The Personalization Paradox


Book Description

According to Infosys, 86% of consumers surveyed indicated that personalized content has some impact on what they purchase and 25% said that personalization plays a large role in their purchases. And yet, looking at the data, two things stand out: Most companies say that personalizing the customer experience is a critical "must have," and they have the statistics to back it up. Very few companies believe they are delivering enough personalized content, or deliver it well. What's holding these companies back from their personalization goals? And how can you avoid the pitfalls and make personalization possible with your own enterprise content? In this book, global content strategy expert Val Swisher and senior content strategist Regina Lynn Preciado show you exactly what it takes to deliver personalized experiences at scale. You'll learn: Why personalized content is imperative to the enterprise Why so many companies fail to deliver - and how to avoid the pitfalls The five dimensions of content standardization How to bring people, technology, and process together The impact of big data and artificial intelligence The only way to deliver personalized content at scale is to automate the process at the point of delivery. And for that to work, you've got to change how you "do" content. The Personalization Paradox: Why Companies Fail (and How to Succeed) at Delivering Personalized Experiences at Scale shows you how.




The Dark Forest


Book Description

The inspiration for the Netflix series 3 Body Problem! Over 1 million copies of the Three-Body Problem series sold in North America PRAISE FOR THE THREE-BODY PROBLEM SERIES: “A mind-bending epic.”—The New York Times • “War of the Worlds for the 21st century.”—The Wall Street Journal • “Fascinating.”—TIME • “Extraordinary.”—The New Yorker • “Wildly imaginative.”—Barack Obama • “Provocative.”—Slate • “A breakthrough book.”—George R. R. Martin • “Impossible to put down.”—GQ • “Absolutely mind-unfolding.”—NPR • “You should be reading Liu Cixin.”—The Washington Post The Dark Forest is the second novel in the groundbreaking, Hugo Award-winning series from China's most beloved science fiction author, Cixin Liu. In The Dark Forest, Earth is reeling from the revelation of a coming alien invasion-in just four centuries' time. The aliens' human collaborators may have been defeated, but the presence of the sophons, the subatomic particles that allow Trisolaris instant access to all human information, means that Earth's defense plans are totally exposed to the enemy. Only the human mind remains a secret. This is the motivation for the Wallfacer Project, a daring plan that grants four men enormous resources to design secret strategies, hidden through deceit and misdirection from Earth and Trisolaris alike. Three of the Wallfacers are influential statesmen and scientists, but the fourth is a total unknown. Luo Ji, an unambitious Chinese astronomer and sociologist, is baffled by his new status. All he knows is that he's the one Wallfacer that Trisolaris wants dead. The Three-Body Problem Series The Three-Body Problem The Dark Forest Death's End Other Books by Cixin Liu Ball Lightning Supernova Era To Hold Up the Sky The Wandering Earth A View from the Stars At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.




Dark Sides of Business and Higher Education Management, Volume II


Book Description

Contemporary management studies usually focus on positive and desirable solutions that increase the organizational effectiveness and performance. As a result, graduates of higher business schools are totally unaware of the risk associated with management misconduct that often results in corrupt scandals, erosion of public trust to their organizations, or even the collapse of profitable corporations. The last decade, in fact, has been abundant in numerous examples of corruption scandals in modern organizations and instances of management misconduct that have eroded public faith (such as Enron, WorldCom, Tyco, Adelphia, Arthur Andersen, and Parmalat). Due to repeated misconducts and a highly active dark side, scholars started paying more attention to the so-called Òdark sideÓ of organizations, as something no longer exceptional to organizational life. This book attempts to shed light on the reality of challenges for business practices and higher education management that stem from misconduct occurring in various aspects of business and educational environment.




Lessons from the Identity Trail


Book Description

During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these new and emerging technologies have been fragmented. There have been few examples of interdisciplinary dialogue about the potential for anonymity and privacy in a networked society. Lessons from the Identity Trail fills that gap, and examines key questions about anonymity, privacy and identity in an environment that increasingly automates the collection of personal information and uses surveillance to reduce corporate and security risks. This project has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recent research outcomes.




Human Factors in Privacy Research


Book Description

This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic. This is an open access book.




Privacy and Identity Management for Life


Book Description

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.




Privacy as Trust


Book Description

Proposes a new way of thinking about information privacy that leverages law to protect disclosures in contexts of trust.




The Vienna Paradox


Book Description




The Sorites Paradox


Book Description

Offers a systematic introduction and discussion of all the main solutions to the sorites paradox and its areas of influence.




The Algorithmic Foundations of Differential Privacy


Book Description

The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some powerful computational results, there are still fundamental limitations. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power -- certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. The monograph then turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams, is discussed. The Algorithmic Foundations of Differential Privacy is meant as a thorough introduction to the problems and techniques of differential privacy, and is an invaluable reference for anyone with an interest in the topic.