Mobile Heritage explores how diverse digital technologies (such as apps, GPS, games, social platforms, NFTs, drones, AR, MR, and AI, among others) have allowed for new types of mobilities and introduced a novel set of practices, interventions, and politics for heritage collections, archives, exhibitions, entertainment, conservation, management, commerce, education, restitution, activism, and regulation.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
This book explores the potential of artificial intelligence (AI) to transform public relations (PR) and offers guidance on maintaining authenticity in this new era of communication.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks.
A revealing and gripping investigation into how social media platforms police what we post online—and the large societal impact of these decisions Most users want their Twitter feed, Facebook page, and YouTube comments to be free of harassment and porn.
Interactive media are a human-machine interface that allows people to connect with each other by making them active participants in the media they consume through text, graphics, audio and video.
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.
In an increasingly interconnected digital realm, Ubiquitous and Transparent Security: Challenges and Applications emerges as a guiding beacon through the intricate web of modern cybersecurity.
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.
This book offers a comprehensive overview from diverse perspectives of online gaming technology, policy, and experiments to understand and review the Indian approach.
In a world increasingly driven by technology, this book explores the intersection of artificial intelligence (AI), IoT, and Cloud Computing and women's safety, highlighting the transformative potential of technology in safeguarding women's well-being in the physical and the digital world.
Digital transformation has become more than a buzzword from the media since companies figured out the importance of rethinking business processes during global challenges.
The book examines the integration of IoT, Blockchain, and Smart Healthcare, providing a comprehensive analysis of these advanced technologies and their impact on the healthcare industry.
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practices.
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting.
Combating white-collar crime is a challenge as these criminals are found among the most powerful members of society, including politicians, business executives, and government officials.
This book provides a comprehensive overview of security and privacy challenges in 6G networks, addressing the urgent need for advanced security frameworks as the next generation of wireless technology emerges.
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
The increasing prominence of generative AI across various industries presents an abundance of opportunities for integration within the healthcare sector.
While the Industrial Internet of Things (IIoT) continues to redefine industrial infrastructure, the need for thriving Cybersecurity measures has never been more pressing.
This volume looks at the forms and functions of counterspeech as well as what determines its effectiveness and success from multidisciplinary perspectives.
Design and assemble an inexpensive yet fast and reliable PCConstruct the PC of your dreams using the practical information contained in this hands-on guide.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018.