This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.
This book constitutes the refereed proceedings of the 13th International Conference on Persuasive Technology, PERSUASIVE 2018, held in Waterloo, ON, Canada, in April 2018.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building.
This book investigates the spaces where architecture and computer science share a common set of assumptions and goals, using methods and objectives from architecture, ethnography, and human-computer interaction (HCI).
As we begin a new century, the astonishing spread of nationally and internationally accessible computer-based communication networks has touched the imagination of people everywhere.
This book constitutes the thoroughly refereed proceedings of the 4th International Conference on Geographical Information Systems Theory, Applications and Management, GISTAM 2018, held in Funchal, Madeira, Portugal, in March 2018.
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.
This book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2020, held in Shenzhen, China, in November 2020.
Developing usable, useful, and appealing solutions for the customer or user experience requires customization according to specific users' needs amidst frequently changing physical and social environments.
The two-volume set LNCS 9184-9185 constitutes the constitutes the refereed proceedings of the 6th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015.
This volume comprises research papers presented at the International Conference on Informatics and Communication Technologies for Societal Development (ICICTS 2014) held at Karunya University, India.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
Predictive Intelligence in Biomedical and Health Informatics focuses on imaging, computer-aided diagnosis and therapy as well as intelligent biomedical image processing and analysis.
In view of the ever-increasing use of interactive and emerging technologies in museum spaces, Museums and Technologies of Presence rethinks the role of such technologies as potential facilitators of presence and as vehicles for offering new, immersive, and embodied visitor experiences.
This book constitutes the refereed post-conference proceedings of the 5th European Conference on Information Literacy, ECIL 2017, held in Saint Malo, France, in September 2017.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This volume contains the proceedings of the Third KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2009)--held at Uppsala University in Sweden during June 3-5, 2009.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security.
This volume contains the proceedings of the Third International Conference on Service-Oriented Computing (ICSOC 2005), that took place in Amsterdam, The Netherlands, December 12-15, 2005.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
This book constitutes the refereed proceedings of the 7th International Conference on Computational Data and Social Networks, CSoNet 2018, held in Shanghai, China, in December 2018.
This Handbook is a detailed introduction to the numerous academic perspectives that apply to the study of the internet as a political, social and communicative phenomenon.
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools.
This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), held April 19-21, 2006 in York, UK.
This Handbook is a detailed introduction to the numerous academic perspectives that apply to the study of the internet as a political, social and communicative phenomenon.
The book Intelligent Healthcare: Infrastructure, Algorithms, and Management(R) cover a wide range of research topics on innovative intelligent healthcare solutions and advancements with the latest research developments.
Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, künstlicher Intelligenz und lernenden Systemen eingestellt.
This book constitutes the refereed proceedings of the 8th International Conference on Computational Data and Social Networks, CSoNet 2019, held in Ho Chi Minh City, Vietnam, in November 2019.
This book constitutes revised selected papers from the 4th European Conference on Information Literacy, ECIL 2016, held in Prague, Czech Republic, in October 2016.
This volume constitutes the thoroughly refereed post-conference proceedings of the First EAI International Summit, Smart City 360(deg), held in Bratislava, Slovakia and Toronto, ON, Canada, in October 2015.