This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or…mehr
This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or ethical connotations concerning the usage of digital twins. This publication will also give the reader a good level of understanding on fundamental cyber defence principles, interactions with Critical National Infrastructure (CNI) and the Command, Control, Communications and Intelligence (C3I) decision-making framework. A detailed view of the cyber-attack landscape will be garnered; touchingon thetactics, techniques and procedures used, red and blue teaming initiatives, cyber resilience and the protection of larger scale systems. The integration of AI, smart societies, the human-centric approach and Augmented Humanity is discernible in the exponential growth, collection and use of [big] data; concepts woven throughout the diversity of topics covered in this publication; which also discusses the privacy and transparency of data ownership, and the potential dangers of exploitation through social media. As humans are become ever more interconnected, with the prolificacy of smart wearable devices and wearable body area networks, the availability of and abundance of user data and metadata derived from individuals has grown exponentially. The notion of data ownership, privacy and situational awareness are now at the forefront in this new age.
Produktdetails
Produktdetails
Advanced Sciences and Technologies for Security Applications
Hamid Jahankhani gained his PhD from the Queen Mary College, University of London. In 1999 he moved to the University of East London (UEL) to become the first Professor of Information Security and Cyber Criminology at the university in 2010. Over the last 15 years Jahankhani have also been involved in developing new and innovative programmes and introducing "block mode" delivery approach at UEL, including MSc Information Security and Computer Forensics, Professional Doctorate Information Security. Jahankhani's principal research area for a number of years has been in the field of cyber security, information security and digital forensics. In partnership with the key industrial sectors, he has examined and established several innovative research projects that are of direct relevance to the needs of UK and European information security, digital forensics industries, Critical National Infrastructure and law enforcement agencies. Hamid have planned, proposed and managed several collaborative projects, and secured a substantial research income of up to £6m. Jahankhani is the Editor-in-Chief of the International Journal of Electronic Security and Digital Forensics, www.inderscience.com/ijesdf, International Journal of Electronic democracy, www.inderscience.com/ijed, both published by Inderscience and general chair of the annual International Conference on Global Security, Safety and Sustainability (ICGS3). He has edited and contributed to over 15 books and has over 150 conference and journal publications together with Various BBC radio interviews. Jahankhani has supervised to completion 13 PhD and professional doctorate degree students and overseen 67 PhD students progressing. In summer 2017 Jahankhani was trained as the GCHQ "cyberist" to train the next generation of cyber security experts through GCHQ CyberFirst initiative. Stefan Kendzierskyj is an experienced commercial director with over 25 years gained with a number of technology companies covering industries such as telecommunications, software development, outsourcing, publishing, eLearning and digital transformation. Stefan has a strategic approach when presenting solutions at C-Suite and Board level and finding innovative ways for businesses to transform their models and reach new markets. This has been in the form of collaborating with some high-profile Publishers, Associations and organisations that need to reach a global audience with their vision, messaging and business models; particularly in the healthcare and commercial sectors. As well as business acumen he has deep technical domain knowledge that helps to position and ensure fit for purpose solutions and advises organisations on change program methodology. Stefan also provides publisher services for the UK Disaster Victim Identification team and Interpol in the form of process tools to aid in investigation work for mass fatalities where the process of identifying victims of mass disaster may not be possible by visual recognition. Kendzierskyj has research interests on blockchain and its application to industry, Internet of Things, methods of securing the privacy and transparency of data, technology and its interaction with humans/impact in smart societies. Kendzierskyj is a Fellow of The RSA (The Royal Society for the Encouragement of Arts, Manufactures and Commerce) and a member of IEEE Standards Associations working groups. He was on the poster steering committee for the International Conference for Governance, Security and Sustainability (ICGS3-19) and presented his IEEE paper there. He holds a MSc in Cyber Security and has attained a level of Distinction for research into using blockchain as the mechanism for improving privacy, security and transparency of healthcare and clinical data. Stefan has also published a number of articles, conference papers, contributed book chapters to other publications around Industry 4.0, critical national infrastructure, cyber security practitioner's handbook and recent book publication regarding Blockchain and Clinical Trial: Securing Patient Data and is in the process of other publishing work and projects. Stefan is also a speaker at conferences or any thought leadership events. Nishan Chelvachandran is a cybersecurity researcher with years of Operational Law Enforcement and Strategic Public Sector experience, specialising in fields such as Digital Forensics, High-Tech Crime and Intelligence; receiving multiple commendations from Senior Police Chiefs. He has worked at grassroots, tactical, strategic, organisational and national levels, developing solutions for managing change, training, recruitment and retention, and the standardisation of best practice. Chelvachandran's professional interests lie in organisational consultancy and oversight, working at CxO/ C-Suite level leadership roles, to instil and steer overarching organisational and cultural change, to accommodate the future challenges that will face both industry and society. He also endeavours to collaborate with international researchers and subject matter experts from a diversity of multi-disciplinary backgrounds, to enrich the shared body of knowledge intrinsic to Cyber. Chelvachandran's research interests include keyword and behavioural analytics, jurisdictional and legislation relating to cyber-operations and cyber-warfare, ethical frameworks for mass data collection, IoT, AI, surveillance and privacy. He is a Fellow of The RSA (The Royal Society for the Encouragement of Arts, Manufactures and Commerce). He is also a member of multiple IEEE (Institute of Electrical and Electronics Engineers) Standards Associations working groups, drafting the P7000x series of ethics standards and the ECPAIS (Ethics Certification Program for Autonomous and Intelligent Systems). Nishan holds a MSc in Cybersecurity, for which he was awarded a distinction (4.0 GPA). He also holds a certification in Cyberwarfare, Surveillance and Security, and various Operational Policing Qualifications and Certifications. He has published several research papers and contributed book chapters relating to data analytics of open source big data to identify exploitation and radicalisation. He has presented his work at the International Conference for Governance, Security and Sustainability, and is publishing further work. He is developing streams for doctoral research and furthering the collective knowledge of wider Cybersecurity disciplines and industry. Chelvachandran is a speaker at conferences and thought exploration events, has been invited to guest lecture at UK universities and help develop core modules of both undergraduate and postgraduate degree programs. Jaime Ibarra is a cyber security researcher who wrote his first publication for IEEE on January of 2019 at the International Conference of Global Security, Safety and Sustainability hosted by Northumbria University London Campus. He is working towards his final MSc dissertation regarding Digital Forensic Investigation on the Internet of Medical Things and has contributed to scientific book chapters edited by Springer. He has industry experience and is involved in different aspects of cyber security research such as human behaviour, critical infrastructure, cybercrime, incident response and cyber security in healthcare. Ibarra's interests lie in topics such as Biohacking, Society in an interconnected world, Blockchain, Cyber Security applied to medicine, Implantable devices in the human body and Risks Related to Computer and Information Security, Cybernetic espionage with the Support of Nanotechnology. A newcomer to the field, Jaime illustrates outstanding performance and a fast-growing ability to engage with different stakeholders; either in a technical or business context. He is currently supporting and mentoring other MSc students at Northumbria University; sharing his experience and knowledge throughout the programme, in order to help them accomplish and achieve outstanding results.
Inhaltsangabe
Foreword.- Part 1: Cyber Defence & Critical National Infrastructure (CNI).- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age.- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability.- Considerations for the Governance of AI and Government Legislative Frameworks.- Part 2: Augmented Humanity & Digital Society.- Augmented humanity: Data, Privacy and Security.- Consumer Awareness on Security and Privacy Threat of Medical Devices.- Biohacking Capabilities & Threat/ Attack Vectors.- Digital Twins for Precision Healthcare.- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies.- Part 3: Technology of Cyber Attacks.- Blockchain, TTP Attacks and Harmonious Relationship with AI.- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks.- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery.- Attack Vectors and Advanced Persistent Threats.- Artificial Intelligence in Protecting Smart Building's Cloud Service Infrastructure from Cyberattacks.- Part 4: Smart Societies and Data Exploitation.- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management.- Combating Domestic Abuse inflicted in smart societies.- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review.- Secure Implementation of E-governance: a Case Study about Estonia.- Insider Threat.
Foreword.- Part 1: Cyber Defence & Critical National Infrastructure (CNI).- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age.- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability.- Considerations for the Governance of AI and Government Legislative Frameworks.- Part 2: Augmented Humanity & Digital Society.- Augmented humanity: Data, Privacy and Security.- Consumer Awareness on Security and Privacy Threat of Medical Devices.- Biohacking Capabilities & Threat/ Attack Vectors.- Digital Twins for Precision Healthcare.- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies.- Part 3: Technology of Cyber Attacks.- Blockchain, TTP Attacks and Harmonious Relationship with AI.- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks.- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery.- Attack Vectors and Advanced Persistent Threats.- Artificial Intelligence in Protecting Smart Building's Cloud Service Infrastructure from Cyberattacks.- Part 4: Smart Societies and Data Exploitation.- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management.- Combating Domestic Abuse inflicted in smart societies.- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review.- Secure Implementation of E-governance: a Case Study about Estonia.- Insider Threat.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826