Securing Consumers' Data


Book Description




Protecting Consumers' Data


Book Description




The Customer of the Future


Book Description

With emerging technology transforming customer expectations, it's important to keep a laser focus on the experience companies provide their customers. Tomorrow's customers need to be targeted today! Customer experience futurist Blake Morgan outlines ten easy-to-follow customer experience guidelines that integrate emerging technologies with effective strategies to combat disconnected processes, silo mentalities, and a lack of buyer perspective. The Customer of the Future explains how today's customers are already demanding frictionless, personalized, on-demand experiences from their products and services, and companies that don't adapt to these new expectations won't last. This book prepares your organization for these increas­ing demands by helping you do the following: Learn the ten defining strategies for a customer experience-focused company. Implement new techniques to shift the entire company from being product-focused to being customer-focused. Gain insights through case studies and examples on how the world's most innovative companies are offering new and compelling customer experiences. Tomorrow's customers will insist on experiences that make their lives significantly easier and better. Craft a leadership development and culture plan to create lasting change at your organization!







Protecting Consumer Information


Book Description




Personal Data in Competition, Consumer Protection and Intellectual Property Law


Book Description

This book analyses the legal approach to personal data taken by different fields of law. An increasing number of business models in the digital economy rely on personal data as a key input. In exchange for sharing their data, online users benefit from personalized and innovative services. But companies’ collection and use of personal data raise questions about privacy and fundamental rights. Moreover, given the substantial commercial and strategic value of personal data, their accumulation, control and use may raise competition concerns and negatively affect consumers. To establish a legal framework that ensures an adequate level of protection of personal data while at the same time providing an open and level playing field for businesses to develop innovative data-based services is a challenging task.With this objective in mind and against the background of the uniform rules set by the EU General Data Protection Regulation, the contributions to this book examine the significance and legal treatment of personal data in competition law, consumer protection law, general civil law and intellectual property law. Instead of providing an isolated analysis of the different areas of law, the book focuses on both synergies and tensions between the different legal fields, exploring potential ways to develop an integrated legal approach to personal data.




Privacy and Data Security


Book Description




Cybersecurity and Consumer Data


Book Description

Issued in error with alternate call number.




Data-Driven Security


Book Description

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.




Data Security


Book Description