Search
Search Results
-
Information Experience and Information Literacy 8th European Conference on Information Literacy, ECIL 2023, Kraków, Poland, October 9–12, 2023, Revised Selected Papers, Part I
The two-volume set CCIS 2042 and 2043 constitutes the refereed proceedings of the 8th European Conference on Information Literacy, ECIL 2023, held in... -
Decentralized Privacy Preservation in Smart Cities
This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities...
-
Decision Making and Security Risk Management for IoT Environments
This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The... -
Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research
This book explores the connections between qualitative data reuse, big social research, and data curation. A review of existing literature identifies... -
Information Security Planning A Practical Approach
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the...
-
Introduction to Cybersecurity A Multidisciplinary Challenge
This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted...
-
Cognitive Computing – ICCC 2023 7th International Conference Held as Part of the Services Conference Federation, SCF 2023 Shenzhen, China, December 17-18, 2023 Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China, during...
-
Blockchains A Handbook on Fundamentals, Platforms and Applications
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The... -
Cyber Crisis Management Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation
Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden... -
Android Malware Detection and Adversarial Methods
The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...
-
Privacy-Preserving Data Search in Cloud Storage
This chapter introduces a secure and efficient multi-user data search scheme for cloud storage. The scheme relies on garbled bloom and cuckoo filters... -
Privacy-Preserving Cross-Domain Authentication in Internet of Things
This chapter introduces a unified blockchain-assisted framework for secure cross-domain authorization and authentication in smart city IoT... -
Introduction to Usable Privacy
This introductory chapter first discusses the significance of privacy and informational self-determination as a basic human right for individuals and... -
Overview of Usable Privacy Research: Major Themes and Research Directions
A wide variety of literature exists on privacy across different communities and disciplines, including Human-Computer Interaction (HCI). Privacy... -
Challenges of Usable Privacy
A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding... -
Considerations and Challenges
As with any new technology, continuous biometric authentication systems have a variety of considerations and challenges that must be addressed before... -
Applied Cryptography
This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:... -
Network Security
This chapter presents a number of common ways of protecting systems against various forms of attack via the network. These include:... -
Incident Handling and System Availability
This chapter 1 focuses on how to react if, despite all precautions, an attack or other incident leads to a security breach. This is largely a... -
Epilogue
This concluding chapter considers the question of whether in practice t is possible to achieve the aim of having true cybersecurity. It reviews in...