Linked e-resources

Details

Intro
Preface
Contents
About the Editors
Post-Covid-19 Metaverse Cybersecurity and Data Privacy: Present and Future Challenges
1 Introduction
2 Previous Work
3 Research Challenges
Cybersecurity
Avatar Integrity
Device Security
Data Privacy
Data Collection
User Consent
Direct Marketing
Data Intermediaries
Health
Content Moderation
Children
User Education
Economy
Ownership
Advertising
Portability and Interoperability
Transparency and Accountability: AI
Laws and Regulation Landscape

EU/UK General Data Protection Regulations
Confidentiality
Responsibility and Liability
EU Digital Services Act
Consistency
Systematisation
Consumers Vs Traders
Transparency
UK Online Safety Bill
Big Tech Companies
UK Two-Tier System: Liability
Publishers
Online Intermediaries
Legal Clarity
Discussion and Summary
4 Future Research Directions and Potential Solutions for Cybersecurity
Avatar Integrity
Security Protocols
Cyber-Resilience
Data Privacy
Data Collection
Metaverse: Open and Decentralised
Data Protection Framework
Health

Content Moderation
Children
User Education
Economy
Ownership
Advertising
Data Portability and Interoperability
Transparency and Accountability: Blockchain
Laws and Regulation Landscape
EU/UK General Data Protection Regulations
Confidentiality
Responsibility and Liability
EU Digital Services Act
Consistency
Systematisation
Consumer Vs Trader
Transparency
UK Online Safety Bill
Big Tech Companies
UK Two-Tier System: Liability
Publishers
Online Intermediaries
Legal Clarity
5 Discussion
6 Conclusion
Recommendations

Policy and Notification
VDaaS: Notification, Consent, Policies, and Records System Update
Data Provenance and Integrity
Data Veracity and User Safety
Cybersecurity
AI Training Data
Data Privacy
Due Diligence and Best Practices
Avatars
User Consent and Age Verification
Tokenization-Validation
Limitations
Conflict of Interest
References
Keeping it Low-Key: Modern-Day Approaches to Privacy-Preserving Machine Learning
1 Introduction
2 The Great Privacy Awakening
3 Attacks on ML Systems
Data Access Attack
Membership Inference Attack

Input Inference Attack
Parameter Inference Attack
Property Inference Attack
4 Quantifying Privacy Risks in ML Systems
Membership Inference
Input Inference
Parameter Inference
Property Inference
5 Privacy-Preserving Machine Learning
6 Privacy-Preserving Techniques
Differential Privacy
Federated Learning
Synthetic Data
Data Condensation
Auxiliary Techniques
7 Privacy and Responsible ML
8 Conclusion
References
Security Analysis of Android Hot Cryptocurrency Wallet Applications
1 Introduction
Background/Context
Research Focus and Purpose

Browse Subjects

Show more subjects...

Statistics

from
to
Export