top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others]
2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (1015 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering - Data processing
Cibernètica
Seguretat informàtica
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-79200-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Organization -- General Chairs -- Online Conference Organizing Chairs -- Program Chairs -- Publication Chairs -- Publicity Chairs -- Website and Local Service Chairs -- Program Committee Members -- Welcome Message -- Conference Program at a Glance -- ATCI 2021 Keynotes -- Oral Presentation Instruction -- Registration -- Contents -- Cyber Intelligence for Business and Management Innovations -- Prediction of Total Investment in Fixed Assets Based on the SARIMA Model and X12ARIMA Seasonal Adjustment Method -- 1 Introduction -- 2 Model Establishment and Indicator Description -- 2.1 Data Sources and Related Instruction -- 2.2 Judging Data Seasonality -- 2.3 Model Establishment -- 3 Model Prediction -- 3.1 Analysis and Prediction Using SARIMA Model -- 3.2 X12ARIMA Seasonal Adjustment Method Using Addition -- 3.3 X12ARIMA Seasonal Adjustment Method Using Multiplication -- 3.4 Forecast Results and Comparison of X12ARIMA Seasonal Adjustment Method Using Addition and Multiplication -- 3.5 Automatic Prediction of X12ARIMA Seasonal Adjustment Method Based on R Language -- 4 Conclusion -- References -- Analysis of the Impact of Green Credit on the Operating Efficiency of Listed Commercial Banks Based on Python -- 1 Introduction -- 2 Data and Model -- 2.1 Variable Selection -- 2.2 Data Source -- 2.3 Descriptive Statistical Analysis -- 2.4 Model Setting and Selection -- 2.5 Model Selection -- 3 Conclusions -- References -- The Influence of Computer Network Technology on Trade Development -- 1 Changes of Trade Market Environment under the Background of Internet Development -- 2 Application of Internet Technology in Trade Activities -- 3 The Impact of Internet on the Development of Trade -- 4 Problems in the Application of Internet in Trade -- 5 Improve the Effectiveness of Internet Application in Trade Process -- 6 Conclusion -- References.
The Application of Knowledge Map and the Construction of Enterprise Knowledge Map -- 1 Introduction -- 2 Knowledge Graph and Structure of the Enterprise Information System -- 3 Application of Knowledge Graph -- 3.1 Problem Solving -- 3.2 Network Security -- 3.3 Intelligent Application -- 4 Construction of Knowledge Map -- 4.1 Knowledge Extraction -- 4.2 Knowledge Integration -- 4.3 Developing Knowledge Map -- 5 Conclusion -- References -- Interaction Mechanism of Regional Tourism Industry and Information Industry -- 1 Introduction -- 2 Research Methods -- 3 Evaluation System -- 4 Interaction Mechanism -- 4.1 Stationarity Test -- 4.2 Selection of Lag Order -- 4.3 PVR Model Estimation -- 4.4 The Dynamic Response of Tourism Industry and Information Industry -- 4.5 Analysis of Variance -- 5 Conclusion -- References -- Service Quality Evaluation of Office Property Management Based on SERVQUAL Model -- 1 Introduction -- 2 Related theories of Office Property Management Service Quality -- 3 Establishment of Service Quality Index System -- 3.1 Index Selection -- 3.2 Weight Determination -- 3.3 The Square Root Method is Used to Calculate the Eigenvector and Weight -- 3.4 Evaluate the Service Quality of Office Property Management -- 4 Service Quality Satisfaction and Importance Evaluation -- 5 Conclusions -- References -- Characteristics and Trends of Tourism Informatization Research - Based on Citespace Knowledge Map Analysis -- 1 Introduction -- 2 Research Methods and Data Sources -- 3 Statistics and Analysis -- 3.1 Distribution of Domestic Tourism Information Research -- 3.2 Distribution of Domestic Tourism Information Research Journals -- 3.3 An Analysis of the Frontier Hot Spots of Domestic Tourism Informatization Research -- 3.4 Trajectory and Trend Analysis of Domestic Tourism Informatization Research -- 4 Discussion and Conclusion -- References.
Policy Guarantee for the Development of FinTech Under the Flow of Information Technology in Guangdong-Hong Kong-Macao Greater Bay Area -- 1 Introduction -- 2 Challenges Facing FinTech Development in the Greater Bay Area -- 2.1 The Flow of FinTech Talents is Not Smooth -- 2.2 Cross-Border Logistics Transportation is Not Smooth -- 2.3 The Cross-Border Use of Financial Funds is Not Smooth -- 2.4 The Communication of Information and Data is Not Smooth -- 3 Policy Guarantee for the Development of FinTech in the Greater Bay Area -- 3.1 Administrative Management and Policy Guarantee -- 3.2 Talent Guarantee for the Development of Dawan FinTech -- 3.3 Healthy Competition Guarantee for the Development of Insurance Technology in the Greater Bay Area -- 3.4 Platform Guarantee for FinTech in the Greater Bay Area -- 3.5 Risk Prevention of FinTech in the Greater Bay Area -- 4 Conclusion -- References -- Training Mode of Applied Talents in Tourism Management Specialty Under Artificial Intelligence -- 1 Introduction -- 2 Relevant Concepts -- 2.1 AI Concept -- 2.2 Applied Talents of Tourism Major -- 2.3 Talent Training Mode -- 2.4 Basic Algorithm -- 3 Practical Research on the Talent Training Mode of Tourism Management Major from the Perspective of AI -- 3.1 Subjects -- 3.2 Experimental Steps -- 4 Statistical Analysis of Data -- 4.1 Students' Understanding of AI in Teaching -- 4.2 Students' Experience Based on AI -- 4.3 Assessment Result Analysis -- 5 Conclusion -- References -- Risk Analysis and Development Research of Cross-Border E-commerce Payment Under the Background of Internet Finance -- 1 Research on the Background of Cross-Border E-commerce Payment in China -- 1.1 Traditional Payment Cross-Border E-commerce Platform -- 1.2 Third-Party Payment Cross-Border E-commerce Platform -- 2 Internet Finance Promotes Cross-Border Electronic Payment.
3 Existing Problems and Risk Analysis of Cross-Border E-commerce Payment -- 3.1 Credit System Defects and Payment Credit Risk -- 3.2 Regulatory Risks of Big Data and User Privacy -- 3.3 Risk of Cross-Border Money Laundering and Illegal Flow of Funds -- 3.4 Legal Risks of Cross-Border Electronic Payment -- 4 Strategic Analysis and Development Research of Cross-Border Electronic Payment Industry -- 4.1 Strengthen the Supervision of Cross-Border Electronic Commerce Payment -- 4.2 Improve the Security of Third-Party Payment Information in the Era of Big Data -- 4.3 Improve the Credit Information Work and Establish an Online and Offline Credit Information System -- 4.4 Improve the Access System for Third-Party Cross-Border Payment Services -- 4.5 Attach Importance to and Strengthen Anti-money Laundering Work -- References -- The Construction and Application of Financial Sharing Service Center of Enterprise Group -- 1 The Strategic Significance of Building Financial Sharing Service Center to Strengthen Financial Control of Enterprise Groups -- 2 Principles and Key Points of Financial Sharing Service Center Construction -- 3 Core Systems and System Integration of Financial Shared Service Center Construction -- 4 Management and Control Mode and Expected Effect of Financial Shared Service Center -- 5 Financial Sharing Service Center Construction Risk and Countermeasures -- References -- Analysis on Employment Situation of Applied Universities in Transformation and Development -- 1 Introduction -- 2 Main Factors Affecting the Employment Rate of Colleges and Universities -- 2.1 The Increase of College Enrollment Leads to the Decrease of the Gold Content -- 2.2 The Leading Role of University Education is Challenged by the Development of Internet -- 2.3 The Speed of Knowledge Renewal in Colleges and Universities Lags Behind the Development of Industry.
2.4 The Motive Force for Colleges and Universities to Seek Employment Growth Point is Not Strong -- 2.5 Higher-Educated People are More Attractive to Businesses than Students -- 2.6 The Orientation of Employment of College Students is Not Accurate -- 3 Analysis of Employment Data of Jilin Agricultural Science and Technology Institute -- 4 Exploration of the Work Model Which is Favorable to the Comprehensive Quality Improvement of Employment -- 4.1 Accurate Positioning -- 4.2 Graded Advance -- 4.3 Ideological Guidance -- 4.4 Comprehensive Plan -- 5 Summary and Outlook -- References -- Corpus-Based Comparative Study on Chinese and English Subjectivity -- 1 Introduction -- 1.1 Problem and Research Question -- 1.2 Review of Literature -- 2 Research Methods -- 2.1 The Corpus and Data -- 2.2 Data Collection and Analysis -- 2.3 Results -- 3 Discussion -- 4 Conclusion -- References -- Analysis on the Development of Regional Innovation Ability Driven by Internet Under the Background of "Internet Plus" -- 1 Introduction -- 2 Theoretical Analysis -- 2.1 Cost Effect -- 2.2 Competitive Effect -- 2.3 Spillover Effect -- 3 Analysis of Existing Circumstance -- 4 Conclusion and Enlightenment -- References -- Influence Mechanism of Mobile Social Network Users' Product Recommendation Information on Consumers' Intention to Participate Sharing Economy -- 1 Introduction -- 2 Theoretical Bases -- 2.1 Theory of Planned Behavior -- 2.2 Source Credibility Theory -- 3 Influencing Mechanism Analysis -- 3.1 Influencing Mechanism of TPB Factors -- 3.2 Influence Mechanism of Source Credibility Factors -- 3.3 The Theoretical Model -- 4 Management Implication -- 4.1 Improve Consumers' Perception of Source Credibility -- 4.2 Improve Consumers' Perceived Ease-of-Use to Mobile Social Network Apps -- 5 Conclusions -- References -- Optimizing System Management Based on Trust of Domain.
1 Account Management Issues.
Record Nr. UNINA-9910488718803321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2022 : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II / / edited by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
Computer Security – ESORICS 2022 : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II / / edited by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (753 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Software engineering
Application software
Computers
Computer networks - Security measures
Data and Information Security
Software Engineering
Computer and Information Systems Applications
Computing Milieux
Mobile and Network Security
Seguretat informàtica
Xifratge (Informàtica)
Xarxes d'ordinadors
Enginyeria de programari
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 9783031171468
3031171462
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Anonymity -- A Machine Learning Approach to Detect Differential Treatment of Anonymous Users -- Utility-Preserving Biometric Information Anonymization -- Anonymous Traceback for End-to-End Encryption -- Cloud Security -- Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost -- DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay -- Lighter Is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption -- Verifying the Quality of Outsourced Training on Clouds -- SecQuant: Quantifying Container System Call Exposure -- Dynamic Process Isolation -- Access Control -- Administration of Machine Learning Based Access Control -- Real-time Policy Enforcement with Metric First-Order Temporal Logic -- A Tale of Four Gates — Privilege Escalation and Permission Bypasses on Android through App Components -- Authentication -- Sequential Digital Signatures for Cryptographic Software-Update Authentication -- On Committing Authenticated Encryption -- Quantum-Resistant Password Based Threshold Single-Sign-On Authentication with Updatable Server Private Key -- The Revenge of Password Crackers: Automated Training of Password Cracking Tools -- Fuzzy Authenticated Key Exchange with Tight Security -- Continuous Authentication in Secure Messaging -- Digital Signatures -- Half-Aggregation of Schnorr Signatures with Tight Reductions -- Ring Signatures with User-Controlled Linkability -- DualDory: Logarithmic-verifier linkable ring signatures through preprocessing -- Effcient Unique Ring Signatures From Lattices -- Kiyomoto Verifiable Timed Linkable Ring Signatures For Scalable Payments for Monero -- Deterministic Wallets for Adaptor Signatures -- Puncturable Signature: A Generic Construction and Instantiations -- IoT Security -- fASLR: Function-Based ASLR for Resource-Constrained IoT Systems -- An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks -- IoTEnsemble: Detection of Botnet Attacks on Internet of Things -- IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps -- No-Label User-Level Membership Inference for ASR Model Auditing -- Applications -- A toolbox for verifiable tally-hiding e-voting systems -- How to Verifiably Encrypt Many Bits for an Election -- A framework for constructing Single Secret Leader Election from MPC -- AppBastion: Protection from Untrusted Apps and OSes on ARM -- Collaborative anomaly detection system for charging stations.
Record Nr. UNINA-9910595023803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Transformation, Cyber Security and Resilience of Modern Societies / / edited by Todor Tagarev, Krassimir T. Atanassov, Vyacheslav Kharchenko, Janusz Kacprzyk
Digital Transformation, Cyber Security and Resilience of Modern Societies / / edited by Todor Tagarev, Krassimir T. Atanassov, Vyacheslav Kharchenko, Janusz Kacprzyk
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (483 pages) : illustrations
Disciplina 005.8
Collana Studies in Big Data
Soggetto topico Engineering - Data processing
Cooperating objects (Computer systems)
Computational intelligence
Big data
Data Engineering
Cyber-Physical Systems
Computational Intelligence
Big Data
Seguretat informàtica
Protecció de dades
Seguretat de les xarxes d'ordinadors
Dades massives
Computació en núvol
Soggetto genere / forma Llibres electrònics
ISBN 3-030-65722-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Insight into Multi-domain Command and Control Systems: Issues and Challenges -- Cloud Technologies for Building a System of Data Centres for Defence and Security -- Methodology for Organizational Design of Cyber Research Networks -- Managing Cyber-education Environments with Serverless Computing -- Unified Innovative Platform for Administration and Automated Management of Internationally Recognized Standards -- Digitalization and Cyber Resilience Model for the Bulgarian Academy of Sciences.
Record Nr. UNINA-9910483573303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to Data Privacy : Models, Technologies, Solutions / / by Vicenç Torra
Guide to Data Privacy : Models, Technologies, Solutions / / by Vicenç Torra
Autore Torra Vicenç
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (323 pages)
Disciplina 323.448
005.8
Collana Undergraduate Topics in Computer Science
Soggetto topico Data protection - Law and legislation
Data protection
Cryptography
Data encryption (Computer science)
Information technology - Moral and ethical aspects
Computers and civilization
Privacy
Data and Information Security
Cryptology
Information Ethics
Computers and Society
Protecció de dades
Xifratge (Informàtica)
Soggetto genere / forma Llibres electrònics
ISBN 9783031128370
9783031128363
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Basics of Cryptography and Machine Learning -- 3. Privacy Models and Privacy Mechanisms -- 4. User's Privacy -- 5. Avoiding Disclosure from Computations -- 6. Avoiding Disclosure from Data Masking Methods -- 7. Other -- 8. Conclusions.
Record Nr. UNINA-9910629294503321
Torra Vicenç  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Computer organization
Artificial intelligence
Computers
Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Information Systems and Communication Service
Seguretat informàtica
Dades massives
Protecció de dades
Intel·ligència artificial
Soggetto genere / forma Llibres electrònics
ISBN 3-030-38557-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- .
Record Nr. UNISA-996465359103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Computer organization
Artificial intelligence
Computers
Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Information Systems and Communication Service
Seguretat informàtica
Dades massives
Protecció de dades
Intel·ligència artificial
Soggetto genere / forma Llibres electrònics
ISBN 3-030-38557-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- .
Record Nr. UNINA-9910410051603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Human Factors in Privacy Research / / edited by Nina Gerber, Alina Stöver, Karola Marky
Human Factors in Privacy Research / / edited by Nina Gerber, Alina Stöver, Karola Marky
Autore Gerber Nina
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (380 pages)
Disciplina 150
Altri autori (Persone) StöverAlina
MarkyKarola
Soggetto topico Psychology
Cognitive science
Computer science
Human-machine systems
Data protection - Law and legislation
Artificial intelligence
Behavioral Sciences and Psychology
Cognitive Science
Computer Science
Human-Machine Interfaces
Privacy
Artificial Intelligence
Ciència cognitiva
Sistemes persona-màquina
Protecció de dades
Intel·ligència artificial
Soggetto genere / forma Llibres electrònics
ISBN 3-031-28643-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.
Record Nr. UNINA-9910737294903321
Gerber Nina  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Education - Adapting to the Fourth Industrial Revolution : 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings / / edited by Lynette Drevin, Natalia Miloslavskaya, Wai Sze Leung, Suné von Solms
Information Security Education - Adapting to the Fourth Industrial Revolution : 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, June 13–15, 2022, Proceedings / / edited by Lynette Drevin, Natalia Miloslavskaya, Wai Sze Leung, Suné von Solms
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (137 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Education - Data processing
Application software
Computer engineering
Computer networks
Data protection
Computers and Education
Computer and Information Systems Applications
Computer Engineering and Networks
Data and Information Security
Educació
Processament de dades
Programari d'aplicació
Enginyeria d'ordinadors
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-08172-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Securing the Fourth Industrial Revolution through Programming -- Analyzing Error Rates in Cryptological Programming Assignments -- SecTutor: An Intelligent Tutoring System For Secure Programming -- Cybersecurity in the Fourth Industrial Revolution: Charting the Way Forward in Education -- How to Overcome Staff Shortage in Professionals for SOCs and NSICs -- Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements -- A Maturity Assessment Model for Cyber Security Education in Europe -- Real-World Cybersecurity-Inspired Capacity Building -- ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics -- South Africa’s taxi industry as a cybersecurity-awareness game changer: why and how? -- Maritime Cyber Threats Detection Framework: Building Capabilities. .
Record Nr. UNINA-9910574853003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Journal of hardware and systems security
Journal of hardware and systems security
Pubbl/distr/stampa [Cham] : , : Springer International Publishing, , [2017]-
Descrizione fisica 1 online resource
Disciplina 004.6
Soggetto topico Computer security
Computer networks - Security measures
Internet - Security measures
Data encryption (Computer science)
Integrated circuits - Security measures
Computers - Circuits - Design and construction - Security measures
Protecció de dades
Tecnologia de la informació
Sistemes incrustats (Informàtica)
Soggetto genere / forma Periodicals.
Revistes electròniques.
ISSN 2509-3436
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Record Nr. UNINA-9910482005403321
[Cham] : , : Springer International Publishing, , [2017]-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Modern socio-technical perspectives on privacy / / Bart P. Knijnenburg [et al.]
Modern socio-technical perspectives on privacy / / Bart P. Knijnenburg [et al.]
Autore Knijnenburg Bart P
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (459 pages)
Altri autori (Persone) PageXinru
WisniewskiPamela
LipfordHeather Richter
ProferesNicholas
RomanoJennifer A. Z. <1995->
Soggetto topico Computer Security
Data protection
Privacy, Right of
Dret a la intimitat
Protecció de dades
Seguretat informàtica
Soggetto genere / forma Llibres electrònics
ISBN 3-030-82786-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction and Overview Part I: Privacy Theory and Methods 2. Privacy Theories and Frameworks 3. Revisiting APCO 4. Privacy and Behavioral Economics 5. The Development of Privacy Norms 6. Privacy Beyond the Individual Level Part II: Domains 7. Social Media and Privacy 8. Privacy-Enhancing Technologies 9. Tracking and Personalization 10. Healthcare Privacy 11. Privacy and the Internet of Things Part III: Audiences 12. Cross-Cultural Privacy Differences 13. Accessible Privacy 14. Privacy in Adolescence1 5. Privacy and Vulnerable Populations Part IV: Moving Forward 16. User-Tailored Privacy 17. The Ethics of Privacy in Research and Design: Principles, Practices, and Potential 18. EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital Era 19. Reflections: Bringing Privacy to Practice
Record Nr. UNINA-9910544845003321
Knijnenburg Bart P  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui