Browse Results

Showing 83,526 through 83,550 of 84,723 results

Who Knew?: Inside the Complexity of American Health Care

by Lynn H. Vogel

Despite all the writing and the research, America’s health care industry continues to fail at providing health care that is accessible and affordable, with measurable quality. The fundamental reason we have failed is that health care is not only a complex business, but the most complex in our economy. Other industries are disrupted, some readily adapt to new markets; some leverage information technology and innovative and cost-saving ways. But to date, health care has resisted. The customary approaches tried in other industries seem not to apply to health care. Why? Why is the health care industry so politically divisive? Why is the quality of health care services so difficult to measure? Why do patients often fail to understand their own health care? Why are security and privacy such unique challenges in health care? Why is the payment process for health care services so complicated and challenging? This book seeks to answer these questions. This book written by a well know industry ‘insider’ with 35+ years working at senior levels in hospital operations and information technology, discusses nine major factors that in combination contribute to health care’s complexity. The author concludes that until we understand why health is so complex, we will continue to see books complaining about the poor state of health care in the U.S., and proposals for change that are generally unsuccessful, and innovative technology products that fail to deliver expected results.

Who Needs Emotions?: The Brain Meets the Robot (Series in Affective Science)

by Jean-Marc Fellous Michael A. Arbib

The idea that some day robots may have emotions has captured the imagination of many and has been dramatized by robots and androids in such famous movies as 2001 Space Odyssey's HAL or Star Trek's Data. By contrast, the editors of this book have assembled a panel of experts in neuroscience and artificial intelligence who have dared to tackle the issue of whether robots can have emotions from a purely scientific point of view. The study of the brain now usefully informs study of the social, communicative, adaptive, regulatory, and experimental aspects of emotion and offers support for the idea that we exploit our own psychological responses in order to feel others' emotions. The contributors show the many ways in which the brain can be analyzed to shed light on emotions. Fear, reward, and punishment provide structuring concepts for a number of investigations. Neurochemistry reveals the ways in which different "neuromodulators" such as serotonin, dopamine, and opioids can affect the emotional valence of the brain. And studies of different regions such as the amygdala and orbitofrontal cortex provide a view of the brain as a network of interacting subsystems. Related studies in artificial intelligence and robotics are discussed and new multi-level architectures are proposed that make it possible for emotions to be implemented. It is now an accepted task in robotics to build robots that perceive human expressions of emotion and can "express" simulated emotions to ease interactions with humans. Looking towards future innovations, some scientists posit roles for emotion with our fellow humans. All of these issues are covered in this timely and stimulating book which is written for researchers and graduated students in neuroscience, cognitive science, psychology, robotics, and artificial intelligence.

WHOIS Running the Internet: Protocol, Policy, and Privacy

by Garth O. Bruen

Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in the futureThis book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website. Includes an appendix with information on current and authoritative WHOIS services around the world Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with instructions for navigating them Explains network dependencies and processes related to WHOIS utilizing flowcharts Contains advanced coding for programmers Visit the book's companion website http://whois.knujon.com for technical and policy documents concerning WHOIS, WHOIS code examples, internet locations for WHOIS databases and more. WHOIS Running the Internet: Protocol, Policy, and Privacy is written primarily for internet developers, policy developers, industry professionals in law enforcement, digital forensic investigators, and intellectual property attorneys.Garth O. Bruen is an Internet policy and security researcher whose work has been published in the Wall Street Journal and the Washington Post. Since 2012 Garth Bruen has served as the North American At-Large Chair to the Internet Corporation of Assigned Names and Numbers (ICANN). In 2003 Bruen created KnujOn.com with his late father, Dr. Robert Bruen, to process and investigate Internet abuse complaints (SPAM) from consumers. Bruen has trained and advised law enforcement at the federal and local levels on malicious use of the Domain Name System in the way it relates to the WHOIS record system. He has presented multiple times to the High Technology Crime Investigation Association (HTCIA) as well as other cybercrime venues including the Anti-Phishing Working Group (APWG) and the National Center for Justice and the Rule of Law at The University of Mississippi School of Law. Bruen also teaches the Fisher College Criminal Justice School in Boston where he develops new approaches to digital crime.

WHOIS Running the Internet: Protocol, Policy, and Privacy

by Garth O. Bruen

Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in the futureThis book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website. Includes an appendix with information on current and authoritative WHOIS services around the world Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with instructions for navigating them Explains network dependencies and processes related to WHOIS utilizing flowcharts Contains advanced coding for programmers Visit the book's companion website http://whois.knujon.com for technical and policy documents concerning WHOIS, WHOIS code examples, internet locations for WHOIS databases and more. WHOIS Running the Internet: Protocol, Policy, and Privacy is written primarily for internet developers, policy developers, industry professionals in law enforcement, digital forensic investigators, and intellectual property attorneys.Garth O. Bruen is an Internet policy and security researcher whose work has been published in the Wall Street Journal and the Washington Post. Since 2012 Garth Bruen has served as the North American At-Large Chair to the Internet Corporation of Assigned Names and Numbers (ICANN). In 2003 Bruen created KnujOn.com with his late father, Dr. Robert Bruen, to process and investigate Internet abuse complaints (SPAM) from consumers. Bruen has trained and advised law enforcement at the federal and local levels on malicious use of the Domain Name System in the way it relates to the WHOIS record system. He has presented multiple times to the High Technology Crime Investigation Association (HTCIA) as well as other cybercrime venues including the Anti-Phishing Working Group (APWG) and the National Center for Justice and the Rule of Law at The University of Mississippi School of Law. Bruen also teaches the Fisher College Criminal Justice School in Boston where he develops new approaches to digital crime.

Whole-Body Impedance Control of Wheeled Humanoid Robots (Springer Tracts in Advanced Robotics #116)

by Alexander Dietrich

Introducing mobile humanoid robots into human environments requires the systems to physically interact and execute multiple concurrent tasks. The monograph at hand presents a whole-body torque controller for dexterous and safe robotic manipulation. This control approach enables a mobile humanoid robot to simultaneously meet several control objectives with different pre-defined levels of priority, while providing the skills for compliant physical contacts with humans and the environment. After a general introduction into the topic of whole-body control, several essential reactive tasks are developed to extend the repertoire of robotic control objectives. Additionally, the classical Cartesian impedance is extended to the case of mobile robots. All of these tasks are then combined and integrated into an overall, priority-based control law. Besides the experimental validation of the approach, the formal proof of asymptotic stability for this hierarchical controller is presented. By interconnecting the whole-body controller with an artificial intelligence, the immense potential of the integrated approach for complex real-world applications is shown. Several typical household chores, such as autonomously wiping a window or sweeping the floor with a broom, are successfully performed on the mobile humanoid robot Rollin’ Justin of the German Aerospace Center (DLR). The results suggest the presented controller for a large variety of fields of application such as service robotics, human-robot cooperation in industry, telepresence in medical applications, space robotics scenarios, and the operation of mobile robots in dangerous and hazardous environments.

Whole Body Interaction (Human–Computer Interaction Series)

by David England

Whole Body Interaction is “The integrated capture and processing of human signals from physical, physiological, cognitive and emotional sources to generate feedback to those sources for interaction in a digital environment” (England 2009).Whole Body Interaction looks at the challenges of Whole Body Interaction from the perspectives of design, engineering and research methods. How do we take physical motion, cognition, physiology, emotion and social context to push boundaries of Human Computer Interaction to involve the complete set of human capabilities? Through the use of various applications the authors attempt to answer this question and set a research agenda for future work.Aimed at students and researchers who are looking for new project ideas or to extend their existing work with new dimensions of interaction.

Whole Body Interaction with Public Displays (T-Labs Series in Telecommunication Services)

by Robert Walter

This book develops valuable new approaches to digital out-of-home media and digital signage in urban environments. It offers solutions for communicating interactive features of digital signage to passers-by. Digital out-of-home media and digital signage screens are becoming increasingly interactive thanks to touch input technology and gesture recognition. To optimize their conversion rate, interactive public displays must 1) attract attention, 2) communicate to passers-by that they are interactive, 3) explain the interaction, and 4) provide a motivation for passers-by to interact.This book highlights solutions to problems 2 and 3 above. The focus is on whole-body interaction, where the positions and orientations of users and their individual body parts are captured by specialized sensors (e.g., depth cameras). The book presents revealing findings from a field study on communicating interactivity, a laboratory on analysing visual attention, a field study on mid-air gestures, and a field study on using mid-air gestures to select items on interactive public displays.

The Whole Process of E-commerce Security Management System: Design and Implementation (Advanced Studies in E-Commerce)

by Ronggang Zhang Lijuan Fang Xiaoping He Chuan Wei

​This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situation and requirements of security management, defines its nature, function, object and system, and designs and constructs the whole process security management organization and operation system of e-commerce. It focuses on the core and most prominent risk control links (i.e. security impact factors) in e-commerce security, including e-commerce information and network security risk, e-commerce transaction risk, e-commerce credit risk, e-commerce personnel risk, etc. Then, the tools and methods for identifying and controlling various risks are described in detail, at the same time, management decision-making and coordination are integrated into the risk management. Finally, a closed loop of self-optimization is established by a continuous optimization evolution path of e-commerce security management.

Who's #1?: The Science of Rating and Ranking

by Amy N. Langville Carl D. Meyer

A website's ranking on Google can spell the difference between success and failure for a new business. NCAA football ratings determine which schools get to play for the big money in postseason bowl games. Product ratings influence everything from the clothes we wear to the movies we select on Netflix. Ratings and rankings are everywhere, but how exactly do they work? Who's #1? offers an engaging and accessible account of how scientific rating and ranking methods are created and applied to a variety of uses. Amy Langville and Carl Meyer provide the first comprehensive overview of the mathematical algorithms and methods used to rate and rank sports teams, political candidates, products, Web pages, and more. In a series of interesting asides, Langville and Meyer provide fascinating insights into the ingenious contributions of many of the field's pioneers. They survey and compare the different methods employed today, showing why their strengths and weaknesses depend on the underlying goal, and explaining why and when a given method should be considered. Langville and Meyer also describe what can and can't be expected from the most widely used systems. The science of rating and ranking touches virtually every facet of our lives, and now you don't need to be an expert to understand how it really works. Who's #1? is the definitive introduction to the subject. It features easy-to-understand examples and interesting trivia and historical facts, and much of the required mathematics is included.

Who's #1?: The Science of Rating and Ranking

by Amy N. Langville Carl D. Meyer

A website's ranking on Google can spell the difference between success and failure for a new business. NCAA football ratings determine which schools get to play for the big money in postseason bowl games. Product ratings influence everything from the clothes we wear to the movies we select on Netflix. Ratings and rankings are everywhere, but how exactly do they work? Who's #1? offers an engaging and accessible account of how scientific rating and ranking methods are created and applied to a variety of uses. Amy Langville and Carl Meyer provide the first comprehensive overview of the mathematical algorithms and methods used to rate and rank sports teams, political candidates, products, Web pages, and more. In a series of interesting asides, Langville and Meyer provide fascinating insights into the ingenious contributions of many of the field's pioneers. They survey and compare the different methods employed today, showing why their strengths and weaknesses depend on the underlying goal, and explaining why and when a given method should be considered. Langville and Meyer also describe what can and can't be expected from the most widely used systems. The science of rating and ranking touches virtually every facet of our lives, and now you don't need to be an expert to understand how it really works. Who's #1? is the definitive introduction to the subject. It features easy-to-understand examples and interesting trivia and historical facts, and much of the required mathematics is included.

Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines

by Thomas Ramge

A penetrating guide to artificial intelligence: what it is, what it does, and how it will change our lives At a breathtaking pace, artificial intelligence is getting better and faster at making complex decisions. AI can already identify malignant tumors on CT scans, give legal advice, out-bluff the best poker players in the world, and, with ever-increasing skill, drive our cars. In Who&’s Afraid of AI?, award-winning author Thomas Ramge expertly explains how machines are learning to learn, and he questions what today&’s explosion of AI capability could mean for tomorrow: Is it ethical to allow robots—endlessly patient—to replace human caregivers in providing comfort and companionship to the elderly?Since AI feeds on big data, can we prevent its misuse by corporations or the government?Will AI ever be capable of runaway self-improvement? And if &“the singularity&” does arrive, with AI&’s intelligence exponentially outpacing our own, what will become of us when, in many ways, we&’re obsolete?

Why AI/Data Science Projects Fail: How to Avoid Project Pitfalls (Synthesis Lectures on Computation and Analytics)

by Joyce Weiner

Recent data shows that 87% of Artificial Intelligence/Big Data projects don’t make it into production (VB Staff, 2019), meaning that most projects are never deployed. This book addresses five common pitfalls that prevent projects from reaching deployment and provides tools and methods to avoid those pitfalls. Along the way, stories from actual experience in building and deploying data science projects are shared to illustrate the methods and tools. While the book is primarily for data science practitioners, information for managers of data science practitioners is included in the Tips for Managers sections.

Why AI Undermines Democracy and What To Do About It

by Mark Coeckelbergh

Across the world, AI is used as a tool for political manipulation and totalitarian repression. Stories about AI are often stories of polarization, discrimination, surveillance, and oppression. Is democracy in danger? And can we do anything about it? In this compelling and balanced book, Mark Coeckelbergh reveals the key risks posed by AI for democracy. He argues that AI, as currently used and developed, undermines fundamental principles on which liberal democracies are founded, such as freedom and equality. How can we make democracy more resilient in the face of AI? And, more positively, what can AI do for democracy? Coeckelbergh advocates not only for more democratic technologies, but also for new political institutions and a renewal of education to ensure that AI promotes, rather than hinders, the common good for the twenty-first century. Why AI Undermines Democracy and What to Do About It is illuminating reading for anyone who is concerned about the fate of democracy.

WHY AREN'T WE TALKING ABOUT THIS?!: An Inclusive Illustrated Guide to Life in 100+ Questions

by Hazel Mead

'Informative and bold' Dr Karen Gurney | 'Compassionate, artistic, tasteful' Joshua FletcherWhat is the most personal thing you've asked the Internet? Illustrator Hazel Mead turns to Google to uncover what we secretly ask search bars about our relationships, bodies and identities. With hundreds of demystifying and empowering illustrations, she offers a fun, shame-free and inclusive guide to life's big questions. This is the emotional curriculum you'll wish was taught in every classroom.What if there was a book that explored the big lessons of life? Sure, formal education will equip you with requisite knowledge on photosynthesis. But when it comes to spotting the green flags in a prospective partner, navigating yours or a loved one's grief, knowing how to prepare for a cervical screening, or to practicing self-defense, it can feel like total guesswork.Using the latest research, interviews with experts, and her signature visuals, Hazel interrogates the taboos that shame us into silence. Since the answers to life's big questions are rarely black and white, she answers them in colour, with accessible design and compassionate reflections. Why Aren't We Talking About This?! is an exploration of the things we're too afraid to ask but desperately need to know and talk about for greater acceptance of others and ourselves. It's a bold invitation to forget normal and embrace what makes you unique.

Why Brains Don't Compute

by Dale Purves

This book examines what seems to be the basic challenge in neuroscience today: understanding how experience generated by the human brain is related to the physical world we live in. The 25 short chapters present the argument and evidence that brains address this problem on a wholly trial and error basis. The goal is to encourage neuroscientists, computer scientists, philosophers, and other interested readers to consider this concept of neural function and its implications, not least of which is the conclusion that brains don’t “compute.”

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Internal Audit and IT Audit)

by Barak Engel

This book serves as an introduction into the world of security and provides insight into why and how current security management practices fail, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. The author examines the reasons and suggests how to fix them. The resulting improvement is highly beneficial to any corporation that chooses to pursue this approach or strategy and from a bottom-line and business operations perspective, not just in technical operations. This book transforms the understanding of the role of the CISO, the selection process for a CISO, and the financial impact that security plays in any organization.

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Internal Audit and IT Audit)

by Barak Engel

This book serves as an introduction into the world of security and provides insight into why and how current security management practices fail, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. The author examines the reasons and suggests how to fix them. The resulting improvement is highly beneficial to any corporation that chooses to pursue this approach or strategy and from a bottom-line and business operations perspective, not just in technical operations. This book transforms the understanding of the role of the CISO, the selection process for a CISO, and the financial impact that security plays in any organization.

Why CISOs Fail (Security, Audit and Leadership Series)

by Barak Engel

Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a new and powerful way. Written to be easily consumable by both security pros as well as everyone who must deal with them, the book explores the different realms in which security leaders fail to deliver meaningful impact to their organizations, and why this happens. Its central thesis—that security is primarily a human behavioral discipline rather than a technology one—has been gaining increased attention as a core tenet of the field, and the book was ultimately inducted into the cybersecurity canon as a leading book on security management.In this freshly updated edition, Barak Engel adds new sections that correspond with the chapters of the original book: security as a discipline; as a business enabler; in sales; in legal; in compliance; in technology; and as an executive function. He explores new ideas in each operational area, providing essential insights into emerging aspects of the discipline. He then proposes two critical concepts for security management—the concept of "digital shrinkage" and the transition from CISO to CI/SO—that together offer a new paradigm for any organization that wants to become truly successful in its security journey.Why CISOs (Still) Fail is delivered in Barak's conversational, humoristic style, that has attracted a global audience to this and his other book, The Security Hippie. As he notes, the book's goal is to entertain as much as to inform, and he dearly hopes that you have fun reading it.

Why CISOs Fail: The Missing Link In Security Management--and How To Fix It (Security, Audit and Leadership Series)

by Barak Engel

Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a new and powerful way. Written to be easily consumable by both security pros as well as everyone who must deal with them, the book explores the different realms in which security leaders fail to deliver meaningful impact to their organizations, and why this happens. Its central thesis—that security is primarily a human behavioral discipline rather than a technology one—has been gaining increased attention as a core tenet of the field, and the book was ultimately inducted into the cybersecurity canon as a leading book on security management.In this freshly updated edition, Barak Engel adds new sections that correspond with the chapters of the original book: security as a discipline; as a business enabler; in sales; in legal; in compliance; in technology; and as an executive function. He explores new ideas in each operational area, providing essential insights into emerging aspects of the discipline. He then proposes two critical concepts for security management—the concept of "digital shrinkage" and the transition from CISO to CI/SO—that together offer a new paradigm for any organization that wants to become truly successful in its security journey.Why CISOs (Still) Fail is delivered in Barak's conversational, humoristic style, that has attracted a global audience to this and his other book, The Security Hippie. As he notes, the book's goal is to entertain as much as to inform, and he dearly hopes that you have fun reading it.

Why Cryptography Should Not Rely on Physical Attack Complexity (T-Labs Series in Telecommunication Services)

by Juliane Krämer

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either.Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Why Data Science Projects Fail: The Harsh Realities of Implementing AI and Analytics, without the Hype (Chapman & Hall/CRC Data Science Series)

by Douglas Gray Evan Shellshear

The field of artificial intelligence, data science, and analytics is crippling itself. Exaggerated promises of unrealistic technologies, simplifications of complex projects, and marketing hype are leading to an erosion of trust in one of our most critical approaches to making decisions: data driven.This book aims to fix this by countering the AI hype with a dose of realism. Written by two experts in the field, the authors firmly believe in the power of mathematics, computing, and analytics, but if false expectations are set and practitioners and leaders don’t fully understand everything that really goes into data science projects, then a stunning 80% (or more) of analytics projects will continue to fail, costing enterprises and society hundreds of billions of dollars, and leading to non-experts abandoning one of the most important data-driven decision-making capabilities altogether.For the first time, business leaders, practitioners, students, and interested laypeople will learn what really makes a data science project successful. By illustrating with many personal stories, the authors reveal the harsh realities of implementing AI and analytics.

Why Data Science Projects Fail: The Harsh Realities of Implementing AI and Analytics, without the Hype (Chapman & Hall/CRC Data Science Series)

by Douglas Gray Evan Shellshear

The field of artificial intelligence, data science, and analytics is crippling itself. Exaggerated promises of unrealistic technologies, simplifications of complex projects, and marketing hype are leading to an erosion of trust in one of our most critical approaches to making decisions: data driven.This book aims to fix this by countering the AI hype with a dose of realism. Written by two experts in the field, the authors firmly believe in the power of mathematics, computing, and analytics, but if false expectations are set and practitioners and leaders don’t fully understand everything that really goes into data science projects, then a stunning 80% (or more) of analytics projects will continue to fail, costing enterprises and society hundreds of billions of dollars, and leading to non-experts abandoning one of the most important data-driven decision-making capabilities altogether.For the first time, business leaders, practitioners, students, and interested laypeople will learn what really makes a data science project successful. By illustrating with many personal stories, the authors reveal the harsh realities of implementing AI and analytics.

Why Digital Displays Cannot Replace Paper: The Cognitive Science of Media for Reading and Writing

by Hirohito Shibata Kengo Omura

From readability to operability, this book presents a number of experiments to analyze the characteristics of paper and digital displays in reading and writing. Why is it easy to read on paper? Why is it easy to concentrate on reading on paper? Why is it easy to think while writing or drawing on paper? This book answers these questions based on cognitive experiments on media. Paper is easy to read because it is easy to handle. If we emphasize the strengths of paper, paper is an operation media rather than a presentation media. These experiments also indicate how to develop digital media for reading and writing.This book will interest those who want to gain a scientific understanding of reading and writing on paper, those who want to work more effectively by selectively using paper and digital tools (e.g. knowledge workers and educators), and those who develop digital devices or services for reading and writing.

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy

by Robert H. Sloan Richard Warner

The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy

by Robert H. Sloan Richard Warner

The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Refine Search

Showing 83,526 through 83,550 of 84,723 results