The exploratory title of this book aims to encourage the reader to think about thedevelopment of safety and security in combination and with renewed perspectives. Akey background for this bringing together of concepts is the general trend in societythat the safer and more secure our organizations and institutions become, the moreof it we demand from them. While many of the biggest threats to he…
Cybersecurity is a vast topic, and many kinds of businesses exist with different cultures, drivers, missions, models, and products or services. Facing a general problem statement of “How should security align with business?”, one could easily get lost in the matrix of what to align with what.It can be hard to stay focused on alignment while trying to explain just enough detail about many cy…
From the hidden entrails of the National Security Agency to Silicon Valley,algorithms appear to hold the key to insidious transformations of social, po-litical, and economic relations. “‘Ad-tech” has become “Natsec-tech.” Potentialadversaries will recognize what every advertiser and social media companyknows: AI is a powerful targeting tool’, announced the Final Report by theUnited …
ata has been dubbed the “new oil” (Economist, 2017) driving the business models of the digital economy, but there are considerable privacy risks for those operating in the digital space. People whose livelihoods depend on crowdworking can be particularly affected, since the use of their data can be essential for them, namely when data processing…
In recent years, various industries have emerged with complex and diverse data, and thesedata have become important production factors [1]. As the value of data is increasing,people are more and more concerned about copyright protection, and the awareness ofcopyright protection is gradually increasing. Relational data is one of the most commontypes of data, therefore, the copyright protection o…