Advanced Informatics for Computing Research : Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (492 pages) : illustrations (some color) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer vision Data protection Application software Algorithms Computers - Law and legislation Information technology - Law and legislation Artificial Intelligence Computer Vision Data and Information Security Computer and Information Systems Applications Legal Aspects of Computing |
ISBN | 981-15-0108-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910350216803321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XIV : 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVIII, 367 p. 98 illus.) |
Disciplina | 363.25968 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computer networks Computers and civilization Computers - Law and legislation Information technology - Law and legislation Data structures (Computer science) Information theory Data and Information Security Computer Communication Networks Computers and Society Legal Aspects of Computing Data Structures and Information Theory |
ISBN | 3-319-99277-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910299163103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVIII, 272 p. 1 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computer crimes Computers - Law and legislation Information technology - Law and legislation Robotics Computer vision Data and Information Security Computer Crime Legal Aspects of Computing Computer Vision |
ISBN | 3-030-28752-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910349290003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6–8, 2020, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 308 p. 48 illus.) |
Disciplina | 004 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer crimes Application software Artificial intelligence Data and Information Security Legal Aspects of Computing Computer Crime Computer and Information Systems Applications Artificial Intelligence |
ISBN | 3-030-56223-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910427687903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (268 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-88381-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
Record Nr. | UNINA-9910502594403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (268 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-88381-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
Record Nr. | UNISA-996464525303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
African Data Privacy Laws / / edited by Alex B. Makulilo |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIII, 379 p. 2 illus.) |
Disciplina | 342.0858 |
Collana | Issues in Privacy and Data Protection |
Soggetto topico |
Information technology - Law and legislation
Mass media - Law and legislation Computers - Law and legislation IT Law, Media Law, Intellectual Property Legal Aspects of Computing |
ISBN | 9783319473178 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I Overview -- 1. The Context of Data Privacy in Africa by Alex B. Makulilo -- Part II National Data Privacy Laws -- 2. Data Protection in North Africa,Tunisia and Morocco by Alex B. Makulilo -- 3. Information Privacy in Nigeria by Iheanyi Samuel Nwankwo -- 4. Data Protection Law in Burkina Faso by Krissiamba Moumouni Ouiminga -- 5. Data Protection in Zimbabwe by Caroline Ncube -- 6. Privacy and Data Protection in Uganda by Ronald Kakungulu-Mayambala -- 7. Towards Data Protection Law in Ethiopia by Alebachew Birhanu Enyew -- 8. Data Privacy Law Reforms in Tanzania by Patricia Boshe -- 9. Data Protection Law in South Africa by Anneliese Roos -- 10. The Right to Privacy and Data Protection in Ghana by Dominic N. Dagbanja -- 11. Data Protection in Cape Verde: An Analysis of the State of the Art by João Luís Traça Pedro and Marques Gaspar -- 12. Protection of Personal Data in Senegal by Patricia Boshe -- 13. Data Protection of the Indian Ocean Islands, Mauritius, Seychelles, Madagascar by Alex B. Makulilo -- 14. Data Protection Regulation in Burundi by Patricia Boshe -- 15. Data Protection in Kenya by Alex B. Makulilo and Patricia Boshe -- 16. Privacy and Data Protection in Lesotho by Alex B. Makulilo and Kuena Mophethe -- 17. Data Protection in Angola by João Luís Traça and Francisca Correia -- 18. Data Protection in Mozambique – inception phase by João Luís Traça and Lídia Neves -- Part III -- Comparative Conclusions 19. Future of Data Protection in Africa by Alex B. Makulilo. |
Record Nr. | UNINA-9910155300903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
AR : revista de derecho informático |
Pubbl/distr/stampa | [Lima, Perú], : Alfa-Redi |
Soggetto topico |
Computers - Law and legislation
Computers - Law and legislation - Latin America Intellectual property Intellectual property - Latin America Internet - Law and legislation Electronic commerce - Law and legislation Electronic commerce Information technology |
Soggetto genere / forma | Periodicals. |
Soggetto non controllato | computer law - information society |
ISSN | 1681-5726 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | spa |
Altri titoli varianti |
Alfa - redi
AR:RDI |
Record Nr. | UNISA-996211798703316 |
[Lima, Perú], : Alfa-Redi | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser |
Autore | Hoeren Thomas |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 120 p.) |
Disciplina | 343.099 |
Collana | SpringerBriefs in Law |
Soggetto topico |
Information technology - Law and legislation
Mass media - Law and legislation Quantitative research Data mining Law - Europe Computers - Law and legislation IT Law, Media Law, Intellectual Property Data Analysis and Big Data Data Mining and Knowledge Discovery European Law Legal Aspects of Computing |
ISBN |
9783319624617
331962461X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Thomas Hoeren, Big Data and Data Quality -- Christian Döpke, The Importance of Big Data for Jurisprudence and Legal Practice -- Nicolai Culik and Christian Döpke, About Forgetting and Being Forgotten -- Nicolai Culik, Brussels Calling: Big Data and Privacy -- Andreas Börding, Safe Harbor: The Decision of the European Court of Justice -- Tim Jülicher, Education 2.0: Learning Analytics, Educational Data Mining and Co. -- Max v. Schönfeld, Big Data and Automotive – A Legal Approach -- Stefanie Eschholz and Jonathan Djabbarpour, Big Data and Scoring in the Financial Sector -- Charlotte Röttgen, Like or Dislike – Web Tracking -- Tim Jülicher and Marc Delisle, Step into “The Circle” – A Close Look at Wearables and Quantified Self -- Max v. Schönfeld and Nils Wehkamp, Big Data and Smart Grid -- Max v. Schönfeld, Reinhard Heil and Laura Bittner, Big Data on a Farm – Smart Farming. |
Record Nr. | UNINA-9910231244803321 |
Hoeren Thomas
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain and Distributed Ledger Technology Use Cases : Applications and Lessons Learned / / edited by Horst Treiblmaier, Trevor Clohessy |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xiii, 329 pages) : illustrations |
Disciplina | 005.74 |
Collana | Progress in IS |
Soggetto topico |
Business information services
Computer networks Data structures (Computer science) Information theory Computers - Law and legislation Information technology - Law and legislation Business Information Systems Computer Communication Networks Data Structures and Information Theory Legal Aspects of Computing |
ISBN | 3-030-44337-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Toward More Rigorous Blockchain Research: Recommendations for Writing Blockchain Case Studies -- From a Use Case Categorization Scheme Towards A Maturity Model for Engineering Distributed Ledgers -- What’s In The Box? Combating Counterfeit Medications in Pharmaceutical Supply Chains With Blockchain Vigilant Information Systems -- A Use Case of Blockchain in Healthcare: Allergy Card -- International Exchange Of Financial Information on Distributed Ledgers: Outlook and Design Blueprint -- A Blockchain Supported Solution for Compliant Digital Security Offerings -- A Blockchain-Driven Approach to Fulfill the GDPR Recording Requirements -- Wibson: A Case Study of a Decentralized, Privacy-Preserving Data Marketplace -- : Business Process Transformation in Natural Resources Development Using Blockchain: Indigenous Entrepreneurship, Trustless Technology, and Rebuilding Trust -- Smart City Applications on the Blockchain: Development of a Multi-Layer Taxonomy -- A Case Study of Blockchain-Induced Digital Transformation in the Public Sector -- Analyzing the Potential of DLT-Based Applications in Smart Factories -- Disrupting Platform Organizations with Blockchain Technology and the Internet of Things? -- Using Blockchain for Online Multimedia Management: Characteristics of Existing Platforms -- Supply Chain Visibility Ledger. . |
Record Nr. | UNINA-9910407719503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|