Skip to content

Latest commit

 

History

History
42 lines (22 loc) · 3.59 KB

publications.md

File metadata and controls

42 lines (22 loc) · 3.59 KB

Publications

Cyber City Safe: Emergency Planning Beyond the Maginot Line

Co-author of Cyber City Safe: Emergency Planning Beyond the Maginot Line. This book paints a picture of a Cyber City, safe from a range of threats and challenges. Big data will play a positive role. Sensors throughout the city will monitor the weather in the short term and climate in the long term.

Big data will advise on the type of plantings which will thrive now, and also in the next generation when there will be a different climate. Automatic water collection and distribution systems will ensure that even in droughts, scarce water will be put to best use. Solar-powered awnings and baffles will shield pedestrians from wind, sun, and rain, extending the pleasant walking season and promoting fitness and health.

Citation: Bonner, A., Damary, R., Pryadilina, N., & Schmidt, B. (2018). Cyber City Safe: Emergency Planning Beyond the Maginot Line. Toronto: Friesens Corporation.

Articles

Specialty Publications

Schmidt, B. (2020, April 8). Digital Hygiene: The next step in the fight against COVID-19. Retrieved from https://catalyst.iabc.com/Innovation/Innovation-Article/digital-hygiene-the-next-step-in-the-fight-against-covid-19.

Schmidt, B. (2020, February 20). It’s Time for Cybersecurity to Emerge from the Shadows (of IT). Retrieved from https://catalyst.iabc.com/Innovation/Innovation-Article/its-time-for-cybersecurity-to-emerge-from-the-shadows-of-it.

Troy Media

Bonner, A., Schmidt, B. (2019, August 19). Cyber risk will ramp up during elections. Troy Media. Retrieved from https://troymedia.com/politicslaw/cyber-risk-ramps-elections/.

Bonner, A., Schmidt, B. (2018, April 4). Voice-activated assistants vulnerable to hackers. Troy Media. Retrieved from https://troymedia.com/2018/04/04/voice-activated-assistants-vulnerable-hackers/.

Bonner, A., Schmidt, B. (2018, January 28). Beware the coming superintelligence of machines. Troy Media. Retrieved from https://troymedia.com/2018/01/28/beware-artificial-intelligence-ai-machine-learning/.

Bonner, A., Schmidt, B. (2018, January 5). Staying ahead of threats to cyber security. Troy Media. Retrieved from https://troymedia.com/2018/01/05/blockchain-cyber-security-threats/.

Bonner, A., Schmidt, B. (2018, January 19). Unsecure mobile devices a hazard to municipal security. Troy Media. Retrieved from https://troymedia.com/2018/01/19/mobile-devices-hazard-municipal-security/.

Bonner, A., Schmidt, B. (2017, December 26). Protecting your privacy in the digital age. Troy Media. Retrieved from https://troymedia.com/2017/12/26/protect-privacy-digital-age/.

Bonner, A., Schmidt, B. (2017, December 7). How cyber safe is your municipality? Troy Media. Retrieved from https://troymedia.com/2017/12/07/municipalities-risk-cyber-attacks/.

Bonner, A., Schmidt, B. (2017, November 27). The modern, efficient criminal is digitally casing you. Troy Media. Retrieved from https://troymedia.com/2017/11/27/the-modern-efficient-criminal-is-digitally-casing-the-joint-and-you/.

Bonner, A., Schmidt, B. (2017, November 16). Big treats to personal privacy in the era of big data. Retrieved from https://troymedia.com/2017/11/16/threats-personal-privacy-era-of-big-data/.

Bonner, A., Schmidt, B. (2017, November 14). Solving the identity theft puzzle will take teamwork. Retrieved from https://troymedia.com/2017/11/14/solving-identity-theft-take-teamwork/.

Bonner, A., Schmidt, B. (2017, October 23). The Technology Trap: Only the Vigilant Will Survive. Troy Media. Retrieved from https://troymedia.com/2017/10/23/only-vigilant-survive-technology-trap/.