LEADER 05755nam 2200721 a 450 001 9910141299203321 005 20230912155313.0 010 $a1-299-18932-6 010 $a1-118-24132-0 010 $a1-118-24153-3 010 $a1-118-24148-7 035 $a(CKB)2670000000166885 035 $a(EBL)818205 035 $a(SSID)ssj0000633925 035 $a(PQKBManifestationID)11386595 035 $a(PQKBTitleCode)TC0000633925 035 $a(PQKBWorkID)10623475 035 $a(PQKB)11069962 035 $a(Au-PeEL)EBL818205 035 $a(CaPaEBR)ebr10630610 035 $a(CaONFJC)MIL450182 035 $a(CaSebORM)9781118241325 035 $a(MiAaPQ)EBC818205 035 $a(OCoLC)793103968 035 $a(MiAaPQ)EBC4471045 035 $a(EXLCZ)992670000000166885 100 $a20110824d2012 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCyber security policy guidebook$b[electronic resource] /$fJennifer L. Bayuk ... [et al.] 205 $aFirst edition 210 $aHoboken, N.J. $cWiley$dc2012 215 $a1 online resource (xvi, 270 pages) $cillustrations 300 $aDescription based upon print version of record. 311 $a1-118-02780-9 320 $aIncludes bibliographical references (p. 255-265) and index. 327 $aCyber Security Policy Guidebook; Contents; Foreword; Preface; Acknowledgments; 1: Introduction; 1.1 What Is Cyber Security?; 1.2 What Is Cyber Security Policy?; 1.3 Domains of Cyber Security Policy; 1.3.1 Laws and Regulations; 1.3.2 Enterprise Policy; 1.3.3 Technology Operations; 1.3.4 Technology Configuration; 1.4 Strategy versus Policy; 2: Cyber Security Evolution; 2.1 Productivity; 2.2 Internet; 2.3 e-Commerce; 2.4 Countermeasures; 2.5 Challenges; 3: Cyber Security Objectives; 3.1 Cyber Security Metrics; 3.2 Security Management Goals; 3.3 Counting Vulnerabilities; 3.4 Security Frameworks 327 $a3.4.1 e-Commerce Systems3.4.2 Industrial Control Systems; 3.4.3 Personal Mobile Devices; 3.5 Security Policy Objectives; 4: Guidance for Decision Makers; 4.1 Tone at the Top; 4.2 Policy as a Project; 4.3 Cyber Security Management; 4.3.1 Arriving at Goals; 4.3.2 Cyber Security Documentation; 4.4 Using the Catalog; 5: The Catalog Approach; 5.1 Catalog Format; 5.2 Cyber Security Policy Taxonomy; 6: Cyber Security Policy Catalog; 6.1 Cyber Governance Issues; 6.1.1 Net Neutrality; 6.1.2 Internet Names and Numbers; 6.1.3 Copyrights and Trademarks; 6.1.4 Email and Messaging; 6.2 Cyber User Issues 327 $a6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems 327 $a7: One Government's Approach to Cyber Security Policy7.1 U.S. Federal Cyber Security Strategy; 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government; 7.2.1 The Bombing of New York's World Trade Center on February 26, 1993; 7.2.2 Cyber Attacks against the United States Air Force, March-May 1994: Targeting the Pentagon; 7.2.3 The Citibank Caper, June-October, 1994: How to Catch a Hacker; 7.2.4 Murrah Federal Building, Oklahoma City-April 19, 1995: Major Terrorism Events and Their U.S. Outcomes 327 $a7.2.5 President's Commission on Critical Infrastructure Protection-19967.2.6 Presidential Decision Directive 63-1998; 7.2.7 National Infrastructure Protection Center (NIPC) and ISACs-1998; 7.2.8 Eligible Receiver-1997; 7.2.9 Solar Sunrise-1998; 7.2.10 Joint Task Force-Computer Network Defense (JTF-CND)-1998; 7.2.11 Terrorist Attacks against the United States-September 11, 2001 Effects of Catastrophic Events on Transportation System Management and Operations; 7.2.12 U.S. Government Response to the September 11, 2001 Terrorist Attacks; 7.2.13 Homeland Security Presidential Directives 327 $a7.2.14 National Strategies 330 $a"Drawing upon a wealth of experience from academia, industry, and government service, this book details and dissects current organizational cybersecurity policy issues on a global scale. Using simple language, it includes a thorough description of each issue, lists pros and cons, documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. It also equips the reader with descriptions of the impact of specific policy choices, both positive and negative. This book gives students, scholars, and technical decision-makers the necessary knowledge of cybersecurity policy in order to make more informed decisions"--Provided by publisher. 410 0$aWiley UBCM ebooks. 606 $aInformation technology$xGovernment policy 606 $aComputer security$xGovernment policy 606 $aData protection$xGovernment policy 615 0$aInformation technology$xGovernment policy. 615 0$aComputer security$xGovernment policy. 615 0$aData protection$xGovernment policy. 676 $a005.8 686 $aCOM053000$2bisacsh 701 $aBayuk$b Jennifer L$0927328 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910141299203321 996 $aCyber security policy guidebook$92083552 997 $aUNINA LEADER 07980nam 22007215 450 001 9910760274703321 005 20251113174416.0 010 $a3-031-46661-6 024 7 $a10.1007/978-3-031-46661-8 035 $a(MiAaPQ)EBC30867590 035 $a(Au-PeEL)EBL30867590 035 $a(DE-He213)978-3-031-46661-8 035 $a(CKB)28781933700041 035 $a(EXLCZ)9928781933700041 100 $a20231104d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Data Mining and Applications $e19th International Conference, ADMA 2023, Shenyang, China, August 21?23, 2023, Proceedings, Part I /$fedited by Xiaochun Yang, Heru Suhartanto, Guoren Wang, Bin Wang, Jing Jiang, Bing Li, Huaijie Zhu, Ningning Cui 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (848 pages) 225 1 $aLecture Notes in Artificial Intelligence,$x2945-9141 ;$v14176 311 08$aPrint version: Yang, Xiaochun Advanced Data Mining and Applications Cham : Springer,c2023 9783031466601 320 $aIncludes bibliographical references and index. 327 $aTime Series -- An Adaptive Data-Driven Imputation Model for Incomplete Event Series -- From Time Series to Multi-Modality: Classifying Multivariate Time Series via Both 1D and 2D Representations -- Exploring the Effectiveness of Positional Embedding on Transformer-based Architectures for Multivariate Time Series Classification -- Modeling of Repeated Measures for Time-to-Event Prediction -- A Method for Identifying the Timeliness of Manufacturing Data Based on Weighted Timeliness Graph -- STAD: Multivariate Time Series Anomaly Detection Based on Spatio-temporal Relationship -- Recommendation I -- Refined Node Type Graph Convolutional Network for Recommendation -- Multi-level Noise Filtering and Preference Propagation Enhanced Knowledge Graph Recommendation -- Enhancing Knowledge-aware Recommendation with Contrastive Learning -- Knowledge-Rich Influence Propagation Recommendation Algorithm Based on Graph Attention Networks -- A Novel Variational Autoencoder with Multi-Position Latent Self-Attention and Actor-Critic for Recommendation -- Fair Re-ranking Recommendation Based on Debiased Multi-Graph Representations -- Information Extraction -- FastNER: Speeding Up Inferences for Named Entity Recognition Tasks -- CPMFA: A Character Pair-Based Method for Chinese Nested Named Entity Recognition -- STMC-GCN: A Span Tagging Multi-Channel Graph Convolutional Network for Aspect Sentiment Triplet Extraction -- Exploring the Design Space of Unsupervised Blocking with Pre-trained Language Models in Entity Resolution -- Joint Modeling of Local and Global Semantics for Contrastive Entity Disambiguation -- Fine-grained Review Analysis using BERT with Attention: A Categorical and Rating-based Approach -- Emotional Analysis -- Discovery of Emotion Implicit Causes in Products based on Commonsense Reasoning -- Multi-modal Multi-emotion Emotional Support Conversation -- Exploiting Pseudo Future Contexts for Emotion Recognition in Conversations -- Generating Enlightened Suggestions based on Mental State Evolution for Emotional Support Conversation -- Deep One-Class Fine-Tuning for Imbalanced Short Text Classification in Transfer Learning -- EmoKnow: Emotion- and Knowledge-oriented Model for COVID-19 Fake News Detection -- Popular Songs: The Sentiment Surrounding the Conversation -- Market Sentiment Analysis based on Social Media and Trading Volume for Asset Price Movement Prediction -- Data Mining -- Efficient mining of high utility co-location patterns based on a query strategy -- Point-level Label-free Segmentation Framework for 3D Point Cloud Semantic Mining -- CD-BNN: Causal Discovery with Bayesian Neural Network -- A Preference-based Indicator Selection Hyper-heuristic for Optimization Problems -- An Elastic Scalable Grouping for Stateful Operators in Stream Computing Systems -- Incremental natural gradient boosting for probabilistic regression -- Discovering Skyline Periodic Itemset Patterns in Transaction Sequences -- Double-optimized CS-BP Anomaly Prediction for Control Operation Data -- Bridging the Interpretability Gap in Coupled Neural Dynamical Models -- Multidimensional Adaptative kNN Over Tracking Outliers (Makoto) -- Traffic -- MANet: An End-to-End Multiple Attention Network for Extracting Roads around EHV Transmission Lines from High-Resolution Remote Sensing Images -- Deep Reinforcement Learning for Solving the Trip Planning Query -- MDCN: Multi-Scale Dilated Convolutional Enhanced Residual Network for Traffic Sign Detection -- Identifying Critical Congested Roads based on Traffic Flow-Aware Road Network Embedding -- A Cross-Region-based Framework for Supporting Car-Sharing -- Attention-based Spatial-Temporal Graph Convolutional Recurrent Networks for Traffic Forecasting -- Transformer Based Driving Behavior Safety Prediction For New Energy Vehicles -- Graph Convolution Recurrent Denoising Diffusion Model for Multivariate Probabilistic Temporal Forecasting -- A Bottom-Up Sampling Strategy for Reconstructing Geospatial Data from Ultra Sparse Inputs -- Recommendation II -- Feature Representation Enhancing by Context Sensitive Information in CTR Prediction -- ProtoMix: Learnable Data Augmentation on Few-shot Features with Vector Quantization in CTR Prediction -- When Alignment Makes a Difference: A Content-Based Variational Model for Cold-Start CTR Prediction -- Dual-Ganularity Contrastive Learning for Session-based Recommendation -- Efficient Graph Collaborative Filtering with Multi-layer Output-enhanced Contrastive Learning -- Influence Maximization with Tag Revisited: Exploiting the Bi-Submodularity of the Tag-Based Influence Function -- Multi-Interest Aware Graph Convolution Network for Social Recommendation -- Enhancing MultimediaRecommendation through Item-Item Semantic Denoising and Global Preference Awareness -- Resident-based Store Recommendation Model for Community Commercial Planning.c. 330 $aThis book constitutes the refereed proceedings of the 19th International Conference on Advanced Data Mining and Applications, ADMA 2023, held in Shenyang, China, during August 21?23, 2023. The 216 full papers included in this book were carefully reviewed and selected from 503 submissions. They were organized in topical sections as follows: Data mining foundations, Grand challenges of data mining, Parallel and distributed data mining algorithms, Mining on data streams, Graph mining and Spatial data mining. 410 0$aLecture Notes in Artificial Intelligence,$x2945-9141 ;$v14176 606 $aData mining 606 $aComputer vision 606 $aComputer systems 606 $aEducation$xData processing 606 $aApplication software 606 $aArtificial intelligence 606 $aData Mining and Knowledge Discovery 606 $aComputer Vision 606 $aComputer System Implementation 606 $aComputers and Education 606 $aComputer and Information Systems Applications 606 $aArtificial Intelligence 615 0$aData mining. 615 0$aComputer vision. 615 0$aComputer systems. 615 0$aEducation$xData processing. 615 0$aApplication software. 615 0$aArtificial intelligence. 615 14$aData Mining and Knowledge Discovery. 615 24$aComputer Vision. 615 24$aComputer System Implementation. 615 24$aComputers and Education. 615 24$aComputer and Information Systems Applications. 615 24$aArtificial Intelligence. 676 $a943.005 702 $aYang$b Xiaochun 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910760274703321 996 $aAdvanced Data Mining and Applications$92982700 997 $aUNINA