnical topic as privacy protection that so successfully combines information and communications technology (ICT) concepts to legal principles, (European) regulation to implementa...

Jun 9 2020
  You’ll see this message when it is too late: the legal and economic aftermath of cybersecurity breaches
Wolff J., The MIT Press, Cambridge, MA, 2018. 336 pp.  Type: Book (978-0-262038-85-0)

It seems not a day goes by without a media headline of some cybersecurity breach somewhere. Whether espionage, financial attack, or theft of personal data, we see a brief burst of hysteria followed by assurances that the problem is fix...

Aug 7 2019
  The insider threat: assessment and mitigation of risks
Thompson E., CRC Press, Inc., Boca Raton, FL, 2019. 229 pp.  Type: Book (978-1-498747-08-0)

Did you ever wish to find the names and addresses of any convicted sex offenders living in your area? The author of this book asserts that parents and employers can use information like this to build what she calls a “risk la...

May 17 2019
  STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzam D. International Journal of Information Security 17(5): 569-585, 2018.  Type: Article

As the data people commit to the Internet becomes more and more sensitive, user credential management becomes more and more important, and all the more so when dealing with government or other official sites. In Europe, this problem is...

Dec 28 2018
  The privacy implications of cyber security systems: a technological survey
Toch E., Bettini C., Shmueli E., Radaelli L., Lanzi A., Riboni D., Lepri B. ACM Computing Surveys 51(2): 1-27, 2018.  Type: Article

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different categories:...

Jun 15 2018
  Data protection and privacy: (in)visibilities and infrastructures
Leenes R., van Brakel R., Gutwirth S., De Hert P., Springer International Publishing, New York, NY, 2017. 295 pp.  Type: Book (978-3-319507-95-8)

This work was selected from materials presented at the 9th International Conference on Computers, Privacy, and Data Protection, held in Brussels in January 2016. The ten chapters were selected from the 80 panels and 343 speakers who pr...

Oct 25 2017
  Privacy protection for preventing data over-collection in smart city
Li Y., Dai W., Ming Z., Qiu M. IEEE Transactions on Computers 65(5): 1339-1350, 2016.  Type: Article

The personal devices (and apps) we carry around have the ability to collect lots of data from and about us. Some of this data is useful for personal productivity, while some borders on the verge of over-collection and possible privacy ...

Jul 22 2016
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy