Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing…
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In…
This book explores the role of businesses in delivering positive societal and financial outcomes as they seek to bridge the gap between short-term organizational behaviors and long-range sustainability commitments. By addressing the inevitable data…
Are we being manipulated online? If so, is being manipulated by online technologies and algorithmic systems notably different from human forms of manipulation? And what is under threat exactly when people are manipulated online?
Will historians become programmers? How do historians collaborate with experts from computational domains? At the centre of the book is the question how historians are affected by such ongoing interactions. By following historians and studying…