The chapters in this book explore the main domains that represent considerable risks for the respect of privacy, such as education, health, finance or social media.
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held in Torino, Italy, in August/September 2008 within the DEXA 2008 conference cluster.
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems.
With the ongoing evolution of the digital society challenging the boundaries of the law, new questions are arising - and new answers being given - even now, almost three decades on from the digital revolution.
Fostering Women's Engagement in STEM Through Education: A Cross-Cultural Academic-Industry Journey uniquely intertwines academic rigour with real-world impact, offering a comprehensive exploration of science, technology, engineering, and mathematics (STEM) experiences forged through the Partnership for Innovation in Employability (PIE) programme.
This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS).
In this book, we have set up a unified analytical framework for various human-robot systems, which involve peer-peer interactions (either space-sharing or time-sharing) or hierarchical interactions.
This book provides in-depth information about the technical, legal, and policy issues that are raised when humans and artificially intelligent machines are enhanced by technology.
Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data-if that is indeed possible.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.
In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können.
Patricia Lotz behandelt Rechtsfragen zum Einsatz moderner Marketingformen und gibt einen ersten Überblick über die Fallstricke, die sich dem E-Commerce in Zukunft vor allem im Bereich des Datenschutzes stellen werden.
Patricia Lotz behandelt Rechtsfragen zum Einsatz moderner Marketingformen und gibt einen ersten Überblick über die Fallstricke, die sich dem E-Commerce in Zukunft vor allem im Bereich des Datenschutzes stellen werden.
In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können.