AI Industrial Complex: The Challenge of AI Ethics (English)
In:
IEEE security & privacy
;
15
, 5
; 3-5
;
2017
-
ISSN:
- Article (Journal) / Print
-
Title:AI Industrial Complex: The Challenge of AI Ethics
-
Published in:IEEE security & privacy ; 15, 5 ; 3-5
-
Publisher:
- New search for: IEEE
-
Place of publication:New York, NY
-
Publication date:2017
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38 / 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 15, Issue 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Table of Contents| 2017
- 3
-
AI Industrial Complex: The Challenge of AI Ethics| 2017
- 6
-
Masthead| 2017
- 7
-
Silver Bullet Talks with Ksenia Dmitrieva-PegueroMcGraw, Gary et al. | 2017
- 10
-
Genomic Data Privacy and Security: Where We Stand and Where We Are HeadingHubaux, Jean-Pierre / Katzenbeisser, Stefan / Malin, Bradley et al. | 2017
- 13
-
Call for Nominees Education Awards Nominations| 2017
- 14
-
Characterizing the Risks and Harms of Linking Genomic Information to IndividualsSavage, Sara Renee et al. | 2017
- 20
-
Improving the Security and Efficiency of Private Genomic Computation Using Server AidBlanton, Marina / Bayatbabolghani, Fattaneh et al. | 2017
- 29
-
Inference Attacks against Kin Genomic PrivacyAyday, Erman / Humbert, Mathias et al. | 2017
- 38
-
Genomic Security (Lest We Forget)Bradley, Tatiana / Xuhua Ding, / Tsudik, Gene et al. | 2017
- 47
-
Cybersecurity Framework Adoption: Using Capability Levels for Implementation Tiers and ProfilesDedeke, Adenekan et al. | 2017
- 55
-
152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy UsersReeder, Robert W. / Ion, Iulia / Consolvo, Sunny et al. | 2017
- 65
-
Assessing Mission Impact of Cyberattacks: Toward a Model-Driven ParadigmKott, Alexander / Ludwig, Jackson / Lange, Mona et al. | 2017
- 75
-
Take the CS Library wherever you go!| 2017
- 76
-
Security and Privacy Experiences and Practices of Survivors of Intimate Partner AbuseMatthews, Tara / O'Leary, Kathleen / Turner, Anna / Sleeper, Manya / Woelfer, Jill Palzkill / Shelton, Martin / Manthorne, Cori / Churchill, Elizabeth F. / Consolvo, Sunny et al. | 2017
- 82
-
Disillusioning Alice and BobOppliger, Rolf et al. | 2017
- 85
-
FinTechSec: Addressing the Security Challenges of Digital Financial ServicesTraynor, Patrick / Butler, Kevin / Bowers, Jasmine / Reaves, Bradley et al. | 2017
- 90
-
Availability of Required Data to Support Criminal Investigations Involving Large-Scale IP Address–Sharing TechnologiesO'Reilly, David et al. | 2017
- 94
-
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and CybersecurityPeisert, Sean / Welch, Von et al. | 2017
- 96
-
IoT Security: What’s Plan B?Schneier, Bruce et al. | 2017
- c1
-
Front Cover| 2017
- c2
-
Call for Papers Special Issue on Security and Privacy Research in Brazil| 2017
- c3
-
New Membership Options for a Better Fit| 2017
- c4
-
IEEE Security & Privacy| 2017