Browse All Reviews
Computing Milieux (K)
Computers And Society (K.4)
Public Policy Issues (K.4.1)
> Privacy (K.4.1...)
All Media Types
1-10 of 109 Reviews about "
Machines we trust: perspectives on dependable AI
Pelillo M., Scantamburlo T., MIT Press, Boston, MA, 2021. 174 pp. Type: Book (978-0-262542-09-8)
Skynet is here. This was my mindset when I undertook to review
Machines we trust
. The book comprises an introduction plus eight chapters divided into three parts: “Setting the Stage” (chapters 2 and 3); &...
May 24 2022
Data privacy and trust in cloud computing: building trust in the cloud through assurance and accountability
Lynn T., Mooney J., van der Werff L., Fox G., Palgrave Macmillan, Switzerland, 2021. 170 pp. Type: Book (978-3-030546-59-5)
The book is a compilation of chapters that investigates issues related to cloud (computing) service providers (CSPs), specifically customer trust and service-level requirements (SLRs). The majority of the chapters (except the last one)...
Mar 18 2022
How the Internet really works: an illustrated guide to protocols, privacy, censorship, and governance
ARTICLE 19 ., No Starch Press, San Francisco, CA, 2021. 120 pp. Type: Book (978-1-718500-29-7)
The authors have backgrounds in privacy, online anonymity, Internet freedom, human rights, and Internet governance, and this book is intended as “supplementary to a practice, such as in a workshop or a course, or for Internet...
Mar 4 2021
Designing for privacy and its legal framework: data protection by design and default for the Internet of Things
Tamò-Larrieux A., Springer International Publishing, New York, NY, 2018. 254 pp. Type: Book (978-3-319986-23-4)
Rarely have I seen a book on such a contemporary sociotechnical topic as privacy protection that so successfully combines information and communications technology (ICT) concepts to legal principles, (European) regulation to implementa...
Jun 9 2020
You’ll see this message when it is too late: the legal and economic aftermath of cybersecurity breaches
Wolff J., The MIT Press, Cambridge, MA, 2018. 336 pp. Type: Book (978-0-262038-85-0)
It seems not a day goes by without a media headline of some cybersecurity breach somewhere. Whether espionage, financial attack, or theft of personal data, we see a brief burst of hysteria followed by assurances that the problem is fix...
Aug 7 2019
The insider threat: assessment and mitigation of risks
Thompson E., CRC Press, Inc., Boca Raton, FL, 2019. 229 pp. Type: Book (978-1-498747-08-0)
Did you ever wish to find the names and addresses of any convicted sex offenders living in your area? The author of this book asserts that parents and employers can use information like this to build what she calls a “risk la...
May 17 2019
STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzam D. International Journal of Information Security 17(5): 569-585, 2018. Type: Article
As the data people commit to the Internet becomes more and more sensitive, user credential management becomes more and more important, and all the more so when dealing with government or other official sites. In Europe, this problem is...
Dec 28 2018
The privacy implications of cyber security systems: a technological survey
Toch E., Bettini C., Shmueli E., Radaelli L., Lanzi A., Riboni D., Lepri B. ACM Computing Surveys 51(2): 1-27, 2018. Type: Article
This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different categories:...
Jun 15 2018
Data protection and privacy: (in)visibilities and infrastructures
Leenes R., van Brakel R., Gutwirth S., De Hert P., Springer International Publishing, New York, NY, 2017. 295 pp. Type: Book (978-3-319507-95-8)
This work was selected from materials presented at the 9th International Conference on Computers, Privacy, and Data Protection, held in Brussels in January 2016. The ten chapters were selected from the 80 panels and 343 speakers who pr...
Oct 25 2017
Privacy protection for preventing data over-collection in smart city
Li Y., Dai W., Ming Z., Qiu M. IEEE Transactions on Computers 65(5): 1339-1350, 2016. Type: Article
The personal devices (and apps) we carry around have the ability to collect lots of data from and about us. Some of this data is useful for personal productivity, while some borders on the verge of over-collection and possible privacy ...
Jul 22 2016
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2023 ThinkLoud