Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • UB Potsdam  (4)
  • SB Calau
  • SB Fürstenwalde
  • SKB Bad Freienwalde
  • Computer Science  (4)
Type of Medium
Language
Region
Years
Access
  • 1
    Book
    Book
    New York : New York University Press
    UID:
    b3kat_BV044748837
    Format: xv, 229 Seiten , Illustrationen , 23 cm
    ISBN: 9781479849949 , 9781479837243
    Content: In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities. Data discrimination is a real social problem; Noble argues that the combination of private interests in promoting certain sites, along with the monopoly status of a relatively small number of Internet search engines, leads to a biased set of search algorithms that privilege whiteness and discriminate against people of color, specifically women of color. Through an analysis of textual and media searches as well as extensive research on paid online advertising, Noble exposes a culture of racism and sexism in the way discoverability is created online. As search engines and their related companies grow in importance—operating as a source for email, a major vehicle for primary and secondary school learning, and beyond—understanding and reversing these disquieting trends and discriminatory practices is of utmost importance. An original, surprising and, at times, disturbing account of bias on the internet, Algorithms of Oppression contributes to our understanding of how racism is created, maintained, and disseminated in the 21st century. Quelle/Source: Klappentext
    Note: Dissertation California State University
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-4798-6676-2
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-4798-3364-1
    Language: English
    Subjects: Computer Science , Ethnology , General works , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Suchmaschine ; Algorithmus ; Diskriminierung ; Rassismus ; Hochschulschrift
    Author information: Noble, Safiya Umoja
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1647284988
    Format: 1 Online-Ressource (xix, 264 Seiten) , Diagramme
    Edition: Second Edition
    ISBN: 9780387271088
    Series Statement: Health informatics
    Content: Through the use of case studies, this volume addresses the complex challenges involved in implementing technological change in healthcare organizations
    Note: Description based upon print version of record , Introduction; GEMINI: The Life and Times of a Clinical Information System; Introduction; The Web Center: A Case Study in Strategy and Power; Computers for Kids: Not All Fun and Games; Managing Change; Managing Success: An Information Systems Dilemma at Great Plains Health Care; Introduction; Bar Coding: It's Hard to Kill a Hippo; Developing an Emergency Department Information System; Implementation of OpChart in West Medical Building; Development of the Scientific Computing Center at Vanderbilt University , Early Implementation Problems of an Integrated Information System Within the White Mountain University Health SystemImplementation of a Web-Based Incident-Reporting System at Legendary Health System; Managing Change: Analysis of a Hypothetical Case; Introduction; E3 at Vanderbilt University Medical Center; Catch 22: The Case of Utilization Management's Return on Investment Evaluation; Antimicrobial Utilization Program at the University of Central State Medical Center; Central Medical Healthcare System: The Case of the Well-Aggregated Patient Data , Building Consensus: Quality Improvement at Vesalius Health SystemIntroduction; Strategic Informatics: Planning for the Future of AtlanticHealth; Fix Pharmacy!; Showdown in the Heart of Texas; Mission Valley Medical Center Physicians Group Practice: The Rumor; The DNA Donation Project; Who's in Charge?; Introduction; The Chief Resident's Dilemma; Death of a Committee; Whose Job Is It Anyway?; All for the Want of a Plan …; Fail to Plan, Plan to Fail; Founding Fathers Health Corporation: Idealism and the Bottom Line;
    Additional Edition: ISBN 038721447X
    Additional Edition: ISBN 9780387214474
    Additional Edition: Erscheint auch als Druck-Ausgabe Transforming health care through information New York, NY : Springer, 2005 ISBN 038721447X
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Gesundheitsinformationssystem ; Gesundheitsinformationssystem ; Aufsatzsammlung
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1625843186
    Format: xi, 338 Seiten , Illustrationen, Diagramme, Karten , 22 cm
    Edition: First edition
    ISBN: 9780062390868 , 9780062390851
    Content: How much sex are people really having? How many Americans are actually racist? Is America experiencing a hidden back-alley abortion crisis? Can you game the stock market? Does violent entertainment increase the rate of violent crime? Do parents treat sons differently from daughters? How many people actually read the books they buy? In this work, Seth Stephens-Davidowitz, a Harvard-trained economist, former Google data scientist, and New York Times writer, argues that much of what we thought about people has been dead wrong. The reason? People lie, to friends, lovers, doctors, surveys -- and themselves. However, we no longer need to rely on what people tell us. New data from the internet -- the traces of information that billions of people leave on Google, social media, dating, and even pornography sites -- finally reveals the truth. By analyzing this digital goldmine, we can now learn what people really think, what they really want, and what they really do. Sometimes the new data will make you laugh out loud. Sometimes the new data will shock you. Sometimes the new data will deeply disturb you. But, always, this new data will make you think.--
    Language: English
    Subjects: Computer Science , General works , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Big Data ; Psychologie ; Internet ; Big Data ; Datenanalyse ; Verhaltensmuster ; Data Mining ; Falschaussage ; Big Data ; Psychologie ; Internet ; Data Mining ; Big Data ; Psychologie ; Internet ; Data Mining
    Author information: Pinker, Steven 1954-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_1646675924
    Format: Online-Ressource
    ISBN: 9783540338529 , 3540338519 , 9783540338512
    Series Statement: Lecture Notes in Computer Science 3958
    Content: Cryptanalysis and Protocol Weaknesses -- New Attacks on RSA with Small Secret CRT-Exponents -- An Attack on a Modified Niederreiter Encryption Scheme -- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm -- Distributed Crypto-computing -- Efficient Polynomial Operations in the Shared-Coefficients Setting -- Generic On-Line/Off-Line Threshold Signatures -- Linear Integer Secret Sharing and Distributed Exponentiation -- Encryption Methods -- Encoding-Free ElGamal Encryption Without Random Oracles -- Parallel Key-Insulated Public Key Encryption -- Provably Secure Steganography with Imperfect Sampling -- Cryptographic Hash and Applications -- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited -- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption -- Number Theory Algorithms -- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve -- Efficient Scalar Multiplication by Isogeny Decompositions -- Curve25519: New Diffie-Hellman Speed Records -- Pairing-Based Cryptography -- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman -- Generalization of the Selective-ID Security Model for HIBE Protocols -- Identity-Based Aggregate Signatures -- On the Limitations of the Spread of an IBE-to-PKE Transformation -- Cryptosystems Design and Analysis -- Inoculating Multivariate Schemes Against Differential Attacks -- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol -- High-Order Attacks Against the Exponent Splitting Protection -- Signature and Identification -- New Online/Offline Signature Schemes Without Random Oracles -- Anonymous Signature Schemes -- The Power of Identification Schemes -- Authentication and Key Establishment -- Security Analysis of KEA Authenticated Key Exchange Protocol -- SAS-Based Authenticated Key Agreement -- The Twist-AUgmented Technique for Key Exchange -- Password-Based Group Key Exchange in a Constant Number of Rounds -- Multi-party Computation -- Conditional Oblivious Cast -- Efficiency Tradeoffs for Malicious Two-Party Computation -- PKI Techniques -- On Constructing Certificateless Cryptosystems from Identity Based Encryption -- Building Better Signcryption Schemes with Tag-KEMs -- Security-Mediated Certificateless Cryptography -- k-Times Anonymous Authentication with a Constant Proving Cost.
    Content: The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of Cr- tologic Research (IACR), and this year it was also sponsored by the Columbia University Computer Science Department as well as a number of sponsors from industry, among them: EADS and Morgan Stanley, which were golden sponsors, as well as Gemplus, NTT DoCoMo, Google, Microsoft and RSA Security, which were silver sponsors. We acknowledge the generous support of our industrial sponsors; their support was a major contributing factor to the success of this year’s PKC. PKC 2006 followed a series of very successful conferences that started in 1998in Yokohama,Japan.Further meetingswereheld successivelyinKamakura (Japan), Melbourne (Australia), Jeju Island (Korea), Paris (France), Miami (USA), Singapore and Les Diablerets (Switzerland). The conference became an IACR sponsored event (o?cially designated as an IACR workshop) in 2003 and has been sponsored by IACR continuously since then. The year 2006 found us all in New York City where the undertone of the conference was hummed in the relentless rhythm of the city that never sleeps.
    Additional Edition: ISBN 9783540338512
    Additional Edition: Buchausg. u.d.T. PKC (9 : 2006 : New York, NY) Public key cryptography - PKC 2006 Berlin : Springer, 2006 ISBN 3540338519
    Additional Edition: ISBN 9783540338512
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Public-Key-Kryptosystem ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean the new york tides?
Did you mean the new york tiles?
Did you mean the new york temes?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages