Author: Saravanan, P. Shanthi
Publisher: IGI Global
ISBN: 1799877582
Category : Computers
Languages : en
Pages : 298
Book Description
Location-aware computing is a technology that uses the location (provides granular geographical information) of people and objects to derive contextual information. Today, one can obtain this location information free of cost through smartphones. Smartphones with location enabled applications have revolutionized the ways in which people perform their activities and get benefits from the automated services. It especially helps to get details of services in less time; wherever the user may be and whenever they want. The need for smartphones and location enabled applications has been growing year after year. Nowadays no one can leave without their phone; the phone seemingly becomes one of the parts of the human body. The individual can now be predicted by their phone and the identity of the phone becomes the person’s identity. Though there is a tremendous need for location-enabled applications with smartphones, the debate on privacy and security related to location data has also been growing. Privacy and Security Challenges in Location Aware Computing provides the latest research on privacy enhanced location-based applications development and exposes the necessity of location privacy preservation, as well as issues and challenges related to protecting the location data. It also suggests solutions for enhancing the protection of location privacy and therefore users’ privacy as well. The chapters highlight important topic areas such as video surveillance in human tracking/detection, geographical information system design, cyberspace attacks and warfare, and location aware security systems. The culmination of these topics creates a book that is ideal for security analysts, mobile application developers, practitioners, academicians, students, and researchers.
Privacy and Security Challenges in Location Aware Computing
Author: Saravanan, P. Shanthi
Publisher: IGI Global
ISBN: 1799877582
Category : Computers
Languages : en
Pages : 298
Book Description
Location-aware computing is a technology that uses the location (provides granular geographical information) of people and objects to derive contextual information. Today, one can obtain this location information free of cost through smartphones. Smartphones with location enabled applications have revolutionized the ways in which people perform their activities and get benefits from the automated services. It especially helps to get details of services in less time; wherever the user may be and whenever they want. The need for smartphones and location enabled applications has been growing year after year. Nowadays no one can leave without their phone; the phone seemingly becomes one of the parts of the human body. The individual can now be predicted by their phone and the identity of the phone becomes the person’s identity. Though there is a tremendous need for location-enabled applications with smartphones, the debate on privacy and security related to location data has also been growing. Privacy and Security Challenges in Location Aware Computing provides the latest research on privacy enhanced location-based applications development and exposes the necessity of location privacy preservation, as well as issues and challenges related to protecting the location data. It also suggests solutions for enhancing the protection of location privacy and therefore users’ privacy as well. The chapters highlight important topic areas such as video surveillance in human tracking/detection, geographical information system design, cyberspace attacks and warfare, and location aware security systems. The culmination of these topics creates a book that is ideal for security analysts, mobile application developers, practitioners, academicians, students, and researchers.
Publisher: IGI Global
ISBN: 1799877582
Category : Computers
Languages : en
Pages : 298
Book Description
Location-aware computing is a technology that uses the location (provides granular geographical information) of people and objects to derive contextual information. Today, one can obtain this location information free of cost through smartphones. Smartphones with location enabled applications have revolutionized the ways in which people perform their activities and get benefits from the automated services. It especially helps to get details of services in less time; wherever the user may be and whenever they want. The need for smartphones and location enabled applications has been growing year after year. Nowadays no one can leave without their phone; the phone seemingly becomes one of the parts of the human body. The individual can now be predicted by their phone and the identity of the phone becomes the person’s identity. Though there is a tremendous need for location-enabled applications with smartphones, the debate on privacy and security related to location data has also been growing. Privacy and Security Challenges in Location Aware Computing provides the latest research on privacy enhanced location-based applications development and exposes the necessity of location privacy preservation, as well as issues and challenges related to protecting the location data. It also suggests solutions for enhancing the protection of location privacy and therefore users’ privacy as well. The chapters highlight important topic areas such as video surveillance in human tracking/detection, geographical information system design, cyberspace attacks and warfare, and location aware security systems. The culmination of these topics creates a book that is ideal for security analysts, mobile application developers, practitioners, academicians, students, and researchers.
Research Anthology on Privatizing and Securing Data
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799889556
Category : Computers
Languages : en
Pages : 2188
Book Description
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.
Publisher: IGI Global
ISBN: 1799889556
Category : Computers
Languages : en
Pages : 2188
Book Description
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.
Edge-of-Things in Personalized Healthcare Support Systems
Author: Rajeswari Sridhar
Publisher: Academic Press
ISBN: 0323907083
Category : Computers
Languages : en
Pages : 437
Book Description
Edge-of-Things in Personalized Healthcare Support Systems discusses and explores state-of-the-art technology developments in storage and sharing of personal healthcare records in a secure manner that is globally distributed to incorporate best healthcare practices. The book presents research into the identification of specialization and expertise among healthcare professionals, the sharing of records over the cloud, access controls and rights of shared documents, document privacy, as well as edge computing techniques which help to identify causes and develop treatments for human disease. The book aims to advance personal healthcare, medical diagnosis, and treatment by applying IoT, cloud, and edge computing technologies in association with effective data analytics. - Provides an in-depth analysis of how to model and design applications for state-of-the-art healthcare systems - Discusses and explores the social impact of the intertwined use of emerging IT technologies for healthcare - Covers system design and software building principles for healthcare using IoT, cloud, and edge computing technologies with the support of effective and efficient data analytics strategies - Explores the latest algorithms using machine and deep learning in the areas of cloud, edge computing, IoT, and healthcare analytics
Publisher: Academic Press
ISBN: 0323907083
Category : Computers
Languages : en
Pages : 437
Book Description
Edge-of-Things in Personalized Healthcare Support Systems discusses and explores state-of-the-art technology developments in storage and sharing of personal healthcare records in a secure manner that is globally distributed to incorporate best healthcare practices. The book presents research into the identification of specialization and expertise among healthcare professionals, the sharing of records over the cloud, access controls and rights of shared documents, document privacy, as well as edge computing techniques which help to identify causes and develop treatments for human disease. The book aims to advance personal healthcare, medical diagnosis, and treatment by applying IoT, cloud, and edge computing technologies in association with effective data analytics. - Provides an in-depth analysis of how to model and design applications for state-of-the-art healthcare systems - Discusses and explores the social impact of the intertwined use of emerging IT technologies for healthcare - Covers system design and software building principles for healthcare using IoT, cloud, and edge computing technologies with the support of effective and efficient data analytics strategies - Explores the latest algorithms using machine and deep learning in the areas of cloud, edge computing, IoT, and healthcare analytics
Eco-friendly Computing and Communication Systems
Author: Jimson Mathew
Publisher: Springer
ISBN: 3642321127
Category : Computers
Languages : en
Pages : 457
Book Description
This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in Kochi, Kerala, India, in August 2012. The 50 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on energy efficient software system and applications; wireless communication systems; green energy technologies; image and signal processing; bioinformatics and emerging technologies; secure and reliable systems; mathematical modeling and scientific computing; pervasive computing and applications.
Publisher: Springer
ISBN: 3642321127
Category : Computers
Languages : en
Pages : 457
Book Description
This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in Kochi, Kerala, India, in August 2012. The 50 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on energy efficient software system and applications; wireless communication systems; green energy technologies; image and signal processing; bioinformatics and emerging technologies; secure and reliable systems; mathematical modeling and scientific computing; pervasive computing and applications.
Networking 2005 Networking Technologies, Services, And Protocols; Performance of Computer And Communication Networks; Mobile and Wireless Communications Systems
Author: Raouf Boutaba
Publisher: Springer Science & Business Media
ISBN: 3540258094
Category : Computers
Languages : en
Pages : 1512
Book Description
This book constitutes the refereed proceedings of the 4th International IFIP-TC6 Networking Conference, NETWORKING 2005, held in Waterloo, Canada in May 2005. The 105 revised full papers and 36 posters were carefully reviewed and selected from 430 submissions. The papers are organized in topical sections on peer-to-peer networks, Internet protocols, wireless security, network security, wireless performance, network service support, network modeling and simulation, wireless LAN, optical networks, Internet performance and Web applications, ad-hoc networks, adaptive networks, radio resource management, Internet routing, queuing models, monitoring, network management, sensor networks, overlay multicast, QoS, wirless scheduling, multicast traffic management and engineering, mobility management, bandwith management, DCMA, and wireless resource management.
Publisher: Springer Science & Business Media
ISBN: 3540258094
Category : Computers
Languages : en
Pages : 1512
Book Description
This book constitutes the refereed proceedings of the 4th International IFIP-TC6 Networking Conference, NETWORKING 2005, held in Waterloo, Canada in May 2005. The 105 revised full papers and 36 posters were carefully reviewed and selected from 430 submissions. The papers are organized in topical sections on peer-to-peer networks, Internet protocols, wireless security, network security, wireless performance, network service support, network modeling and simulation, wireless LAN, optical networks, Internet performance and Web applications, ad-hoc networks, adaptive networks, radio resource management, Internet routing, queuing models, monitoring, network management, sensor networks, overlay multicast, QoS, wirless scheduling, multicast traffic management and engineering, mobility management, bandwith management, DCMA, and wireless resource management.
Privacy, Security and Trust within the Context of Pervasive Computing
Author: Philip Robinson
Publisher: Springer Science & Business Media
ISBN: 0387234624
Category : Computers
Languages : en
Pages : 167
Book Description
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.
Publisher: Springer Science & Business Media
ISBN: 0387234624
Category : Computers
Languages : en
Pages : 167
Book Description
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.
Security and Privacy in Digital Economy
Author: Shui Yu
Publisher: Springer Nature
ISBN: 9811591296
Category : Computers
Languages : en
Pages : 756
Book Description
This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*. The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science. *The conference was held virtually due to the COVID-19 pandemic.
Publisher: Springer Nature
ISBN: 9811591296
Category : Computers
Languages : en
Pages : 756
Book Description
This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*. The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science. *The conference was held virtually due to the COVID-19 pandemic.
Multidisciplinary Approach to Modern Digital Steganography
Author: Pramanik, Sabyasachi
Publisher: IGI Global
ISBN: 1799871622
Category : Computers
Languages : en
Pages : 380
Book Description
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.
Publisher: IGI Global
ISBN: 1799871622
Category : Computers
Languages : en
Pages : 380
Book Description
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.
Enabling Blockchain Technology for Secure Networking and Communications
Author: Ben Mnaouer, Adel
Publisher: IGI Global
ISBN: 1799858413
Category : Computers
Languages : en
Pages : 339
Book Description
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.
Publisher: IGI Global
ISBN: 1799858413
Category : Computers
Languages : en
Pages : 339
Book Description
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.
The Routledge Companion to Risk, Crisis and Security in Business
Author: Kurt J. Engemann
Publisher: Routledge
ISBN: 131724429X
Category : Business & Economics
Languages : en
Pages : 484
Book Description
Aware that a single crisis event can devastate their business, managers must be prepared for the worst from an expansive array of threats. The Routledge Companion to Risk, Crisis and Security in Business comprises a professional and scholarly collection of work in this critical field. Risks come in many varieties, and there is a growing concern for organizations to respond to the challenge. Businesses can be severely impacted by natural and man-made disasters including: floods, earthquakes, tsunami, environmental threats, terrorism, supply chain risks, pandemics, and white-collar crime. An organization’s resilience is dependent not only on their own system security and infrastructure, but also on the wider infrastructure providing health and safety, utilities, transportation, and communication. Developments in risk security and management knowledge offer a path towards resilience and recovery through effective leadership in crisis situations. The growing body of knowledge in research and methodologies is a basis for decisions to safeguard people and assets, and to ensure the survivability of an organization from a crisis. Not only can businesses become more secure through risk management, but an effective program can also facilitate innovation and afford new opportunities. With chapters written by an international selection of leading experts, this book fills a crucial gap in our current knowledge of risk, crisis and security in business by exploring a broad spectrum of topics in the field. Edited by a globally-recognized expert on risk, this book is a vital reference for researchers, professionals and students with an interest in current scholarship in this expanding discipline.
Publisher: Routledge
ISBN: 131724429X
Category : Business & Economics
Languages : en
Pages : 484
Book Description
Aware that a single crisis event can devastate their business, managers must be prepared for the worst from an expansive array of threats. The Routledge Companion to Risk, Crisis and Security in Business comprises a professional and scholarly collection of work in this critical field. Risks come in many varieties, and there is a growing concern for organizations to respond to the challenge. Businesses can be severely impacted by natural and man-made disasters including: floods, earthquakes, tsunami, environmental threats, terrorism, supply chain risks, pandemics, and white-collar crime. An organization’s resilience is dependent not only on their own system security and infrastructure, but also on the wider infrastructure providing health and safety, utilities, transportation, and communication. Developments in risk security and management knowledge offer a path towards resilience and recovery through effective leadership in crisis situations. The growing body of knowledge in research and methodologies is a basis for decisions to safeguard people and assets, and to ensure the survivability of an organization from a crisis. Not only can businesses become more secure through risk management, but an effective program can also facilitate innovation and afford new opportunities. With chapters written by an international selection of leading experts, this book fills a crucial gap in our current knowledge of risk, crisis and security in business by exploring a broad spectrum of topics in the field. Edited by a globally-recognized expert on risk, this book is a vital reference for researchers, professionals and students with an interest in current scholarship in this expanding discipline.