Social Legal and Ethical Implications of IoT Cloud and Edge Computing Technologies

Social  Legal  and Ethical Implications of IoT  Cloud  and Edge Computing Technologies
Author: Cornetta, Gianluca,Touhafi, Abdellah,Muntean, Gabriel-Miro
Publsiher: IGI Global
Total Pages: 333
Release: 2020-06-26
Genre: Computers
ISBN: 9781799838180

Download Social Legal and Ethical Implications of IoT Cloud and Edge Computing Technologies Book in PDF, Epub and Kindle

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

Secure Edge Computing

Secure Edge Computing
Author: Mohiuddin Ahmed,Paul Haskell-Dowland
Publsiher: CRC Press
Total Pages: 364
Release: 2021-08-13
Genre: Computers
ISBN: 9781000427325

Download Secure Edge Computing Book in PDF, Epub and Kindle

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.

The Fourth Industrial Revolution and Its Impact on Ethics

The Fourth Industrial Revolution and Its Impact on Ethics
Author: Katharina Miller,Karen Wendt
Publsiher: Springer Nature
Total Pages: 372
Release: 2021-01-28
Genre: Business & Economics
ISBN: 9783030570200

Download The Fourth Industrial Revolution and Its Impact on Ethics Book in PDF, Epub and Kindle

This book tackles the ethical problems of the “Fourth Industrial Revolution” (4IR) and offers readers an overview of the ethical challenges connected to Artificial Intelligence (AI), encryption and the finance industry. It specifically focuses on the situation of females in these industries, from women lawyers, judges, attorneys-at-law, investors and bankers, to portfolio managers, solicitors and civil servants. As the 4IR is more than “just” a technology-driven transformation, this book is a call to policymakers and business leaders to harness new technologies in order to create a more inclusive, human-centered future. It offers many practical cases of proactive change agents, and offers solutions to the ethical challenges in connection with implementing revolutionary disruptive products that often eliminate the intermediary. In addition, the book addresses sustainable finance in startups. In this context, education, training, agility and life-long learning in financial literacy are some of the key solutions highlighted here. The respective contributors supply a diverse range of perspectives, so as to promote a multi-stakeholder approach.

Visibilities and Invisibilities in Smart Cities Emerging Research and Opportunities

Visibilities and Invisibilities in Smart Cities  Emerging Research and Opportunities
Author: McKenna, H. Patricia
Publsiher: IGI Global
Total Pages: 289
Release: 2021-06-11
Genre: Political Science
ISBN: 9781799838517

Download Visibilities and Invisibilities in Smart Cities Emerging Research and Opportunities Book in PDF, Epub and Kindle

Throughout history, humanity has sought the betterment of its communities. In the 21st century, humanity has technology on its side in the process of improving its cities. Smart cities make their improvements by gathering real-world data in real time. Still, there are many complexities that many do not catch—they are invisible. It is important to understand how people make sense at the urban level and in extra-urban spaces of the combined complexities of invisibilities and visibilities in their environments, interactions, and infrastructures enabled through their own enhanced awareness together with aware technologies that are often embedded, pervasive, and ambient. This book probes the visible and invisible dimensions of emerging understandings of smart cities and regions in the context of more aware people interacting with each other and through more aware and pervasive technologies. Visibilities and Invisibilities in Smart Cities: Emerging Research and Opportunities contributes to the research literature for urban theoretical spaces, methodologies, and applications for smart and responsive cities; the evolving of urban theory and methods for 21st century cities and urbanities; and the formulation of a conceptual framework for associated methodologies and theoretical spaces. This work explores the relationships between variables using a case study approach combined with an explanatory correlational design. It is based on an urban research study conducted from mid-2015 to mid-2020 that spanned multiple countries across three continents. The book is split into four sections: introduction to the concepts of visible and invisible, frameworks for understanding the interplay of the two concepts, associated and evolving theory and methods, and extending current research as opportunities in smart city environments and regions. Covering topics including human geography, smart cities, and urban planning, this book is essential for urban planners, designers, city officials, community agencies, business managers and owners, academicians, researchers, and students, including those who work across multiple domains such as architecture, environmental design, human-computer interaction, human geography, information technology, sociology, and affective computing.

Research Anthology on Privatizing and Securing Data

Research Anthology on Privatizing and Securing Data
Author: Management Association, Information Resources
Publsiher: IGI Global
Total Pages: 2188
Release: 2021-04-23
Genre: Computers
ISBN: 9781799889557

Download Research Anthology on Privatizing and Securing Data Book in PDF, Epub and Kindle

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps
Author: Sen, Devjani,Ahmed, Rukhsana
Publsiher: IGI Global
Total Pages: 335
Release: 2020-08-07
Genre: Computers
ISBN: 9781799834892

Download Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps Book in PDF, Epub and Kindle

Health and fitness apps collect various personal information including name, email address, age, height, weight, and in some cases, detailed health information. When using these apps, many users trustfully log everything from diet to sleep patterns. However, by sharing such personal information, end-users may make themselves targets to misuse of this information by unknown third parties, such as insurance companies. Despite the important role of informed consent in the creation of health and fitness applications, the intersection of ethics and information sharing is understudied and is an often-ignored topic during the creation of mobile applications. Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps is a key reference source that provides research on the dangers of sharing personal information on health and wellness apps, as well as how such information can be used by employers, insurance companies, advertisers, and other third parties. While highlighting topics such as data ethics, privacy management, and information sharing, this publication explores the intersection of ethics and privacy using various quantitative, qualitative, and critical analytic approaches. It is ideally designed for policymakers, software developers, mobile app designers, legal specialists, privacy analysts, data scientists, researchers, academicians, and upper-level students.

Real Time and Retrospective Analyses of Cyber Security

Real Time and Retrospective Analyses of Cyber Security
Author: Bird, David Anthony
Publsiher: IGI Global
Total Pages: 267
Release: 2020-09-04
Genre: Computers
ISBN: 9781799839804

Download Real Time and Retrospective Analyses of Cyber Security Book in PDF, Epub and Kindle

Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.

Large Scale Data Streaming Processing and Blockchain Security

Large Scale Data Streaming  Processing  and Blockchain Security
Author: Saini, Hemraj,Rathee, Geetanjali,Saini, Dinesh Kumar
Publsiher: IGI Global
Total Pages: 285
Release: 2020-08-14
Genre: Computers
ISBN: 9781799834465

Download Large Scale Data Streaming Processing and Blockchain Security Book in PDF, Epub and Kindle

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.