Author: Thomas Groß
Publisher: Springer Nature
ISBN: 3030559580
Category : Computers
Languages : en
Pages : 238
Book Description
The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.
Socio-Technical Aspects in Security and Trust
Author: Thomas Groß
Publisher: Springer Nature
ISBN: 3030559580
Category : Computers
Languages : en
Pages : 238
Book Description
The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.
Publisher: Springer Nature
ISBN: 3030559580
Category : Computers
Languages : en
Pages : 238
Book Description
The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.
Socio-Technical Aspects in Security
Author: Simon Parkin
Publisher: Springer Nature
ISBN: 3031101839
Category : Computers
Languages : en
Pages : 214
Book Description
This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.
Publisher: Springer Nature
ISBN: 3031101839
Category : Computers
Languages : en
Pages : 214
Book Description
This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.
Handbook of Research on Socio-Technical Design and Social Networking Systems
Author: Whitworth, Brian
Publisher: IGI Global
ISBN: 1605662658
Category : Computers
Languages : en
Pages : 1034
Book Description
Addresses current issues of research into socio-technical systems (STSs). Provides suggestions on how social knowledge can synergize with technical knowledge.
Publisher: IGI Global
ISBN: 1605662658
Category : Computers
Languages : en
Pages : 1034
Book Description
Addresses current issues of research into socio-technical systems (STSs). Provides suggestions on how social knowledge can synergize with technical knowledge.
Modern Socio-Technical Perspectives on Privacy
Author: Xinru Page
Publisher: Springer Nature
ISBN: 3030827860
Category : Application software
Languages : en
Pages : 459
Book Description
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
Publisher: Springer Nature
ISBN: 3030827860
Category : Application software
Languages : en
Pages : 459
Book Description
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
Human Aspects of Information Security, Privacy and Trust
Author: Theo Tryfonas
Publisher: Springer
ISBN: 331958460X
Category : Computers
Languages : en
Pages : 763
Book Description
The two-volume set LNCS 10286 + 10287 constitutes the refereed proceedings of the 8th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics, and Risk Management, DHM 2017, held as part of HCI International 2017 in Vancouver, BC, Canada. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process. The 75 papers presented in these volumes were organized in topical sections as follows: Part I: anthropometry, ergonomics, design and comfort; human body and motion modelling; smart human-centered service system design; and human-robot interaction. Part II: clinical and health information systems; health and aging; health data analytics and visualization; and design for safety.
Publisher: Springer
ISBN: 331958460X
Category : Computers
Languages : en
Pages : 763
Book Description
The two-volume set LNCS 10286 + 10287 constitutes the refereed proceedings of the 8th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics, and Risk Management, DHM 2017, held as part of HCI International 2017 in Vancouver, BC, Canada. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process. The 75 papers presented in these volumes were organized in topical sections as follows: Part I: anthropometry, ergonomics, design and comfort; human body and motion modelling; smart human-centered service system design; and human-robot interaction. Part II: clinical and health information systems; health and aging; health data analytics and visualization; and design for safety.
Project SAVE
Author: Dennis Hansen
Publisher: Royal Danish Defence College
ISBN: 8771471685
Category : Computers
Languages : en
Pages : 138
Book Description
Publisher: Royal Danish Defence College
ISBN: 8771471685
Category : Computers
Languages : en
Pages : 138
Book Description
Secure and Trustworthy Service Composition
Author: Achim Brucker
Publisher: Springer
ISBN: 331913518X
Category : Computers
Languages : en
Pages : 256
Book Description
The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, methods for ensuring trust and security are fewer and less mature. Lack of trust and confidence in composed services and in their constituent parts is reckoned to be one of the significant factors limiting widespread uptake of service-oriented computing. This state-of-the-art survey illustrates the results of the Aniketos – Secure and Trustworthy Composite Services – project (funded under the EU 7th Research Framework Programme). The papers included in the book describe the solutions developed during the 4-year project to establish and maintain trustworthiness and secure behavior in a constantly changing service environment. They provide service developers and providers with a secure service development framework that includes methods, tools, and security services supporting the design-time creation and run-time composition of secure dynamic services, where both the services and the threats are evolving. The 16 chapters are organized in the following thematic sections: state of the art of secure and trustworthy composite services; the Aniketos platform; design-time support framework; run-time support framework; and case studies and evaluation.
Publisher: Springer
ISBN: 331913518X
Category : Computers
Languages : en
Pages : 256
Book Description
The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, methods for ensuring trust and security are fewer and less mature. Lack of trust and confidence in composed services and in their constituent parts is reckoned to be one of the significant factors limiting widespread uptake of service-oriented computing. This state-of-the-art survey illustrates the results of the Aniketos – Secure and Trustworthy Composite Services – project (funded under the EU 7th Research Framework Programme). The papers included in the book describe the solutions developed during the 4-year project to establish and maintain trustworthiness and secure behavior in a constantly changing service environment. They provide service developers and providers with a secure service development framework that includes methods, tools, and security services supporting the design-time creation and run-time composition of secure dynamic services, where both the services and the threats are evolving. The 16 chapters are organized in the following thematic sections: state of the art of secure and trustworthy composite services; the Aniketos platform; design-time support framework; run-time support framework; and case studies and evaluation.
Human Factors in Cybersecurity
Author: Tareq Ahram and Waldemar Karwowski
Publisher: AHFE International
ISBN: 195865129X
Category : Technology & Engineering
Languages : en
Pages : 168
Book Description
Human Factors in Cybersecurity Proceedings of the 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022), July 24–28, 2022, New York, USA
Publisher: AHFE International
ISBN: 195865129X
Category : Technology & Engineering
Languages : en
Pages : 168
Book Description
Human Factors in Cybersecurity Proceedings of the 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022), July 24–28, 2022, New York, USA
HCI for Cybersecurity, Privacy and Trust
Author: Abbas Moallem
Publisher: Springer Nature
ISBN: 3031358228
Category : Computers
Languages : en
Pages : 714
Book Description
This proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.
Publisher: Springer Nature
ISBN: 3031358228
Category : Computers
Languages : en
Pages : 714
Book Description
This proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.
Advanced Information Systems Engineering
Author: Camille Salinesi
Publisher: Springer
ISBN: 3642387098
Category : Computers
Languages : en
Pages : 735
Book Description
This book constitutes the refereed proceedings of the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, held in Valencia, Spain, in June 2013. The 44 revised full papers were carefully reviewed and selected from 162 submissions. The contributions have been grouped into the following topical sections: services; awareness; business process execution; products; business process modelling; modelling languages and meta models; requirements engineering 1; enterprise architecture; information systems evolution; mining and predicting; data warehouses and business intelligence; requirements engineering 2; knowledge and know-how; information systems quality; and human factors.
Publisher: Springer
ISBN: 3642387098
Category : Computers
Languages : en
Pages : 735
Book Description
This book constitutes the refereed proceedings of the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, held in Valencia, Spain, in June 2013. The 44 revised full papers were carefully reviewed and selected from 162 submissions. The contributions have been grouped into the following topical sections: services; awareness; business process execution; products; business process modelling; modelling languages and meta models; requirements engineering 1; enterprise architecture; information systems evolution; mining and predicting; data warehouses and business intelligence; requirements engineering 2; knowledge and know-how; information systems quality; and human factors.