Handbook of Research on Social and Organizational Liabilities in Information Security

Handbook of Research on Social and Organizational Liabilities in Information Security PDF Author: Gupta, Manish
Publisher: IGI Global
ISBN: 1605661333
Category : Law
Languages : en
Pages : 596

Get Book Here

Book Description
"This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher.

Handbook of Research on Social and Organizational Liabilities in Information Security

Handbook of Research on Social and Organizational Liabilities in Information Security PDF Author: Gupta, Manish
Publisher: IGI Global
ISBN: 1605661333
Category : Law
Languages : en
Pages : 596

Get Book Here

Book Description
"This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher.

Dictionary of Information Science and Technology

Dictionary of Information Science and Technology PDF Author: Mehdi Khosrowpour
Publisher: IGI Global
ISBN: 1466626747
Category : Language Arts & Disciplines
Languages : en
Pages : 1353

Get Book Here

Book Description
"The 2nd edition of the Dictionary of Information Science and Technology is an updated compilation of the latest terms and definitions, along with reference citations, as they pertain to all aspects of the information and technology field"--Provided by publisher.

Handbook of Research on Cybersecurity Risk in Contemporary Business Systems

Handbook of Research on Cybersecurity Risk in Contemporary Business Systems PDF Author: Adedoyin, Festus Fatai
Publisher: IGI Global
ISBN: 1668472090
Category : Computers
Languages : en
Pages : 467

Get Book Here

Book Description
The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and wi-fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. The Handbook of Research on Cybersecurity Risk in Contemporary Business Systems examines current risks involved in the cybersecurity of various business systems today from a global perspective and investigates critical business systems. Covering key topics such as artificial intelligence, hacking, and software, this reference work is ideal for computer scientists, industry professionals, policymakers, researchers, academicians, scholars, instructors, and students.

Continuous Authentication Using Biometrics: Data, Models, and Metrics

Continuous Authentication Using Biometrics: Data, Models, and Metrics PDF Author: Traore, Issa
Publisher: IGI Global
ISBN: 1613501307
Category : Computers
Languages : en
Pages : 294

Get Book Here

Book Description
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

pHealth 2019

pHealth 2019 PDF Author: B. Blobel
Publisher: IOS Press
ISBN: 1614999759
Category : Medical
Languages : en
Pages : 346

Get Book Here

Book Description
Smart mobile systems like micro-systems, smart textiles and implants and sensor-controlled medical devices, together with related networks and cloud services, are important enablers for telemedicine and pervasive health to become the next generation of health services. Social media and gamification have added further to pHealth as an ecosystem. This book presents the proceedings of pHealth 2019, the 16th in a series of international conferences on personalized health, held in Genoa, Italy, from 10 – 12 June 2019. The book includes 1 keynote, 2 of 4 invited talks, 36 oral presentations and 7 poster presentations from a total of 141 international authors. All submissions were critically reviewed by at least two independent experts and a member of the Scientific Program Committee. This process resulted in a full paper rejection rate of more than 30%. Besides wearable or implantable micro and nano technologies for personalized medicine, this volume addresses topics such as legal, ethical, social, and organizational requirements and impacts as well as necessary basic research for enabling future proof care paradigms. Such participatory, predictive, personalized, preventive, and effective care settings combine medical services and public health, prevention, social and elderly care, but also wellness and personal fitness. The multilateral benefits of pHealth technologies for all stakeholder communities offer enormous potential for the improvement of both care quality and industrial competitiveness, and also for the management of health care costs. Hence, the book will be of interest to all those involved in the provision of healthcare.

Advances in Robot Design and Intelligent Control

Advances in Robot Design and Intelligent Control PDF Author: Aleksandar Rodić
Publisher: Springer
ISBN: 3319490583
Category : Technology & Engineering
Languages : en
Pages : 651

Get Book Here

Book Description
This book presents the proceedings of the 25th International Conference on Robotics in Alpe-Adria-Danube Region, RAAD 2016 held in Belgrade, Serbia, on June 30th–July 2nd, 2016. In keeping with the tradition of the event, RAAD 2016 covered all the important areas of research and innovation in new robot designs and intelligent robot control, with papers including Intelligent robot motion control; Robot vision and sensory processing; Novel design of robot manipulators and grippers; Robot applications in manufacturing and services; Autonomous systems, humanoid and walking robots; Human–robot interaction and collaboration; Cognitive robots and emotional intelligence; Medical, human-assistive robots and prosthetic design; Robots in construction and arts, and Evolution, education, legal and social issues of robotics. For the first time in RAAD history, the themes cloud robots, legal and ethical issues in robotics as well as robots in arts were included in the technical program. The book is a valuable resource for researchers in fields of robotics, engineers who implement robotic solutions in manufacturing, services and healthcare, and master’s and Ph.D. students working on robotics projects.

Cyber Crime: Concepts, Methodologies, Tools and Applications

Cyber Crime: Concepts, Methodologies, Tools and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1613503245
Category : Computers
Languages : en
Pages : 1885

Get Book Here

Book Description
Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.

Advances in Multi-Sensor Information Fusion: Theory and Applications 2017

Advances in Multi-Sensor Information Fusion: Theory and Applications 2017 PDF Author: Xue-Bo Jin
Publisher: MDPI
ISBN: 3038429333
Category : Technology & Engineering
Languages : en
Pages : 569

Get Book Here

Book Description
This book is a printed edition of the Special Issue "Advances in Multi-Sensor Information Fusion: Theory and Applications 2017" that was published in Sensors

Encyclopedia of Information Science and Technology, Third Edition

Encyclopedia of Information Science and Technology, Third Edition PDF Author: Khosrow-Pour, Mehdi
Publisher: IGI Global
ISBN: 1466658894
Category : Computers
Languages : en
Pages : 7972

Get Book Here

Book Description
"This 10-volume compilation of authoritative, research-based articles contributed by thousands of researchers and experts from all over the world emphasized modern issues and the presentation of potential opportunities, prospective solutions, and future directions in the field of information science and technology"--Provided by publisher.

Current Approaches in Applied Artificial Intelligence

Current Approaches in Applied Artificial Intelligence PDF Author: Moonis Ali
Publisher: Springer
ISBN: 3319190660
Category : Computers
Languages : en
Pages : 760

Get Book Here

Book Description
This book constitutes the refereed conference proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2015, held in Seoul, South Korea, in June 2015. The 73 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers cover a wide range of topics in applied artificial intelligence including reasoning, robotics, cognitive modeling, machine learning, pattern recognition, optimization, text mining, social network analysis, and evolutionary algorithms. They are organized in the following topical sections: theoretical AI, knowledge-based systems, optimization, Web and social networks, machine learning, classification, unsupervised learning, vision, image and text processing, and intelligent systems applications.