Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
The handbook presents an overview of Industry 4.0 and offers solutions for important practical questions. The law and its current challenges regarding data assignment (who owns the data? / EU guidelines), data security, data protection (General Data Protection Regulation), cyberattacks, competition law (right to access vs. monopolists, permissible and prohibited exchanges of information, possible collaborations) is the point of departure. In turn, the book explores peculiarities in specific areas of Industry 4.0 (Internet of Production, mechanical engineering, artificial intelligence, electromobility, autonomous driving, traffic, medical science, construction, energy industry, etc.). The book's closing section addresses general developments in management, the digital transformation of companies and the world of work, and ethical questions.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems.Advances in Digital Forensics V describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, integrity and privacy, network forensics, forensic computing, investigative techniques, legal issues and evidence management.This book is the fifth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-three edited papers from the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2009.Advances in Digital Forensics V is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Written as a guide for assessing the roles that these technqiues play, the book highlights implementation strategies, problem solving solutions, and paves the way for future research endeavors in smart and next generation healthcare systems.
The Learning Engineering Toolkit is a practical guide to the rich and varied applications of learning engineering, a rigorous and fast-emerging discipline that synthesizes the learning sciences, instructional design, engineering design, and other methodologies to support learners. As learning engineering becomes an increasingly formalized discipline and practice, new insights and tools are needed to help education, training, design, and data analytics professionals iteratively develop, test, and improve complex systems for engaging and effective learning. Written in a colloquial style and full of collaborative, actionable strategies, this book explores the essential foundations, approaches, and real-world challenges inherent to ensuring participatory, data-driven, learning experiences across populations and contexts.
The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research.Features:Presents cutting edge topics and research in IoTIncludes contributions from leading worldwide researchersFocuses on IoT architectures for smart environmentsExplores security, privacy, and trustCovers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environmentsThis book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.
This is the first book to show how digitalisation and the better provision of information and communication technologies (ICTs) can improve access to a wide-range of social services, as well as make them more inclusive. Overcoming disparities across social groups using contemporary digitalisation models will have lasting consequences on social well-being and human welfare.Reflecting on current trends the authors vividly illustrate the collective, global nature of the challenge that digitalisation represents for providers, administrators and users of welfare services. It is important, therefore, to bear in mind the following for research design and practice:Citizens' rights must be protectedConsideration should be given to how the services provided can be improved by more effective use of ICTsDigital interventions require better service coordination in the setting of priorities and specific training in digital skills for service providers and service usersThe chapters in this book address these problems and challenges in great depth, analysing the role of ICTs in promoting social inclusion and social welfare, drawing on examples of successful ICT applications around the world. The book contains country case-studies from the United States, Brazil, India, the Republic of Korea, Taiwan, Hong Kong (China), Zimbabwe, Morocco, Spain, Portugal, Ireland and Singapore and will be of interest to all scholars and students of social policy, to social work educators, and social care providers.
This book proposes to provide a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain with a detailed analysis of effective countermeasures and mitigations. It is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals working in the area.
We live in an algorithmic society. Algorithms have become the main mediator through which power is enacted in our society. This book brings together three academic fields - Public Administration, Criminal Justice and Urban Governance - into a single conceptual framework, and offers a broad cultural-political analysis, addressing critical and ethical issues of algorithms.Governments are increasingly turning towards algorithms to predict criminality, deliver public services, allocate resources, and calculate recidivism rates. Mind-boggling amounts of data regarding our daily actions are analysed to make decisions that manage, control, and nudge our behaviour in everyday life. The contributions in this book offer a broad analysis of the mechanisms and social implications of algorithmic governance. Reporting from the cutting edge of scientific research, the result is illuminating and useful for understanding the relations between algorithms and power.Topics covered include:Algorithmic governmentalityTransparency and accountabilityFairness in criminal justice and predictive policingPrinciples of good digital administrationArtificial Intelligence (AI) in the smart cityThis book is essential reading for students and scholars of Sociology, Criminology, Public Administration, Political Sciences, and Cultural Theory interested in the integration of algorithms into the governance of society.
This book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The HCI-CPT 2022 proceedings focuses on to user privacy and data protection, trustworthiness and User Experience in cybersecurity, multi-faceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments, as well as the impact of the Covid-19 pandemic on cybersecurity
Cyberethics: Morality and Law in Cyberspace, Seventh Edition provides a comprehensive and up-to-date investigation of the internet's influence on our society and our lives. As internet use expands and new informational technologies are developed worldwide, unprecedented social and moral issues continue to emerge. This crucial and timely resource addresses problems of censorship, intellectual property, information privacy, and cybersecurity through the lenses of morality and public policy, and discusses potential resolutions that may be reached through technology, law, or a combination of the two. The Seventh Edition's updated case studies are highly relevant to the modern age of cyberspace, and invite readers to consider both the legal and philosophical perspectives of a broad range of current hot-button issues. Addressing major corporate data breaches, fair use and the Crypto Wars, and the political impact of regulation and "fake news," among other recent controversies, the case studies selected provide students the opportunity to view the subject in a global context and are sure to prompt thoughtful classroom discussion.
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS - pronounced 'dramatics'), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongong and in cooperation with the International Association of Cryptologic Research (IACR) and IEEE Computer Society's Task Force on Information Assurance. DRMTICS isan internationalconferenceseriesthat coversthe areaof digital rights management, including research advancements of an applied and theor- ical nature. The goal is to have a broad coverage of the ?eld and related issues and subjects as the area evolves. Since the Internet and the computing infr- tructure has turned into a marketplace for content where information goods of various kinds are exchanged, this area is expected to grow and be part of the ongoing evolution of the information society. The DRM area is a unique blend of many diverse disciplines that include mathematics and cryptography, legal and social aspects, signal processing and watermarking, game theory, infor- tion theory, software and systems design and business analysis, and DRMTICS attempts to cover as much ground as possible, and to cover new results that will further spur new investigations on the foundations and practices of DRM. We hope that this ?rst conference marks the beginning of a fruitful and useful series of future conferences. This year, the conference received 57 submissions out of which 26 were - cepted for presentation after a rigorous refereeing process.
This book constitutes the refereed proceedings of the Second International Conference on Human.Society@Interet, HSI 2003,held in Seoul, Korea, in June 2003.The 57 revised full papers and 31 revised short papers presented were carefully reviewed and selected from 219 submissions. The papers are organized in topical sections on Web performance, authentication, social issues, security and document access, routing, XML, Internet applications, e-business, scheduling and resource allocation, wireless networks, Web components, multimedia communications, e-payment and auctions, cyber education, mobility and handoff, Internet protocols, mobile agents, and communications.
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.