Software engineering :: artificial intelligence, compliance, and security /
"Information security is important in every aspect of daily life. This book examines four areas where risks are present : artificial intelligence (AI), the internet of things (IoT), government and malware. The authors channel their experience and research into an accessible body of knowledge fo...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Nova Science Publishers, Inc.,
[2021]
|
Schriftenreihe: | Computer science, technology and applications
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Information security is important in every aspect of daily life. This book examines four areas where risks are present : artificial intelligence (AI), the internet of things (IoT), government and malware. The authors channel their experience and research into an accessible body of knowledge for consideration by professionals. AI is introduced as a tool for healthcare, security and innovation. The advantages of using AI in new industries are highlighted in the context of recent developments in mechanical engineering, and a survey of AI software risks is presented focusing on well-publicized failures and US FDA regulatory guidelines. The risks associated with the billions of devices that form the IoT grow with the availability of such devices in consumer products, healthcare, energy infrastructure and transportation. The risks, software engineering risk mitigation methods and standards promoting a level of care for the manufacture of IoT devices are examined because of their importance for software developers. Strategic insights for software developers looking to do business with the US federal government are presented, considering threats to both public and private sectors as well as governmental priorities from recent executive and legislative branch actions. Finally, an analysis of malicious software that infects numerous computer systems each day and causes millions of dollars in damages every year is presented. Malicious software, or "malware," is software designed with hostile intent, but the damage may be mitigated with static and dynamic analyses, which are processes for studying how malware operates and analyzing potential impacts"-- |
Beschreibung: | 1 online resource. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781536190632 1536190632 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1226804281 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 201203s2021 nyu ob 001 0 eng | ||
010 | |a 2020054878 | ||
040 | |a DLC |b eng |e rda |c DLC |d OCLCO |d OCLCF |d N$T |d YDX |d OCLCO |d QGK |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1228878681 | ||
020 | |a 9781536190632 |q electronic book | ||
020 | |a 1536190632 |q electronic book | ||
020 | |z 9781536189896 |q hardcover | ||
020 | |z 1536189898 | ||
035 | |a (OCoLC)1226804281 |z (OCoLC)1228878681 | ||
042 | |a pcc | ||
050 | 0 | 0 | |a QA76.9.A25 |b S64 2021 |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
130 | 0 | |a Software engineering (Nova Science Publishers) | |
245 | 1 | 0 | |a Software engineering : |b artificial intelligence, compliance, and security / |c Brian D'Andrade, editor. |
246 | 3 | 0 | |a Artificial intelligence, compliance, and security |
264 | 1 | |a New York : |b Nova Science Publishers, Inc., |c [2021] | |
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 0 | |a Computer science, technology and applications | |
504 | |a Includes bibliographical references and index. | ||
505 | 2 | |a Artificial intelligence / Elizabeth Groves, PhD, Christie Bergerson, PhD, Maysam B. Gorji, PhD, and Sonal Kothari-Phan, PhD, Exponent, Inc., California, US -- Applications of artificial intelligence in cybersecurity / Dustin Burns, PhD, Statistical and Data Sciences, Exponent, Inc., Menlo Park, CA, US -- Software security and the United States Government : a strategic primer for executives and developers / Travis D. Howard, Information Systems Security Professional, Washington, DC, US. | |
520 | |a "Information security is important in every aspect of daily life. This book examines four areas where risks are present : artificial intelligence (AI), the internet of things (IoT), government and malware. The authors channel their experience and research into an accessible body of knowledge for consideration by professionals. AI is introduced as a tool for healthcare, security and innovation. The advantages of using AI in new industries are highlighted in the context of recent developments in mechanical engineering, and a survey of AI software risks is presented focusing on well-publicized failures and US FDA regulatory guidelines. The risks associated with the billions of devices that form the IoT grow with the availability of such devices in consumer products, healthcare, energy infrastructure and transportation. The risks, software engineering risk mitigation methods and standards promoting a level of care for the manufacture of IoT devices are examined because of their importance for software developers. Strategic insights for software developers looking to do business with the US federal government are presented, considering threats to both public and private sectors as well as governmental priorities from recent executive and legislative branch actions. Finally, an analysis of malicious software that infects numerous computer systems each day and causes millions of dollars in damages every year is presented. Malicious software, or "malware," is software designed with hostile intent, but the damage may be mitigated with static and dynamic analyses, which are processes for studying how malware operates and analyzing potential impacts"-- |c Provided by publisher. | ||
588 | |a Description based on online resource; title from digital title page (viewed on February 22, 2021). | ||
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Artificial intelligence. |0 http://id.loc.gov/authorities/subjects/sh85008180 | |
650 | 0 | |a Software engineering. |0 http://id.loc.gov/authorities/subjects/sh87007398 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Intelligence artificielle. | |
650 | 6 | |a Génie logiciel. | |
650 | 7 | |a artificial intelligence. |2 aat | |
650 | 7 | |a Artificial intelligence |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Software engineering |2 fast | |
700 | 1 | |a D'Andrade, Brian W., |d 1977- |e editor. |0 http://id.loc.gov/authorities/names/no2004032141 | |
758 | |i has work: |a Software engineering (Nova Science Publishers) (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFt64HwxGfbwdJFvWcWXbd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Software engineering (Nova Science Publishers) |t Software engineering |d New York : Nova Science Publishers, Inc., [2020] |z 9781536189896 |w (DLC) 2020054877 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2690543 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 2690543 | ||
938 | |a YBP Library Services |b YANK |n 301832803 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1226804281 |
---|---|
_version_ | 1816882535186038784 |
adam_text | |
any_adam_object | |
author2 | D'Andrade, Brian W., 1977- |
author2_role | edt |
author2_variant | b w d bw bwd |
author_GND | http://id.loc.gov/authorities/names/no2004032141 |
author_facet | D'Andrade, Brian W., 1977- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S64 2021 |
callnumber-search | QA76.9.A25 S64 2021 |
callnumber-sort | QA 276.9 A25 S64 42021 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Artificial intelligence / Elizabeth Groves, PhD, Christie Bergerson, PhD, Maysam B. Gorji, PhD, and Sonal Kothari-Phan, PhD, Exponent, Inc., California, US -- Applications of artificial intelligence in cybersecurity / Dustin Burns, PhD, Statistical and Data Sciences, Exponent, Inc., Menlo Park, CA, US -- Software security and the United States Government : a strategic primer for executives and developers / Travis D. Howard, Information Systems Security Professional, Washington, DC, US. |
ctrlnum | (OCoLC)1226804281 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04872cam a2200601 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1226804281</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">201203s2021 nyu ob 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2020054878</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">DLC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1228878681</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781536190632</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1536190632</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781536189896</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1536189898</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1226804281</subfield><subfield code="z">(OCoLC)1228878681</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S64 2021</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="130" ind1="0" ind2=" "><subfield code="a">Software engineering (Nova Science Publishers)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software engineering :</subfield><subfield code="b">artificial intelligence, compliance, and security /</subfield><subfield code="c">Brian D'Andrade, editor.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Artificial intelligence, compliance, and security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York :</subfield><subfield code="b">Nova Science Publishers, Inc.,</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Computer science, technology and applications</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="2" ind2=" "><subfield code="a">Artificial intelligence / Elizabeth Groves, PhD, Christie Bergerson, PhD, Maysam B. Gorji, PhD, and Sonal Kothari-Phan, PhD, Exponent, Inc., California, US -- Applications of artificial intelligence in cybersecurity / Dustin Burns, PhD, Statistical and Data Sciences, Exponent, Inc., Menlo Park, CA, US -- Software security and the United States Government : a strategic primer for executives and developers / Travis D. Howard, Information Systems Security Professional, Washington, DC, US.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Information security is important in every aspect of daily life. This book examines four areas where risks are present : artificial intelligence (AI), the internet of things (IoT), government and malware. The authors channel their experience and research into an accessible body of knowledge for consideration by professionals. AI is introduced as a tool for healthcare, security and innovation. The advantages of using AI in new industries are highlighted in the context of recent developments in mechanical engineering, and a survey of AI software risks is presented focusing on well-publicized failures and US FDA regulatory guidelines. The risks associated with the billions of devices that form the IoT grow with the availability of such devices in consumer products, healthcare, energy infrastructure and transportation. The risks, software engineering risk mitigation methods and standards promoting a level of care for the manufacture of IoT devices are examined because of their importance for software developers. Strategic insights for software developers looking to do business with the US federal government are presented, considering threats to both public and private sectors as well as governmental priorities from recent executive and legislative branch actions. Finally, an analysis of malicious software that infects numerous computer systems each day and causes millions of dollars in damages every year is presented. Malicious software, or "malware," is software designed with hostile intent, but the damage may be mitigated with static and dynamic analyses, which are processes for studying how malware operates and analyzing potential impacts"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on February 22, 2021).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85008180</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software engineering.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh87007398</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Intelligence artificielle.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Génie logiciel.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">artificial intelligence.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Artificial intelligence</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">D'Andrade, Brian W.,</subfield><subfield code="d">1977-</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004032141</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Software engineering (Nova Science Publishers) (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFt64HwxGfbwdJFvWcWXbd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Software engineering (Nova Science Publishers)</subfield><subfield code="t">Software engineering</subfield><subfield code="d">New York : Nova Science Publishers, Inc., [2020]</subfield><subfield code="z">9781536189896</subfield><subfield code="w">(DLC) 2020054877</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2690543</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2690543</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301832803</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1226804281 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:09Z |
institution | BVB |
isbn | 9781536190632 1536190632 |
language | English |
lccn | 2020054878 |
oclc_num | 1226804281 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource. |
psigel | ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Nova Science Publishers, Inc., |
record_format | marc |
series2 | Computer science, technology and applications |
spelling | Software engineering (Nova Science Publishers) Software engineering : artificial intelligence, compliance, and security / Brian D'Andrade, editor. Artificial intelligence, compliance, and security New York : Nova Science Publishers, Inc., [2021] 1 online resource. text txt rdacontent computer c rdamedia online resource cr rdacarrier Computer science, technology and applications Includes bibliographical references and index. Artificial intelligence / Elizabeth Groves, PhD, Christie Bergerson, PhD, Maysam B. Gorji, PhD, and Sonal Kothari-Phan, PhD, Exponent, Inc., California, US -- Applications of artificial intelligence in cybersecurity / Dustin Burns, PhD, Statistical and Data Sciences, Exponent, Inc., Menlo Park, CA, US -- Software security and the United States Government : a strategic primer for executives and developers / Travis D. Howard, Information Systems Security Professional, Washington, DC, US. "Information security is important in every aspect of daily life. This book examines four areas where risks are present : artificial intelligence (AI), the internet of things (IoT), government and malware. The authors channel their experience and research into an accessible body of knowledge for consideration by professionals. AI is introduced as a tool for healthcare, security and innovation. The advantages of using AI in new industries are highlighted in the context of recent developments in mechanical engineering, and a survey of AI software risks is presented focusing on well-publicized failures and US FDA regulatory guidelines. The risks associated with the billions of devices that form the IoT grow with the availability of such devices in consumer products, healthcare, energy infrastructure and transportation. The risks, software engineering risk mitigation methods and standards promoting a level of care for the manufacture of IoT devices are examined because of their importance for software developers. Strategic insights for software developers looking to do business with the US federal government are presented, considering threats to both public and private sectors as well as governmental priorities from recent executive and legislative branch actions. Finally, an analysis of malicious software that infects numerous computer systems each day and causes millions of dollars in damages every year is presented. Malicious software, or "malware," is software designed with hostile intent, but the damage may be mitigated with static and dynamic analyses, which are processes for studying how malware operates and analyzing potential impacts"-- Provided by publisher. Description based on online resource; title from digital title page (viewed on February 22, 2021). Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Artificial intelligence. http://id.loc.gov/authorities/subjects/sh85008180 Software engineering. http://id.loc.gov/authorities/subjects/sh87007398 Sécurité informatique. Intelligence artificielle. Génie logiciel. artificial intelligence. aat Artificial intelligence fast Computer security fast Software engineering fast D'Andrade, Brian W., 1977- editor. http://id.loc.gov/authorities/names/no2004032141 has work: Software engineering (Nova Science Publishers) (Text) https://id.oclc.org/worldcat/entity/E39PCFt64HwxGfbwdJFvWcWXbd https://id.oclc.org/worldcat/ontology/hasWork Print version: Software engineering (Nova Science Publishers) Software engineering New York : Nova Science Publishers, Inc., [2020] 9781536189896 (DLC) 2020054877 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2690543 Volltext |
spellingShingle | Software engineering : artificial intelligence, compliance, and security / Artificial intelligence / Elizabeth Groves, PhD, Christie Bergerson, PhD, Maysam B. Gorji, PhD, and Sonal Kothari-Phan, PhD, Exponent, Inc., California, US -- Applications of artificial intelligence in cybersecurity / Dustin Burns, PhD, Statistical and Data Sciences, Exponent, Inc., Menlo Park, CA, US -- Software security and the United States Government : a strategic primer for executives and developers / Travis D. Howard, Information Systems Security Professional, Washington, DC, US. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Artificial intelligence. http://id.loc.gov/authorities/subjects/sh85008180 Software engineering. http://id.loc.gov/authorities/subjects/sh87007398 Sécurité informatique. Intelligence artificielle. Génie logiciel. artificial intelligence. aat Artificial intelligence fast Computer security fast Software engineering fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh85008180 http://id.loc.gov/authorities/subjects/sh87007398 |
title | Software engineering : artificial intelligence, compliance, and security / |
title_alt | Software engineering (Nova Science Publishers) Artificial intelligence, compliance, and security |
title_auth | Software engineering : artificial intelligence, compliance, and security / |
title_exact_search | Software engineering : artificial intelligence, compliance, and security / |
title_full | Software engineering : artificial intelligence, compliance, and security / Brian D'Andrade, editor. |
title_fullStr | Software engineering : artificial intelligence, compliance, and security / Brian D'Andrade, editor. |
title_full_unstemmed | Software engineering : artificial intelligence, compliance, and security / Brian D'Andrade, editor. |
title_short | Software engineering : |
title_sort | software engineering artificial intelligence compliance and security |
title_sub | artificial intelligence, compliance, and security / |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Artificial intelligence. http://id.loc.gov/authorities/subjects/sh85008180 Software engineering. http://id.loc.gov/authorities/subjects/sh87007398 Sécurité informatique. Intelligence artificielle. Génie logiciel. artificial intelligence. aat Artificial intelligence fast Computer security fast Software engineering fast |
topic_facet | Computer security. Artificial intelligence. Software engineering. Sécurité informatique. Intelligence artificielle. Génie logiciel. artificial intelligence. Artificial intelligence Computer security Software engineering |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2690543 |
work_keys_str_mv | UT softwareengineeringnovasciencepublishers AT dandradebrianw softwareengineeringartificialintelligencecomplianceandsecurity AT dandradebrianw artificialintelligencecomplianceandsecurity |