You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area—including healthcare, finance, manufacturing, and marketing—could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could...
This book constitutes the proceedings of the 12th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2015, held in Skövde, Sweden, in September 2015. The 18 revised full papers presented were carefully reviewed and selected from 38 submissions. They discuss theory and tools for modeling decisions, as well as applications that encompass decision making processes and information fusion techniques.
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For priv...
This book constitutes the refereed proceedings of the joint conference on Machine Learning and Knowledge Discovery in Databases: ECML PKDD 2009, held in Bled, Slovenia, in September 2009. The 106 papers presented in two volumes, together with 5 invited talks, were carefully reviewed and selected from 422 paper submissions. In addition to the regular papers the volume contains 14 abstracts of papers appearing in full version in the Machine Learning Journal and the Knowledge Discovery and Databases Journal of Springer. The conference intends to provide an international forum for the discussion of the latest high quality research results in all areas related to machine learning and knowledge discovery in databases. The topics addressed are application of machine learning and data mining methods to real-world problems, particularly exploratory research that describes novel learning and mining tasks and applications requiring non-standard techniques.
This book constitutes the proceedings of the joint International Conference APWeb/WAIM 2009 which was held in Suzhou, China, during April 1-4, 2009. The 42 full papers presented together with 26 short papers and the abstracts of 2 keynote speeches were carefully reviewed and selected for inclusion in the book. The topics covered are query processing, topic-based techniques, Web data processing, multidimensional data analysis, stream data processing, data mining and its applications, and data management support to advanced applications.
This handbook provides a comprehensive overview of the pragmatics of social media, i.e. of digitally mediated and Internet-based platforms which are interactively used to share and edit self- and other-generated textual and audio-visual messages. Its five parts offer state-of-the-art reviews and critical evaluations in the light of on-going developments: Part I The Nature of Social Media sets up the conceptual groundwork as it explores key concept such as social media, participation, privacy/publicness. Part II Social Media Platforms focuses on the pragmatics of single platforms such as YouTube, Facebook. Part III Social Media and Discourse covers the micro-and macro-level organization of social media discourse, while Part IV Social Media and Identity reveals the multifarious ways in which users collectively (re-)construct aspects of their identities. Part V Social Media and Functions/Speech Acts surveys pragmatic studies on speech act functions such as disagreeing, complimenting, requesting. Each contribution provides a state-of-the-art review together with a critical evaluation of the existing research.
The two-volume set LNAI 8443 + LNAI 8444 constitutes the refereed proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2014, held in Tainan, Taiwan, in May 2014. The 40 full papers and the 60 short papers presented within these proceedings were carefully reviewed and selected from 371 submissions. They cover the general fields of pattern mining; social network and social media; classification; graph and network mining; applications; privacy preserving; recommendation; feature selection and reduction; machine learning; temporal and spatial data; novel algorithms; clustering; biomedical data mining; stream mining; outlier and anomaly detection; multi-sources mining; and unstructured data and text mining.
The development of new pharmaceutical products and behavioral interventions aimed at improving people's health, as well as research that assesses the efficacy and cost-effectiveness of public policies, such as policies designed to improve children's education or reduce poverty, depends on research conducted with human participants. It is imperative that research with human subjects is conducted in accordance with sound ethical principles and regulatory requirements. Featuring 45 original essays by leading research ethicists, The Oxford Handbook of Research Ethics offers a critical overview of the ethics of human subjects research within multiple disciplines and fields, including biomedicine, public health, psychiatry, sociology, political science, and public policy.