|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 60
reviews
|
|
|
|
|
|
|
|
Law, Technology and Policies: A Complex Negotiation To Generate Value Cordella A., Cordella A., Gualdi F., Gualdi F. Proceedings of the 3rd International Conference on E-commerce, E-Business and E-Government (Proceedings of the 2019 3rd International Conference on E-commerce, E-Business and E-Government, Lyon, France, Jun 18-21, 2019) 21-28, 2019. Type: Proceedings
The profoundly worded title refers to issues that are not profoundly analyzed in the paper....
|
Sep 1 2021 |
|
|
|
|
|
|
Designing for privacy and its legal framework: data protection by design and default for the Internet of Things Tamò-Larrieux A., Springer International Publishing, New York, NY, 2018. 254 pp. Type: Book (978-3-319986-23-4)
Rarely have I seen a book on such a contemporary sociotechnical topic as privacy protection that so successfully combines information and communications technology (ICT) concepts to legal principles, (European) regulation to implementa...
|
Jun 9 2020 |
|
|
|
|
|
|
Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Winkler I., Gomes A., Syngress Publishing, Cambridge, MA, 2016. 260 pp. Type: Book (978-0-128093-16-0)
The idea is simple (you just have to accept it): any cybersecurity defense that you may build to protect your organization will (eventually) fail. Period. The optimal way to proceed beyond that simple fact is to anticipate it by design...
|
Jan 12 2018 |
|
|
|
|
|
|
Data science: create teams that ask the right questions and deliver real value Rose D., Apress, New York, NY, 2016. 251 pp. Type: Book (978-1-484222-52-2)
When building a data science team, special care must be dedicated to its composition for organizations to obtain the best possible benefits. A data science team is a special kind of animal in the corporate zoo because it encompasses ro...
|
Jun 8 2017 |
|
|
|
|
|
|
From computing to computational thinking Wang P., Chapman & Hall/CRC, Boca Raton, FL, 2015. 288 pp. Type: Book (978-1-482217-65-0)
This is a nice book, one that I will keep near me, next to Manfred Schroeder’s Fractals, chaos, power laws [1] and Mark Levi’s The mathematical mechanic [2]....
|
Jan 3 2017 |
|
|
|
|
|
|
Prediction of who will be the next speaker and when using gaze behavior in multiparty meetings Ishii R., Otsuka K., Kumano S., Yamato J. ACM Transactions on Interactive Intelligent Systems 6(1): 1-31, 2016. Type: Article
The authors study an issue that, as far as I know, has not been studied in the past: predicting the next speaker and the timing of the start of his or her utterance in multiparty meetings....
|
Sep 21 2016 |
|
|
|
|
|
|
Improving software development productivity: effective leadership and quantitative methods in software management Jensen R., Prentice Hall Press, Upper Saddle River, NJ, 2014. 368 pp. Type: Book (978-0-133562-67-5)
Jensen is an expert on estimation methodologies for software development cost and effort, and he does an excellent job in communicating his vast expertise and experience....
|
May 21 2015 |
|
|
|
|
|
|
Quantum computing and communications - introduction and challenges Imre S. Computers and Electrical Engineering 40(1): 134-141, 2014. Type: Article
This paper is a nice introductory tutorial on quantum computing and quantum communications, with few more details on the second topic and special emphasis on the inherent security of quantum communications and the related technological...
|
Sep 23 2014 |
|
|
|
|
|
|
Consistency and enforcement of access rules in cooperative data sharing environment Le M., Kant K., Jajodia S. Computers and Security 413-18, 2014. Type: Article
Modern businesses require online multipart collaboration to efficiently service their clients, and this requirement forces them to allow collaborating businesses to access their data. The immediate consequence is that the collaborating...
|
Jul 15 2014 |
|
|
|
|
|
|
Security and privacy preserving in social networks Chbeir R., Al Bouna B., Springer Publishing Company, Incorporated, Vienna, Austria, 2013. 353 pp. Type: Book (978-3-709108-93-2)
By offering a cornucopia of user information to other licit (or sometimes illicit) users, online social networks (OSNs) create the ultimate challenge for preventing privacy invasion and relationship mining, while supporting all the rea...
|
Feb 20 2014 |
|
|
|
|
|
|
|
|
|
|
|