Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)
Title | Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) PDF eBook |
Author | Nathan Clarke |
Publisher | Lulu.com |
Pages | 314 |
Release | 2016 |
Genre | Computers |
ISBN | 1841024139 |
The Human Aspects of Information Security and Assurance (HAISA) symposium specifically addresses information security issues that relate to people. It concerns the methods that inform and guide users' understanding of security, and the technologies that can benefit and support them in achieving protection. This book represents the proceedings from the 2016 event, which was held in Frankfurt, Germany. A total of 27 reviewed papers are included, spanning a range of topics including the communication of risks to end-users, user-centred security in system development, and technology impacts upon personal privacy. All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.
Evidence-Based Cybersecurity
Title | Evidence-Based Cybersecurity PDF eBook |
Author | Pierre-Luc Pomerleau |
Publisher | CRC Press |
Pages | 233 |
Release | 2022-06-23 |
Genre | Computers |
ISBN | 1000600939 |
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals' and organizations' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies "in the wild" have been dismissed in the process of encouraging innovation and marketing. Consequently, governmental organizations, public, and private companies allocate a considerable portion of their operations budgets to protecting their computer and internet infrastructures without understanding the effectiveness of various tools and policies in reducing the myriad of risks they face. Unfortunately, this practice may complicate organizational workflows and increase costs for government entities, businesses, and consumers. The success of the evidence-based approach in improving performance in a wide range of professions (for example, medicine, policing, and education) leads us to believe that an evidence-based cybersecurity approach is critical for improving cybersecurity efforts. This book seeks to explain the foundation of the evidence-based cybersecurity approach, review its relevance in the context of existing security tools and policies, and provide concrete examples of how adopting this approach could improve cybersecurity operations and guide policymakers' decision-making process. The evidence-based cybersecurity approach explained aims to support security professionals', policymakers', and individual computer users' decision-making regarding the deployment of security policies and tools by calling for rigorous scientific investigations of the effectiveness of these policies and mechanisms in achieving their goals to protect critical assets. This book illustrates how this approach provides an ideal framework for conceptualizing an interdisciplinary problem like cybersecurity because it stresses moving beyond decision-makers' political, financial, social, and personal experience backgrounds when adopting cybersecurity tools and policies. This approach is also a model in which policy decisions are made based on scientific research findings.
International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023)
Title | International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023) PDF eBook |
Author | Pablo García Bringas |
Publisher | Springer Nature |
Pages | 377 |
Release | |
Genre | |
ISBN | 3031425197 |
Proceedings of International Conference on Deep Learning, Computing and Intelligence
Title | Proceedings of International Conference on Deep Learning, Computing and Intelligence PDF eBook |
Author | Gunasekaran Manogaran |
Publisher | Springer Nature |
Pages | 698 |
Release | 2022-04-26 |
Genre | Technology & Engineering |
ISBN | 9811656525 |
This book gathers selected papers presented at the International Conference on Deep Learning, Computing and Intelligence (ICDCI 2021), organized by Department of Information Technology, SRM Institute of Science and Technology, Chennai, India, during January 7–8, 2021. The conference is sponsored by Scheme for Promotion of Academic and Research Collaboration (SPARC) in association with University of California, UC Davis and SRM Institute of Science and Technology. The book presents original research in the field of deep learning algorithms and medical imaging systems, focusing to address issues and developments in recent approaches, algorithms, mechanisms, and developments in medical imaging.
Third International Congress on Information and Communication Technology
Title | Third International Congress on Information and Communication Technology PDF eBook |
Author | Xin-She Yang |
Publisher | Springer |
Pages | 968 |
Release | 2018-09-28 |
Genre | Technology & Engineering |
ISBN | 981131165X |
The book includes selected high-quality research papers presented at the Third International Congress on Information and Communication Technology held at Brunel University, London on February 27–28, 2018. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IOT), and e-mining. Written by experts and researchers working on ICT, the book is suitable for new researchers involved in advanced studies.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23)
Title | Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23) PDF eBook |
Author | Kevin Daimi |
Publisher | Springer Nature |
Pages | 670 |
Release | 2023-05-26 |
Genre | Technology & Engineering |
ISBN | 3031337433 |
This book includes recent research on Data Science, IoT, Smart Cities and Smart Energy, Health Informatics, and Network Security. The International Conference on Advances in Computing Research (ACR’23) brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the advances in computing technologies. The conference is aptly segmented into six tracks to promote a birds-of-the-same-feather congregation and maximize participation. The first track covers computational intelligence, which include, among others, research topics on artificial intelligence, knowledge representation and management, application and theory of neural systems, fuzzy and expert systems, and genetic algorithms. The second track focuses on cybersecurity engineering. It includes pertinent topics such as incident response, hardware and network security, digital biometrics and forensics technologies, and cybersecurity metrics and assessment. Further, it features emerging security technologies and high-tech systems security. The third track includes studies on data analytics. It covers topics such as data management, statistical and deep analytics, semantics and time series analytics, and a multitude of important applications of data analytics in areas such as engineering, health care, business, and manufacturing. The fourth track on network and communications covers a wide range of topics in both areas including protocols and operations, ubiquitous networks, ad hoc and sensor networks, cellular systems, virtual and augmented reality streaming, information centric networks, and the emerging areas in connected and autonomous vehicle communications. Lastly, the final track on cloud and mobile computing includes areas of interest in cloud computing such as infrastructure, service, management and operations, architecture, and interoperability and federation. This track also includes important topics in mobile computing such as services and applications, communication architectures, positioning and tracking technologies, the general applications of mobile computing.
HCI for Cybersecurity, Privacy and Trust
Title | HCI for Cybersecurity, Privacy and Trust PDF eBook |
Author | Abbas Moallem |
Publisher | Springer Nature |
Pages | 714 |
Release | 2023-07-08 |
Genre | Computers |
ISBN | 3031358228 |
This proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.