Protecting User Privacy in Web Search Utilization

Protecting User Privacy in Web Search Utilization
Author: Khan, Rafi Ullah
Publsiher: IGI Global
Total Pages: 360
Release: 2023-04-25
Genre: Computers
ISBN: 9781668469163

Download Protecting User Privacy in Web Search Utilization Book in PDF, Epub and Kindle

Online user privacy is a delicate issue that has been unfortunately overlooked by technology corporations and especially the public since the birth of the internet. Many online businesses and services such as web search engines, retailers, and social network sites exploit user data for profit. There is a misconception among people about the term “privacy.” Usually, people think that privacy is the ability of an individual to isolate themselves or that it is a person’s right to control access to their personal information. However, privacy is not just about revealing secret information; it also includes exploiting user personal data, as the exploitation of personal data may lead to disastrous consequences. Protecting User Privacy in Web Search Utilization presents both multidisciplinary and interdisciplinary works on questions related to experiences and phenomena that can or could be covered by concepts regarding the protection and privacy of web service users. It further highlights the importance of web search privacy to the readers and educates them about recent developments in the field. Covering topics such as AI-based intrusion detection, desktop search engines, and privacy risks, this premier reference source is an essential resource for students and educators of higher education, data experts, privacy professionals and engineers, IT managers, software developers, government officials, archivists and librarians, privacy rights activists, researchers, and academicians.

Dynamics of Swarm Intelligence Health Analysis for the Next Generation

Dynamics of Swarm Intelligence Health Analysis for the Next Generation
Author: Suresh Kumar, Arumugam,Kose, Utku,Sharma, Sachin,Jerald Nirmal Kumar, S.
Publsiher: IGI Global
Total Pages: 412
Release: 2023-07-10
Genre: Computers
ISBN: 9781668468951

Download Dynamics of Swarm Intelligence Health Analysis for the Next Generation Book in PDF, Epub and Kindle

In today’s world, smart healthcare supports the out-of-hospital concept, which transforms and offers higher care standards. This is accomplished with individual requirements with the help of public opinion. Moreover, smart healthcare systems are generally designed to sense individual health status data, which can be forwarded to clinical professionals for interpretation. Swarm intelligence analysis is a valuable tool for categorizing public opinion into different sentiments. Dynamics of Swarm Intelligence Health Analysis for the Next Generation discusses the role of behavioral activity in the evolution of traditional medical systems to intelligent systems. It further focuses on the economic, social, and environmental impacts of swarm intelligence smart healthcare systems. Covering topics such as healthcare data analytics, clustering algorithms, and the internet of medical things, this premier reference source is an excellent resource for healthcare professionals, hospital administrators, IT managers, policymakers, educators and students of higher education, researchers, and academicians.

Information Security and Privacy in Smart Devices Tools Methods and Applications

Information Security and Privacy in Smart Devices  Tools  Methods  and Applications
Author: Rabadão, Carlos,Santos, Leonel,Costa, Rogério Luís de Carvalho
Publsiher: IGI Global
Total Pages: 343
Release: 2023-04-03
Genre: Computers
ISBN: 9781668459935

Download Information Security and Privacy in Smart Devices Tools Methods and Applications Book in PDF, Epub and Kindle

In recent years, smart devices have become commonplace in our daily lives. On the internet of things (IoT), these devices powered new intelligent services. Their application enabled the rise of intelligent cities, smart agriculture, and Industry 4.0. However, smart devices collect and share large amounts of data, including the habits and preferences of their users. Cybersecurity incidents in intelligent environments may impact services used by millions across the world and make private information public. Information Security and Privacy in Smart Devices: Tools, Methods, and Applications presents research challenges, innovative insights, and trends related to solutions, methods, processes, and applications for maintaining information security and privacy in intelligent environments. Covering topics such as information retrieval methods, electronic health records, and misinformation detection, this premier reference source is an excellent resource for security professionals, government officials, business leaders and executives, IT managers, hospital administrators, students of higher education, librarians, researchers, and academicians.

Applications of Encryption and Watermarking for Information Security

Applications of Encryption and Watermarking for Information Security
Author: Mohamed, Boussif
Publsiher: IGI Global
Total Pages: 262
Release: 2023-03-27
Genre: Computers
ISBN: 9781668449479

Download Applications of Encryption and Watermarking for Information Security Book in PDF, Epub and Kindle

In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings in the domains of security and privacy. It is written for professionals who want to improve their understanding of the strategic role of trust at different levels of information security, that is, trust at the level of cryptography and watermarking and at the level of securing multimedia data. Covering topics such as background subtraction, moving object detection, and visual watermark identification, this premier reference source is an excellent resource for security and privacy professionals, IT managers, practitioners, students and educators of higher education, librarians, researchers, and academicians.

Blurring the Boundaries Through Digital Innovation

Blurring the Boundaries Through Digital Innovation
Author: Fabrizio D'Ascenzo,Massimo Magni,Alessandra Lazazzara,Stefano Za
Publsiher: Springer
Total Pages: 320
Release: 2016-06-16
Genre: Computers
ISBN: 9783319389745

Download Blurring the Boundaries Through Digital Innovation Book in PDF, Epub and Kindle

This book examines the impact of digital innovation on organizations. It reveals how the digital revolution is redefining traditional levels of analysis while at the same time blurring the internal and external boundaries of the organizational environment. It presents a collection of research papers that examine the interaction between Information and Communication Technology (ICT) and behavior from a threefold perspective: First, they analyze individual behavior in terms of specific organizational practices like learning, collaboration and knowledge transfer, as well as the use of ICT within the organization. Second, they explore the dynamics at work on the border between the internal and the external environments by analyzing the organizational impact of ICT usage outside the company, as can be seen in employer branding, consumer behavior and organizational image. Third, they investigate how ICT is being adopted to help face societal challenges outside the company like waste and pollution, smart cities, and e-government. The diversity of views offered makes this book particularly relevant for users, companies, scientists and governments. The content is based on a selection of the best papers – original double-blind peer reviewed contributions –presented at the annual conference of the Italian chapter of AIS, which took place in Rome, Italy, in October 2015, or in other reputable international peer-refereed Information Systems conferences.

Social Computing Behavioral Cultural Modeling and Prediction

Social Computing  Behavioral Cultural Modeling and Prediction
Author: Ariel M. Greenberg,William G Kennedy,Nathan D Bos
Publsiher: Springer
Total Pages: 535
Release: 2013-03-02
Genre: Computers
ISBN: 9783642372100

Download Social Computing Behavioral Cultural Modeling and Prediction Book in PDF, Epub and Kindle

This book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013, held in Washington, DC, USA in April 2013. The total of 57 contributions, which consists of papers and posters, included in this volume was carefully reviewed and selected from 137 submissions. This conference is strongly committed to multidisciplinarity, consistent with recent trends in computational social science and related fields. The topics covered are: behavioral science, health sciences, military science and information science. There are also many papers that provide methodological innovation as well as new domain-specific findings.

Ethics and Technology

Ethics and Technology
Author: Herman T. Tavani
Publsiher: John Wiley & Sons
Total Pages: 405
Release: 2016-01-11
Genre: Computers
ISBN: 9781119239758

Download Ethics and Technology Book in PDF, Epub and Kindle

Ethics and Technology, 5th Edition, by Herman Tavani introduces students to issues and controversies that comprise the relatively new field of cyberethics. This text examines a wide range of cyberethics issues--from specific issues of moral responsibility that directly affect computer and information technology (IT) professionals to broader social and ethical concerns that affect each of us in our day-to-day lives. The 5th edition shows how modern day controversies created by emerging technologies can be analyzed from the perspective of standard ethical concepts and theories.

Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems

Enhanced Methods in Computer Security  Biometric and Artificial Intelligence Systems
Author: Jerzy Pejas,Andrzej Piegat
Publsiher: Springer Science & Business Media
Total Pages: 394
Release: 2006-07-18
Genre: Computers
ISBN: 9780387234847

Download Enhanced Methods in Computer Security Biometric and Artificial Intelligence Systems Book in PDF, Epub and Kindle

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.