This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in December 2015.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
Cyber Victimology provides a global socio-legal-victimological perspective on victimisation online, written in clear, non-technical terms, and presents practical solutions for the problem.
Digital Playgrounds explores the key developments, trends, debates, and controversies that have shaped children's commercial digital play spaces over the past two decades.
This book constitutes therefereed proceedings of the 11th International Conference on PersuasiveTechnology, PERSUASIVE 2016, held in Salzburg, Austria, in April 2016.
Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies.
This book constitutes the thoroughly refereed proceedings of the 4th Iberoamerican Workshop on Human-Computer Interaction, HCI-Collab 2018, held in Popayan, Colombia, in April 2018.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Image Analysis and Recognition, ICIAR 2017, held in Montreal, QC, Canada, in July 2017.
This edited volume presents current perspectives on the innovative use of Information and Communication Technologies (ICT) as an integral part of the changing nature of work.
The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019.
The two-volume set LNCS 8547 and 8548 constitutes the refereed proceedings of the 14th International Conference on Computers Helping People with Special Needs, ICCHP 2014, held in Paris, France, in July 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018.
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers.
This volume explores how aspects of a situation interact with characteristics of a person to explain our technologically supported social interactions.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK.
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practices.
Recent technological advances have resulted in a new generation of powerful text processing and generation tools, that produce text very similar to what a human could do.
This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
The entrance of fast-paced technology into the workplace necessitates a proper re-look into performance management whether it is in education, marketing, finance, or information technology.
Covering key areas of evaluation and methodology, client-side applications, specialist and novel technologies, along with initial appraisals of disabilities, this important book provides comprehensive coverage of web accessibility.
This book constitutes the refereed post-conference proceedings of the First International Workshop on Mobility Analytics for Spatio-Temporal and Social Data, MATES 2017, held in Munich, Germany, in September 2017.
This book constitutes the refereed proceedings of the 7th International Conference on Well-Being in the Information Society, WIS 2018, held in Turku, Finland, in August 2018.
This book explores the impact of technology on Human Resource (HR) practices and how organisations can effectively incorporate progress in technology to improve HR processes.
Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society presents different views about how terrorist actions are influencing political and social discussions and decisions, and it covers questions related to legitimacy and power in the Information Society.
This is the first book to show how digitalisation and the better provision of information and communication technologies (ICTs) can improve access to a wide-range of social services, as well as make them more inclusive.
This volume looks at the forms and functions of counterspeech as well as what determines its effectiveness and success from multidisciplinary perspectives.
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools.
This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2022, which was held in Zanzibar, Tanzania, in December 2022.
Das Buch Künstliche Intelligenz für Lehrkräfte führt die zentralen Ansätze und Gebiete der KI fundiert und insbesondere für Informatiklehrkräfte aufbereitet ein.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011.