Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799886018
Category : Technology & Engineering
Languages : en
Pages : 837

Get Book Here

Book Description
Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799886018
Category : Technology & Engineering
Languages : en
Pages : 837

Get Book Here

Book Description
Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

Research Anthology on Privatizing and Securing Data

Research Anthology on Privatizing and Securing Data PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799889556
Category : Computers
Languages : en
Pages : 2188

Get Book Here

Book Description
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.

Research Anthology on Concepts, Applications, and Challenges of FinTech

Research Anthology on Concepts, Applications, and Challenges of FinTech PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799886034
Category : Business & Economics
Languages : en
Pages : 671

Get Book Here

Book Description
FinTech, an abbreviated term for financial technology, is a digital revolution changing the way banking and financial services are being used both by individuals and businesses. As these changes continue to take place, the financial industry is focused on technological innovation and feeding into this digital revolution to better serve consumers who are looking for easier ways to invest, transfer money, use banking services, and more. FinTech is increasing accessibility to financial services, automating these services, expanding financial options, and enabling online payments and banking. While the benefits are being continually seen and this technology is becoming more widely accepted, there are still challenges facing the technology that include security concerns. To understand FinTech and its role in society, both the benefits and challenges must be reviewed and discussed for a holistic view on the digital innovations changing the face of the financial industry. The Research Anthology on Concepts, Applications, and Challenges of FinTech covers the latest technologies in FinTech with a comprehensive view of the impact on the industry, where these technologies are implemented, how they are improving financial services, and the security applications and challenges being faced. The chapters cover the options FinTech has unlocked, such as mobile banking and virtual transactions, while also focusing on the workings of the technology itself and security applications, such as blockchain and cryptocurrency. This book is a valuable reference tool for accountants, bankers, financial planners, financial analysts, business managers, economists, computer scientists, academicians, researchers, financial professionals, and students.

Research Anthology on Artificial Intelligence Applications in Security

Research Anthology on Artificial Intelligence Applications in Security PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799877485
Category : Computers
Languages : en
Pages : 2253

Get Book Here

Book Description
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.

Digital Technologies and Applications

Digital Technologies and Applications PDF Author: Saad Motahhir
Publisher: Springer Nature
ISBN: 3031019423
Category : Technology & Engineering
Languages : en
Pages : 867

Get Book Here

Book Description
This book presents Volume 1 of selected research papers presented at the Second International Conference on Digital Technologies and Applications (ICDTA 22), held at Sidi Mohamed Ben Abdellah University, Fez, Morocco, on January 28–29, 2022. This book highlights the latest innovations in digital technologies as: artificial intelligence, Internet of Things, embedded systems, network technology, information processing and their applications in several areas as hybrid vehicles, renewable energy, mechatronics, medicine... This book will encourage and inspire researchers, industry professionals, and policymakers to put these methods into practice.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799853403
Category : Computers
Languages : en
Pages : 2700

Get Book Here

Book Description
Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. The Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing is a vital reference source that provides valuable insight into current and emergent research occurring within the field of distributed computing. It also presents architectures and service frameworks to achieve highly integrated distributed systems and solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting a range of topics such as data sharing, wireless sensor networks, and scalability, this multi-volume book is ideally designed for system administrators, integrators, designers, developers, researchers, academicians, and students.

Cloud Security

Cloud Security PDF Author: Jamuna S Murthy
Publisher: CRC Press
ISBN: 1040103685
Category : Computers
Languages : en
Pages : 346

Get Book Here

Book Description
This comprehensive work surveys the challenges, the best practices in the industry, and the latest developments and technologies. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of cloud computing, followed by critical aspects of cloud security, including risk management, threat analysis, data protection, identity and access management, and compliance. Cloud Security explores the latest security technologies, such as encryption, multi‐factor authentication, and intrusion detection and prevention systems, and their roles in securing the cloud environment. Features: Introduces a user-centric measure of cyber security and provides a comparative study on different methodologies used for cyber security Offers real-world case studies and hands-on exercises to give a practical understanding of cloud security Includes the legal and ethical issues, including the impact of international regulations on cloud security Covers fully automated run-time security and vulnerability management Discusses related concepts to provide context, such as Cyber Crime, Password Authentication, Smart Phone Security with examples This book is aimed at postgraduate students, professionals, and academic researchers working in the fields of computer science and cloud computing.

Handbook of Big Data and Analytics in Accounting and Auditing

Handbook of Big Data and Analytics in Accounting and Auditing PDF Author: Tarek Rana
Publisher: Springer Nature
ISBN: 9811944601
Category : Business & Economics
Languages : en
Pages : 564

Get Book Here

Book Description
This handbook collects the most up-to-date scholarship, knowledge, and new developments of big data and data analytics by bringing together many strands of contextual and disciplinary research. In recent times, while there has been considerable research in exploring the role of big data, data analytics, and textual analytics in accounting, and auditing, we still lack evidence on what kinds of best practices academics, practitioners, and organizations can implement and use. To achieve this aim, the handbook focuses on both conventional and contemporary issues facing by academics, practitioners, and organizations particularly when technology and business environments are changing faster than ever. All the chapters in this handbook provide both retrospective and contemporary views and commentaries by leading and knowledgeable scholars in the field, who offer unique insights on the changing role of accounting and auditing in today’s data and analytics driven environment. Aimed at academics, practitioners, students, and consultants in the areas of accounting, auditing, and other business disciplines, the handbook provides high-level insight into the design, implementation, and working of big data and data analytics practices for all types of organizations worldwide. The leading scholars in the field provide critical evaluations and guidance on big data and data analytics by illustrating issues related to various sectors such as public, private, not-for-profit, and social enterprises. The handbook’s content will be highly desirable and accessible to accounting and non-accounting audiences across the globe.

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity PDF Author: Lobo, Victor
Publisher: IGI Global
ISBN: 1799894320
Category : Computers
Languages : en
Pages : 292

Get Book Here

Book Description
The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.

Redefining Security With Cyber AI

Redefining Security With Cyber AI PDF Author: Omar, Marwan
Publisher: IGI Global
ISBN:
Category : Computers
Languages : en
Pages : 287

Get Book Here

Book Description
In the rapidly evolving digital landscape, the importance of cybersecurity has never been more critical. With the increasing sophistication of cyber threats, traditional security measures often fall short in providing adequate protection. Cyber artificial intelligence (AI) offers advanced capabilities to detect, prevent, and respond to attacks in real time. As cyber threats continue to grow in complexity and frequency, the integration of AI into cybersecurity frameworks is not just advantageous but essential for maintaining robust and resilient defenses. Redefining Security With Cyber AI delves into the profound transformation of security paradigms brought about by the advent of AI. This book explores the intricate dance between the ever-expanding frontiers of digital technology and the AI-driven mechanisms that aim to safeguard them. Covering topics such as artificial neural networks, intrusion detection, and large language models, this book is an excellent resource for cybersecurity professionals, AI and machine learning researchers, IT executives and managers, policy makers and regulators, postgraduate students and educators, academicians, and more.