You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book will provide a global perspective on AI and the challenges it represents, and will focus on the digital ethics surrounding AI technology.
A global perspective on AI This book will provide a global perspective on AI and the challenges it represents, and will focus on the digital ethics surrounding AI technology.
None
This new book sets out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. It provides practical guidance on how board executives and IT professionals can navigate, integrate and deploy to best corporate and commercial advantage the most widely used frameworks and standards.
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise. This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you’ll learn wh...
A global perspective on AI The rise of AI and super-intelligent AI raises ethical issues. AI is the power behind Google's search engine, enables social media sites to serve up targeted advertising, gives Alexa and Siri their voices, and enables OpenAI's ChatGPT to produce written responses from just a few prompts by the user. It is also the technology enabling self-driving vehicles, predictive policing, and autonomous weapons that can kill without direct human intervention. All of these bring up complex ethical issues that are still unresolved and will continue to be the subject of ongoing debate. This book: Explores the complex topic of AI ethics in a cross-functional way; Enables understan...
In an era characterised by the remarkable growth of AI, there emerges a profound ethical dimension that demands our attention. This book presents a timely and significant addition to the ongoing discourse around the ethical implications of AI in general, as well as the new and disruptive AI technologies, such as generative AI platforms like ChatGPT. This book discusses: Digital technology disruption and AI; An overview of AI and generative AI; The role of AI and generative AI in misinformation and disinformation; AI and online disinhibition; How AI bias can occur; AI and job displacement; AI privacy issues; and AI regulation and policy. This book is a philosophical approach to the AI world, so it is of use to anyone curious about the moral issues surrounding advancements in AI, and not only for those who have a background in AI. The future of AI is not predetermined. It is shaped by our choices, our ethics and our commitment to a world where technology enhances our lives while respecting our shared humanity.
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software. The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems. The book: • Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems; • Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles); • Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.
Every type of organization is vulnerable to insider abuse, errors, and malicious attacks: Grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees, contractors, or other business partners who have been granted authorized access to networks, systems, or data, and all of them can bypass security measures through legitimate means. Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within shows how a security culture based on international best practice can help mitigate the insider threat, providing short-term quick fixes and long-term solutions that can be applied as part of an effecti...
The experience of thinking about, preparing, or writing a text, be it a book review, or about an art exhibition, cannot be limited solely to the artistic experience. There must always be another kind of challenge. I want that elusive thing that I found, together with the encounter that I had with the "object" and the experience we lived together. Every day when I wake up, I don't think about writing, but I wonder whether I'll be able to rise to the calling of that particular "object" (a book, a painting, a play, opera, etc.). The "characters" in them are never marginal figures. I know that they exist but I do not know them, I do not confront myself with them, or I only do so in highly stereotypical situations where they almost become invisible. When I write about something, this is my attempt at turning the invisible into the visible.