This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and pri…
This open access volume focuses on the development of a P5 eHealth, or better, a methodological resource for developing the health technologies of the future, based on patients’ personal characteristics and needs as the fundamental guidelines for design. It provides practical guidelines and evidence based examples on how to design, implement, use and elevate new technologies for healthcare to…
Universities and research institutes are increasingly expected to contribute to society by creating innovation from the returns of their research results and the establishment of new technologies. Toward that goal, Keio University in Japan held an international symposium titled “Fulfilling the Promise of Technology Transfer: Fostering Innovation for the Benefit of Society.” From that sympos…
Technology has made human lives incomparably better. Civilization as we know it would utterly collapse without it. However, if not properly managed, technology can and will be systematically abused and misuse and thereby become one of the biggest threats to humankind. This open access book applies proactive crisis management to the management of technology organizations to make them more sustai…
This book presents computer programming as a key method for solving mathematical problems. This second edition of the well-received book has been extensively revised: All code is now written in Python version 3.6 (no longer version 2.7). In addition, the two first chapters of the previous edition have been extended and split up into five new chapters, thus expanding the introduction to programm…
"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industr…
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to under…
What does it mean to be human in a world of technology? What could be the role of religion in responding to the ecological crisis? Should we be concerned about the modification of food, and even of ourselves? Who do we trust to make decisions regarding our common future? What do we use our technology for? These are not questions for experts only. How can the wider public be involved? Do experts…
The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely undiscussed. In this book, assistant professor of law and digitalisation Riikka Koulu examines the mult…
New technologies are often implemented before their ethical consequences have been fully understood. In this volume, experts working in the sciences, arts, and philosophy of technology share novel perspectives on how we can