This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
This book constitutes the refereed proceedings of the 6th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2017, held in Lyon, France, in August 2017.
This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020.
This book covers user experience methods and tools in designing user friendly products and servicesby encompassing widely utilized successful methods, including elicitation, analysis and establishment of requirements, collaborative idea generation with design teams and intended users, prototype testing and evaluation of the user experience through empirical and non empirical means.
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.
The book examines the integration of IoT, Blockchain, and Smart Healthcare, providing a comprehensive analysis of these advanced technologies and their impact on the healthcare industry.
This book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.
This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016.
This book examines central aspects of the new technologies and the legal questions raised by them from both an international and an inter-disciplinary perspective.
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.
This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR).
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Image Analysis and Recognition, ICIAR 2018, held in Povoa de Varzim, Portugal, in June 2018.
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.
This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017.
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.
This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018.
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2018, held in Regensburg, Germany, in September 2018.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.
The Concept Contractual Management offers a holistic approach to managerial decision-making based on contracts or business processes that are related to contracts.
Patricia Lotz behandelt Rechtsfragen zum Einsatz moderner Marketingformen und gibt einen ersten Überblick über die Fallstricke, die sich dem E-Commerce in Zukunft vor allem im Bereich des Datenschutzes stellen werden.
Der IT-Sicherheitsexperte Alexander Dörsam entführt Sie mit seinem Buch in die spannende Welt von Hacking, Unternehmenserpressung, Spionage und digitalem Vandalismus.
Das Buch sensibilisiert den Praktiker für die rechtlichen Risiken, die die Digitalisierung im Gesundheitswesen mit sich bringt und bietet Lösungsansätze.
This book presents a comparative study on access to public information in the context of the main legal orders worldwide(inter alia China,France,Germany,Japan,Russia,Sweden,United States).
Das vorliegende Buch richtet sich an Verantwortliche aus kleinen, mittleren und großen Unternehmen und beschreibt die Vorgehensweise zur Implementierung eines Datenschutzmanagementsystems (DSMS).
In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können.
This book looks at the integration of blockchain technology in healthcare settings, focusing on its potential to address security and privacy concerns of medical applications.