You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2017, held in Messina, Italy, in September 2017. The 22 full and 9 short papers presented in this volume were carefully reviewed and selected from 55 submissions. The contributions were organized in topical sections named: internet of things; security; smart city; ad-hoc networks; implementations and validations; wireless sensor networks; data management; wireless systems.
Strong leaders are essential to the structure of organizations across all industries. Having the knowledge, skill sets, and tools available to successfully motivate, manage, and guide others can mean the difference between organizational success and failure. Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications presents the latest research on topics related to effective managerial practice as well as the tools and concepts that attribute to effective leadership. Focusing on a variety of topics including human resources, diversity, organizational behavior, management competencies, employee relations, motivation, and team building, this multi-volume publication is ideal for academic and government library inclusion and meets the research needs of business professionals, academics, graduate students, and researchers.
The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy. Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacy issues, privacy policies and policy based protocols, risk management, risk analysis and vulnerability assessment, cloud systems and cryptography, and attack and security measures.
The COVID-19 pandemic has forced organizations and individuals to embrace new practices such as social distancing and remote working. During these unprecedented times, many have increasingly relied on the internet for work, shopping, and healthcare. However, while the world focuses on the health and economic threats posed by the COVID-19 pandemic, cyber criminals are capitalizing on this crisis as the world has become more digitally dependent and vulnerable than ever. Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic provides cutting-edge research on the best guidelines for preventing, detecting, and responding to cyber threats within educational, business, healt...
This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have...
This book constitutes selected papers from the 16th European, Mediterranean, and Middle Eastern Conference, EMCIS 2019, held in Dubai, UAE, in October 2019. EMCIS is dedicated to the definition and establishment of Information Systems as a discipline of high impact for the methodical community and IS professionals, focusing on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline. The 48 full papers presented in this volume were carefully reviewed and selected from a total of 138 submissions. They were organized in topical sections named: Big Data and Analytics; Blockchain Technology and Applications; Cloud Computing; Digital Services and Social Media; e-Government; Enterprise Information Systems; Health-Care Information Systems; Information Systems Security and Information Privacy Protection; Innovative Research Projects; IT Governance; and Management and Organizational Issues in Information Systems.
Global change and advancing technology have transformed the government sector with the use of information and communication technology to improve service delivery. The use of such technologies in electronic and mobile government services raises issues relating to security, privacy, and data protection. Security Frameworks in Contemporary Electronic Government is a pivotal reference source that provides vital research on the application of special security requirements in electronic government transactions. While highlighting topics such as digital environments, public service delivery, and cybercrime, this publication explores the difficulties and challenges faced in implementing e-government technologies, as well as the different aspects of security in e-government. This book is ideally designed for policymakers, software developers, IT specialists, government officials, academicians, researchers, and students seeking current research on secure environments in electronic and mobile government.
"This book explores the recent rise of emerging networking technologies such as social networks, content centric networks, IoT networks, etc. It also examines the applications of artificial intelligence (AI), machine learning, and data mining to security and privacy problems"--
Le secteur de la santé fait l’objet de plusieurs cyberattaques ces derniers temps. Ceci est dû principalement à une modernisation et une numérisation de ce secteur mais aussi à sa fragilité et au manque de sensibilisation du personnel de la santé aux problèmes de sécurité. Ce chapitre a pour but de s’intéresser aux cyberattaques et aux mesures de sécurité dans les systèmes de e-santé. Mots-clés : E-santé, cybercriminels, cyberattaques, mesures de sécurité, recommandations de protection. DOI : 10.51926/ISTE.9179.ch2