Amazon cover image
Image from Amazon.com

Data Protection in a Post-Pandemic Society [electronic resource] : Laws, Regulations, Best Practices and Recent Solutions /

Contributor(s): Material type: TextTextPublisher: Cham : Springer International Publishing : Imprint: Springer, 2023Edition: 1st ed. 2023Description: XIV, 239 p. 47 illus., 41 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031340062
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
  • 323.448 23
LOC classification:
  • QA76.9.A25
  • JC596-596.2
Online resources:
Contents:
Chapter. 1. Post-Covid-19 Metaverse Cybersecurity and Data Privacy-Present and Future Challenges -- Chapter. 2. Keeping it Low-Key: Modern-day approaches to Privacy-Preserving Machine Learning -- Chapter. 3. Security Analysis of Android Hot Cryptocurrency Wallet Applications -- Chapter. 4. Exploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing – A Systematic Review -- Chapter. 5. Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People’s Right to Privacy -- Chapter. 6. Federated Learning: Data privacy and cyber security in edge-based machine learning Mobile Malware Detection Using Consortium -- Chapter. 7. Emerging Computer Security Laws and Regulations across the Globe: A Comparison between Sri Lankan and Contemporary International Computer Acts -- Chapter. 8. Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities.
In: Springer Nature eBookSummary: This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g., Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference. .
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Chapter. 1. Post-Covid-19 Metaverse Cybersecurity and Data Privacy-Present and Future Challenges -- Chapter. 2. Keeping it Low-Key: Modern-day approaches to Privacy-Preserving Machine Learning -- Chapter. 3. Security Analysis of Android Hot Cryptocurrency Wallet Applications -- Chapter. 4. Exploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing – A Systematic Review -- Chapter. 5. Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People’s Right to Privacy -- Chapter. 6. Federated Learning: Data privacy and cyber security in edge-based machine learning Mobile Malware Detection Using Consortium -- Chapter. 7. Emerging Computer Security Laws and Regulations across the Globe: A Comparison between Sri Lankan and Contemporary International Computer Acts -- Chapter. 8. Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities.

This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g., Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference. .

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in