2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (1015 pages) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Engineering - Data processing Cibernètica Seguretat informàtica Protecció de dades |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-79200-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Organization -- General Chairs -- Online Conference Organizing Chairs -- Program Chairs -- Publication Chairs -- Publicity Chairs -- Website and Local Service Chairs -- Program Committee Members -- Welcome Message -- Conference Program at a Glance -- ATCI 2021 Keynotes -- Oral Presentation Instruction -- Registration -- Contents -- Cyber Intelligence for Business and Management Innovations -- Prediction of Total Investment in Fixed Assets Based on the SARIMA Model and X12ARIMA Seasonal Adjustment Method -- 1 Introduction -- 2 Model Establishment and Indicator Description -- 2.1 Data Sources and Related Instruction -- 2.2 Judging Data Seasonality -- 2.3 Model Establishment -- 3 Model Prediction -- 3.1 Analysis and Prediction Using SARIMA Model -- 3.2 X12ARIMA Seasonal Adjustment Method Using Addition -- 3.3 X12ARIMA Seasonal Adjustment Method Using Multiplication -- 3.4 Forecast Results and Comparison of X12ARIMA Seasonal Adjustment Method Using Addition and Multiplication -- 3.5 Automatic Prediction of X12ARIMA Seasonal Adjustment Method Based on R Language -- 4 Conclusion -- References -- Analysis of the Impact of Green Credit on the Operating Efficiency of Listed Commercial Banks Based on Python -- 1 Introduction -- 2 Data and Model -- 2.1 Variable Selection -- 2.2 Data Source -- 2.3 Descriptive Statistical Analysis -- 2.4 Model Setting and Selection -- 2.5 Model Selection -- 3 Conclusions -- References -- The Influence of Computer Network Technology on Trade Development -- 1 Changes of Trade Market Environment under the Background of Internet Development -- 2 Application of Internet Technology in Trade Activities -- 3 The Impact of Internet on the Development of Trade -- 4 Problems in the Application of Internet in Trade -- 5 Improve the Effectiveness of Internet Application in Trade Process -- 6 Conclusion -- References.
The Application of Knowledge Map and the Construction of Enterprise Knowledge Map -- 1 Introduction -- 2 Knowledge Graph and Structure of the Enterprise Information System -- 3 Application of Knowledge Graph -- 3.1 Problem Solving -- 3.2 Network Security -- 3.3 Intelligent Application -- 4 Construction of Knowledge Map -- 4.1 Knowledge Extraction -- 4.2 Knowledge Integration -- 4.3 Developing Knowledge Map -- 5 Conclusion -- References -- Interaction Mechanism of Regional Tourism Industry and Information Industry -- 1 Introduction -- 2 Research Methods -- 3 Evaluation System -- 4 Interaction Mechanism -- 4.1 Stationarity Test -- 4.2 Selection of Lag Order -- 4.3 PVR Model Estimation -- 4.4 The Dynamic Response of Tourism Industry and Information Industry -- 4.5 Analysis of Variance -- 5 Conclusion -- References -- Service Quality Evaluation of Office Property Management Based on SERVQUAL Model -- 1 Introduction -- 2 Related theories of Office Property Management Service Quality -- 3 Establishment of Service Quality Index System -- 3.1 Index Selection -- 3.2 Weight Determination -- 3.3 The Square Root Method is Used to Calculate the Eigenvector and Weight -- 3.4 Evaluate the Service Quality of Office Property Management -- 4 Service Quality Satisfaction and Importance Evaluation -- 5 Conclusions -- References -- Characteristics and Trends of Tourism Informatization Research - Based on Citespace Knowledge Map Analysis -- 1 Introduction -- 2 Research Methods and Data Sources -- 3 Statistics and Analysis -- 3.1 Distribution of Domestic Tourism Information Research -- 3.2 Distribution of Domestic Tourism Information Research Journals -- 3.3 An Analysis of the Frontier Hot Spots of Domestic Tourism Informatization Research -- 3.4 Trajectory and Trend Analysis of Domestic Tourism Informatization Research -- 4 Discussion and Conclusion -- References. Policy Guarantee for the Development of FinTech Under the Flow of Information Technology in Guangdong-Hong Kong-Macao Greater Bay Area -- 1 Introduction -- 2 Challenges Facing FinTech Development in the Greater Bay Area -- 2.1 The Flow of FinTech Talents is Not Smooth -- 2.2 Cross-Border Logistics Transportation is Not Smooth -- 2.3 The Cross-Border Use of Financial Funds is Not Smooth -- 2.4 The Communication of Information and Data is Not Smooth -- 3 Policy Guarantee for the Development of FinTech in the Greater Bay Area -- 3.1 Administrative Management and Policy Guarantee -- 3.2 Talent Guarantee for the Development of Dawan FinTech -- 3.3 Healthy Competition Guarantee for the Development of Insurance Technology in the Greater Bay Area -- 3.4 Platform Guarantee for FinTech in the Greater Bay Area -- 3.5 Risk Prevention of FinTech in the Greater Bay Area -- 4 Conclusion -- References -- Training Mode of Applied Talents in Tourism Management Specialty Under Artificial Intelligence -- 1 Introduction -- 2 Relevant Concepts -- 2.1 AI Concept -- 2.2 Applied Talents of Tourism Major -- 2.3 Talent Training Mode -- 2.4 Basic Algorithm -- 3 Practical Research on the Talent Training Mode of Tourism Management Major from the Perspective of AI -- 3.1 Subjects -- 3.2 Experimental Steps -- 4 Statistical Analysis of Data -- 4.1 Students' Understanding of AI in Teaching -- 4.2 Students' Experience Based on AI -- 4.3 Assessment Result Analysis -- 5 Conclusion -- References -- Risk Analysis and Development Research of Cross-Border E-commerce Payment Under the Background of Internet Finance -- 1 Research on the Background of Cross-Border E-commerce Payment in China -- 1.1 Traditional Payment Cross-Border E-commerce Platform -- 1.2 Third-Party Payment Cross-Border E-commerce Platform -- 2 Internet Finance Promotes Cross-Border Electronic Payment. 3 Existing Problems and Risk Analysis of Cross-Border E-commerce Payment -- 3.1 Credit System Defects and Payment Credit Risk -- 3.2 Regulatory Risks of Big Data and User Privacy -- 3.3 Risk of Cross-Border Money Laundering and Illegal Flow of Funds -- 3.4 Legal Risks of Cross-Border Electronic Payment -- 4 Strategic Analysis and Development Research of Cross-Border Electronic Payment Industry -- 4.1 Strengthen the Supervision of Cross-Border Electronic Commerce Payment -- 4.2 Improve the Security of Third-Party Payment Information in the Era of Big Data -- 4.3 Improve the Credit Information Work and Establish an Online and Offline Credit Information System -- 4.4 Improve the Access System for Third-Party Cross-Border Payment Services -- 4.5 Attach Importance to and Strengthen Anti-money Laundering Work -- References -- The Construction and Application of Financial Sharing Service Center of Enterprise Group -- 1 The Strategic Significance of Building Financial Sharing Service Center to Strengthen Financial Control of Enterprise Groups -- 2 Principles and Key Points of Financial Sharing Service Center Construction -- 3 Core Systems and System Integration of Financial Shared Service Center Construction -- 4 Management and Control Mode and Expected Effect of Financial Shared Service Center -- 5 Financial Sharing Service Center Construction Risk and Countermeasures -- References -- Analysis on Employment Situation of Applied Universities in Transformation and Development -- 1 Introduction -- 2 Main Factors Affecting the Employment Rate of Colleges and Universities -- 2.1 The Increase of College Enrollment Leads to the Decrease of the Gold Content -- 2.2 The Leading Role of University Education is Challenged by the Development of Internet -- 2.3 The Speed of Knowledge Renewal in Colleges and Universities Lags Behind the Development of Industry. 2.4 The Motive Force for Colleges and Universities to Seek Employment Growth Point is Not Strong -- 2.5 Higher-Educated People are More Attractive to Businesses than Students -- 2.6 The Orientation of Employment of College Students is Not Accurate -- 3 Analysis of Employment Data of Jilin Agricultural Science and Technology Institute -- 4 Exploration of the Work Model Which is Favorable to the Comprehensive Quality Improvement of Employment -- 4.1 Accurate Positioning -- 4.2 Graded Advance -- 4.3 Ideological Guidance -- 4.4 Comprehensive Plan -- 5 Summary and Outlook -- References -- Corpus-Based Comparative Study on Chinese and English Subjectivity -- 1 Introduction -- 1.1 Problem and Research Question -- 1.2 Review of Literature -- 2 Research Methods -- 2.1 The Corpus and Data -- 2.2 Data Collection and Analysis -- 2.3 Results -- 3 Discussion -- 4 Conclusion -- References -- Analysis on the Development of Regional Innovation Ability Driven by Internet Under the Background of "Internet Plus" -- 1 Introduction -- 2 Theoretical Analysis -- 2.1 Cost Effect -- 2.2 Competitive Effect -- 2.3 Spillover Effect -- 3 Analysis of Existing Circumstance -- 4 Conclusion and Enlightenment -- References -- Influence Mechanism of Mobile Social Network Users' Product Recommendation Information on Consumers' Intention to Participate Sharing Economy -- 1 Introduction -- 2 Theoretical Bases -- 2.1 Theory of Planned Behavior -- 2.2 Source Credibility Theory -- 3 Influencing Mechanism Analysis -- 3.1 Influencing Mechanism of TPB Factors -- 3.2 Influence Mechanism of Source Credibility Factors -- 3.3 The Theoretical Model -- 4 Management Implication -- 4.1 Improve Consumers' Perception of Source Credibility -- 4.2 Improve Consumers' Perceived Ease-of-Use to Mobile Social Network Apps -- 5 Conclusions -- References -- Optimizing System Management Based on Trust of Domain. 1 Account Management Issues. |
Record Nr. | UNINA-9910488718803321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security – ESORICS 2022 : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II / / edited by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (753 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Software engineering Application software Computers Computer networks - Security measures Data and Information Security Software Engineering Computer and Information Systems Applications Computing Milieux Mobile and Network Security Seguretat informàtica Xifratge (Informàtica) Xarxes d'ordinadors Enginyeria de programari Protecció de dades |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN |
9783031171468
3031171462 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Anonymity -- A Machine Learning Approach to Detect Differential Treatment of Anonymous Users -- Utility-Preserving Biometric Information Anonymization -- Anonymous Traceback for End-to-End Encryption -- Cloud Security -- Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost -- DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay -- Lighter Is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption -- Verifying the Quality of Outsourced Training on Clouds -- SecQuant: Quantifying Container System Call Exposure -- Dynamic Process Isolation -- Access Control -- Administration of Machine Learning Based Access Control -- Real-time Policy Enforcement with Metric First-Order Temporal Logic -- A Tale of Four Gates — Privilege Escalation and Permission Bypasses on Android through App Components -- Authentication -- Sequential Digital Signatures for Cryptographic Software-Update Authentication -- On Committing Authenticated Encryption -- Quantum-Resistant Password Based Threshold Single-Sign-On Authentication with Updatable Server Private Key -- The Revenge of Password Crackers: Automated Training of Password Cracking Tools -- Fuzzy Authenticated Key Exchange with Tight Security -- Continuous Authentication in Secure Messaging -- Digital Signatures -- Half-Aggregation of Schnorr Signatures with Tight Reductions -- Ring Signatures with User-Controlled Linkability -- DualDory: Logarithmic-verifier linkable ring signatures through preprocessing -- Effcient Unique Ring Signatures From Lattices -- Kiyomoto Verifiable Timed Linkable Ring Signatures For Scalable Payments for Monero -- Deterministic Wallets for Adaptor Signatures -- Puncturable Signature: A Generic Construction and Instantiations -- IoT Security -- fASLR: Function-Based ASLR for Resource-Constrained IoT Systems -- An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks -- IoTEnsemble: Detection of Botnet Attacks on Internet of Things -- IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps -- No-Label User-Level Membership Inference for ASR Model Auditing -- Applications -- A toolbox for verifiable tally-hiding e-voting systems -- How to Verifiably Encrypt Many Bits for an Election -- A framework for constructing Single Secret Leader Election from MPC -- AppBastion: Protection from Untrusted Apps and OSes on ARM -- Collaborative anomaly detection system for charging stations. |
Record Nr. | UNINA-9910595023803321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Transformation, Cyber Security and Resilience of Modern Societies / / edited by Todor Tagarev, Krassimir T. Atanassov, Vyacheslav Kharchenko, Janusz Kacprzyk |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (483 pages) : illustrations |
Disciplina | 005.8 |
Collana | Studies in Big Data |
Soggetto topico |
Engineering - Data processing
Cooperating objects (Computer systems) Computational intelligence Big data Data Engineering Cyber-Physical Systems Computational Intelligence Big Data Seguretat informàtica Protecció de dades Seguretat de les xarxes d'ordinadors Dades massives Computació en núvol |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-65722-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Insight into Multi-domain Command and Control Systems: Issues and Challenges -- Cloud Technologies for Building a System of Data Centres for Defence and Security -- Methodology for Organizational Design of Cyber Research Networks -- Managing Cyber-education Environments with Serverless Computing -- Unified Innovative Platform for Administration and Automated Management of Internationally Recognized Standards -- Digitalization and Cyber Resilience Model for the Bulgarian Academy of Sciences. |
Record Nr. | UNINA-9910483573303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Guide to Data Privacy : Models, Technologies, Solutions / / by Vicenç Torra |
Autore | Torra Vicenç |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (323 pages) |
Disciplina |
323.448
005.8 |
Collana | Undergraduate Topics in Computer Science |
Soggetto topico |
Data protection - Law and legislation
Data protection Cryptography Data encryption (Computer science) Information technology - Moral and ethical aspects Computers and civilization Privacy Data and Information Security Cryptology Information Ethics Computers and Society Protecció de dades Xifratge (Informàtica) |
Soggetto genere / forma | Llibres electrònics |
ISBN |
9783031128370
9783031128363 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. Basics of Cryptography and Machine Learning -- 3. Privacy Models and Privacy Mechanisms -- 4. User's Privacy -- 5. Avoiding Disclosure from Computations -- 6. Avoiding Disclosure from Data Masking Methods -- 7. Other -- 8. Conclusions. |
Record Nr. | UNINA-9910629294503321 |
Torra Vicenç | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Computer organization Artificial intelligence Computers Security Computer Systems Organization and Communication Networks Artificial Intelligence Information Systems and Communication Service Seguretat informàtica Dades massives Protecció de dades Intel·ligència artificial |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-38557-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- . |
Record Nr. | UNISA-996465359103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Computer organization Artificial intelligence Computers Security Computer Systems Organization and Communication Networks Artificial Intelligence Information Systems and Communication Service Seguretat informàtica Dades massives Protecció de dades Intel·ligència artificial |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-38557-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- . |
Record Nr. | UNINA-9910410051603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Human Factors in Privacy Research / / edited by Nina Gerber, Alina Stöver, Karola Marky |
Autore | Gerber Nina |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (380 pages) |
Disciplina | 150 |
Altri autori (Persone) |
StöverAlina
MarkyKarola |
Soggetto topico |
Psychology
Cognitive science Computer science Human-machine systems Data protection - Law and legislation Artificial intelligence Behavioral Sciences and Psychology Cognitive Science Computer Science Human-Machine Interfaces Privacy Artificial Intelligence Ciència cognitiva Sistemes persona-màquina Protecció de dades Intel·ligència artificial |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-031-28643-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations. |
Record Nr. | UNINA-9910737294903321 |
Gerber Nina | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Education - Adapting to the Fourth Industrial Revolution : 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings / / edited by Lynette Drevin, Natalia Miloslavskaya, Wai Sze Leung, Suné von Solms |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (137 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Education - Data processing
Application software Computer engineering Computer networks Data protection Computers and Education Computer and Information Systems Applications Computer Engineering and Networks Data and Information Security Educació Processament de dades Programari d'aplicació Enginyeria d'ordinadors Protecció de dades |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-031-08172-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Securing the Fourth Industrial Revolution through Programming -- Analyzing Error Rates in Cryptological Programming Assignments -- SecTutor: An Intelligent Tutoring System For Secure Programming -- Cybersecurity in the Fourth Industrial Revolution: Charting the Way Forward in Education -- How to Overcome Staff Shortage in Professionals for SOCs and NSICs -- Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements -- A Maturity Assessment Model for Cyber Security Education in Europe -- Real-World Cybersecurity-Inspired Capacity Building -- ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics -- South Africa’s taxi industry as a cybersecurity-awareness game changer: why and how? -- Maritime Cyber Threats Detection Framework: Building Capabilities. . |
Record Nr. | UNINA-9910574853003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Journal of hardware and systems security |
Pubbl/distr/stampa | [Cham] : , : Springer International Publishing, , [2017]- |
Descrizione fisica | 1 online resource |
Disciplina | 004.6 |
Soggetto topico |
Computer security
Computer networks - Security measures Internet - Security measures Data encryption (Computer science) Integrated circuits - Security measures Computers - Circuits - Design and construction - Security measures Protecció de dades Tecnologia de la informació Sistemes incrustats (Informàtica) |
Soggetto genere / forma |
Periodicals.
Revistes electròniques. |
ISSN | 2509-3436 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910482005403321 |
[Cham] : , : Springer International Publishing, , [2017]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Modern socio-technical perspectives on privacy / / Bart P. Knijnenburg [et al.] |
Autore | Knijnenburg Bart P |
Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (459 pages) |
Altri autori (Persone) |
PageXinru
WisniewskiPamela LipfordHeather Richter ProferesNicholas RomanoJennifer A. Z. <1995-> |
Soggetto topico |
Computer Security
Data protection Privacy, Right of Dret a la intimitat Protecció de dades Seguretat informàtica |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-82786-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction and Overview Part I: Privacy Theory and Methods 2. Privacy Theories and Frameworks 3. Revisiting APCO 4. Privacy and Behavioral Economics 5. The Development of Privacy Norms 6. Privacy Beyond the Individual Level Part II: Domains 7. Social Media and Privacy 8. Privacy-Enhancing Technologies 9. Tracking and Personalization 10. Healthcare Privacy 11. Privacy and the Internet of Things Part III: Audiences 12. Cross-Cultural Privacy Differences 13. Accessible Privacy 14. Privacy in Adolescence1 5. Privacy and Vulnerable Populations Part IV: Moving Forward 16. User-Tailored Privacy 17. The Ethics of Privacy in Research and Design: Principles, Practices, and Potential 18. EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital Era 19. Reflections: Bringing Privacy to Practice |
Record Nr. | UNINA-9910544845003321 |
Knijnenburg Bart P | ||
Cham, : Springer Nature, 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|