This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
This book examines the latest developments in Artificial Intelligence (AI)-based metaheuristics algorithms with applications in information security for digital media.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
The Next Generation Innovation in IoT and Cloud Computing with Applications is a thought-provoking edited book that explores the cutting-edge advancements and transformative potential of the Internet of Things (IoT) and cloud computing.
By enabling the conversion of traditional manufacturing systems into contemporary digitalized ones, Internet of Things (IoT) adoption in manufacturing creates huge economic prospects through reshaping industries.
On the back of their last book, Cyber-risk and Youth, and building on a new research project, Adorjan and Ricciardelli marshal current research to explore parenting in the digital age.
Offering a holistic view of the pioneering trends and innovations in smart healthcare management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intelligent healthcare systems and emerging applications in the present era.
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "e;learn-by-doing"e; approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
The Naked Android: Synthetic Socialness and the Human Gaze illuminates the connection between the stories people tell, their expectations of what a robot is, and how these beliefs and values manifest in how real robots are designed and used.
Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type.
This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering.
Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools.
Although it has influenced the field of Human-Computer Interaction (HCI) since its origins, humanistic HCI has come into its own since the early 2000s.
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated.
Algebraic Structures in Natural Language addresses a central problem in cognitive science concerning the learning procedures through which humans acquire and represent natural language.
"e;Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST on Auctions, Market Mechanisms and Their Applications (AMMA 2011) held in New York, USA, August 22-23, 2011.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
Whilst Information Systems has the potential to widen our view of the world, it often has the opposite effect by limiting our ability to interact, facilitating managerial and state surveillance or instituting strict hierarchies and personal control.