Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
"Jäger der Digitalen Schatten: OSINT und Personenrecherche im Internet" ist ein praxisnaher Einblick in das Handwerk der digitalen Informationsbeschaffung. Geschrieben von einer Top-Führungskraft und Berater mit umfangreicher Expertise in internen Untersuchungen und globalen Compliance-Verfahren bei renommierten DAX-Konzernen, beleuchtet dieses Buch die facettenreiche Welt der OSINT-Methodik (Open Source Intelligence).Weit mehr als ein Leitfaden, enthüllt dieses Werk die Feinheiten effizienter Datensammlung, -zusammenstellung und -analyse, und befähigt die Leser dazu, relevante Informationen aus der überwältigenden Flut an Online-Daten zu extrahieren und nach Relevanz zu bewerten. Der Autor teilt seine wertvollen praktischen Erfahrungen und bietet eine Vielzahl von Praxistipps, ergänzt durch eine ausführliche Darstellung nützlicher Tools aus dem Internet und dem Darkweb - Tools, die viele lieber im Verborgenen halten würden."Jäger der Digitalen Schatten" ist nicht nur eines der wenigen deutschsprachigen Praxisbücher über OSINT, es ist ein Leitfaden erprobter Methoden und Insiderwissen. Es ist unentbehrlich für Ermittler, Staatsanwälte, interne Untersucher und Journalisten, bietet aber gleichzeitig fesselnde Einblicke für jeden, der ein Interesse an der Welt der digitalen Informationssammlung hat. Dieses Buch bietet Ihnen eine völlig neue Perspektive auf die Möglichkeiten und Herausforderungen des Internets.
Gegenstand der Arbeit ist der Informationsfluss und die damit verbundene Frage nach dem Schutz von Geschäftsgeheimnissen bei Tarifverhandlungen. Exemplarisch werden anhand der Verhandlung eines Sanierungstarifvertrags potentielle Restriktionen der Informationsweitergabe an Gewerkschaft und Arbeitgeberverband untersucht. Dabei wird die Due Diligence bei Unternehmenskäufen als Referenzmaterie herangezogen. Es wird beleuchtet, ob die dort geltenden Weitergabebeschränkungen übertragbar sind. Die Arbeit widmet sich zudem der Frage, wie Arbeitgeberverband und Gewerkschaft mit den offengelegten Informationen umgehen müssen. Sind die Sozialpartner dazu verpflichtet, besondere organisatorische Sicherungsmaßnahmen zur Gewährleistung der Vertraulichkeit zu ergreifen?
This book pursues the questions from a broad range of law and economics perspectives. Digital transformation leads to economic and social change, bringing with it both opportunities and risks. This raises questions of the extent to which existent legal frameworks are still sufficient and whether there is a need for new or additional regulation in the affected areas: new demands are made on the law and jurisprudence.
Both legal scholars and computer scientists will be curious to know how the gap between law and computing can be bridged.The law, and also jurisprudence, is based on language, and is mainly textual. Every syntactic system has its semantic range, and so does language, which in law achieves a high degree of professional precision. The use of visualisations is a syntactic supplement and opens up a new understanding of legal forms. This understanding was reinforced by the paradigm shift from textual law to legal informatics, in which visual formal notations are decisive. The authors have been dealing with visualisation approaches for a long time and summarise them here for discussion.In this book, a multiphase transformation from the legal domain to computer code is explored. The authors consider law enforcement by computer. The target view is that legal machines are legal actors that are capable of triggering institutional facts. In the visualisation of statutorylaw, an approach called Structural Legal Visualisation is presented. Specifically, the visualisation of legal meaning is linked with tertium comparationis, the third part of the comparison. In a legal documentation system, representing one legal source with multiple documents is viewed as a granularity problem. The authors propose to supplement legislative documents ex ante with explicit logic-oriented information in the form of a mini thesaurus. In contrast to so-called strong relations such as synonymy, antonymy and hypernymy/hyponymy, one should consider weak relations: (1) dialectical relations, a term of dialectical antithesis; (2) context relations; and (3) metaphorical relations, which means the use of metaphors for terms.The chapters trace topics such as the distinction between knowledge visualisation and knowledge representation, the visualisation of Hans Kelsen¿s Pure Theory of Law, the separation of law and legal science, legal subsumption, legal relations, legal machines, encapsulation, compliance, transparency, standard cases and hard cases.
This book examines central aspects of the new technologies and the legal questions raised by them from both an international and an inter-disciplinary perspective. The technology revolution and the global networking of IT systems pose enormous challenges for the law. Current areas of discussion relate to autonomous systems, big data and issues surrounding legal tech. Ensuring data protection and IT security as well as the creation of a legal framework for the new technology as a whole can only be achieved through international and inter-disciplinary co-operation.The team of authors is made up of experienced, internationally renowned experts as well as young researchers and professionals who give valuable insights from numerous different jurisdictions. This book is written for jurists and those responsible for technology in public authorities and companies as well as practising lawyers and researchers.
This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3¿4, 2023. The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools.
Smartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news. Advancing our knowledge of mobile behaviour, the book also highlights the ways in which mobile news impacts the lives of the general public.
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors - such as culture, gender, and trust - and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy.This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
Humanized AI (HAI), emerging as the next of the AI waves, refers to artificial social beings that are very close to humans in various aspects, beings who are machine-race humans, not digital slaves. Foundation, Architecture and Prototyping of Humanized AI deploys a novel small-data approach to vertically explore the spectrum of HAI.
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
This book presents a model-driven approach for creating a national application profile of the international legislative document standard Akoma Ntoso (AKN). AKN is an XML-based document standard that serves as the basis for modern machine-readable and fully digital legislative and judicial processes. The described model-driven development approach ensures consistent and error-proof application of AKN concepts and types, even when using different software tools. It allows for easy maintenance, is self-documenting, and facilitates stakeholder validation with nontechnical legal experts. The resulting application profile remains fully compliant to and compatible with AKN.For the sake of illustration, the approach is paradigmatically applied to the German federal legislative process, as a corresponding approach was used in the creation of the German AKN application profile, LegalDocML.de. We discuss how the methodology yields a model, schema definition and specificationthat correspond to the artefacts created by LegalDocML.de, using examples from Germany. The book is of interest to both legal and technical project teams on the cusp of introducing AKN in a legislative domain and intended as a practical guideline for teams preparing to create a custom application profile for their own domain. Furthermore, it can serve as both a resource and an inspiration for similar and yet to be developed methodologies in the public sector, the health sector or in defense, where international standardization and interoperability efforts are to be applied to a local level.
This book presents a complete overview of the main EEG-based Brain-Computer paradigms and the related practical solutions for their design, prototyping, and testing. The book explores active, reactive, and passive BCI paradigms, with a particular emphasis on the operation for developing solutions, addressing the need for customization.
This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology.
This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for online learning applications will keep you interested and involved throughout.
The aim of this book is to draw a holistic picture of ongoing online teaching-activities before and during the lockdown period and present the meaning and future of e-learning from students' points of view, taking into consideration their attitudes and expectations as well as industry 4.0 and society 5.0 aspects.
5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key role in mitigating these risks.
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN's Sustainable Development Goals where universal accessibility to ICTs remains a serious concern. However, cyber security has emerged as a serious challenge, not least because of the increased accessibility and broader usage with associated vulnerability. Developing countries have additional challenges associated with both the expected faster build-up of accessibility and lack of qualified competencies within cyber security. Discussion of these challenges is the overall theme and motivation for this book.Technical topics discussed in the book include:5G in rural networksCritical infrastructuresOpen RANProtection of privacyCybersecurity and machine learningCybersecurity and disaster monitoring
This book discusses the pros and cons of information and communication (ICT) neutrality. It tries to be as objective as possible from arguments of proponents and opponents, this way enabling readers to build their own opinion. It presents the history of the ongoing network neutrality debate, the various concepts it encompasses, and also some mathematical developments illustrating optimal strategies and potential counter-intuitive results, then extends the discussion to connected ICT domains. The book thus touches issues related to history, economics, law, networking, and mathematics.After an introductory chapter on the history of the topic, chapter 2 surveys and compares the various laws in place worldwide and discusses some implications of heterogeneous rules in several regions. Next, chapter 3 details the arguments put forward by the participants of the net neutrality debate. Chapter 4 then presents how the impact of neutral or non-neutral behaviors can be analyzed mathematically, with sometimes counter-intuitive results, and emphasizes the interest of modeling to avoid bad decisions. Chapter 5 illustrates that content providers may not always be on the pro-neutrality side, as there are situations where they may have an economic advantage with a non-neutral situation, e.g. when they are leaders on a market and create barriers to entry for competitors. Another related issue is covered in chapter 6, which discusses existing ways for ISPs to circumvent the packet-based rules and behave non-neutral without breaking the written law. Chapter 7 gives more insight on the role and possible non-neutral behavior of search engines, leading to another debate called the search neutrality debate. Chapter 8 focuses on e-commerce platforms and social networks, and investigates how they can influence users' actions and opinions. The issue is linked to the debate on the transparency of algorithms which is active in Europe especially. Chapter 9 focuses on enforcing neutrality in practice through measurements: indeed, setting rules requires monitoring the activity of ICT actors in order to sanction non-appropriate behaviors and be proactive against new conducts. The chapter explains why this is challenging and what tools are currently available. Eventually, Chapter 10 briefly concludes the presentation and opens the debate.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.