This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research, practices, and challenges, the book illuminates for readers the often shadowy corridors of such a multifaceted domain and offers guidelines and solutions to successfully traverse the challenging maze.
The book does not simply focus on data protection or legislative frameworks but also on what it takes...
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a...
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security certification schemes for cloud-edge distributed systems. It gives readers unique and essential insight into the history of security certification and its evolution from static to dynamic models. The book helps readers to understand the importance of security certification across distributed system evolution from cloud-based to artificial intelligence-machine learning systems. It covers in full the certification of...
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deployin...