"This book presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system secu
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethi
Academics and professionals in the fields of computer science and informatics present twenty-three papers on contemporary issues in information and data security and privacy in networking technologies
Law scholars mostly in Europe but also the Philippines and the US discuss privacy, identity, and personality in a world of digital technology; defining the private and the public: political anonymity
"This book focus on the latest advances in mobile technologies of secure transaction processing. It covers topics such as security issues and requirements for online banking, privacy in mobile databas
Computer scientists and communications engineers review the current methodologies and mechanisms in the theory and practice of security, privacy, intrusion detection, and applied cryptography in sm
The 15 contributions in this volume propose frameworks for building pervasive computing systems and address the challenges posed by pervasive communications, context awareness, security, privacy, and
This collection of thirteen articles on network security showcases current scholarship in privacy and security in relation to both social relations and programming for virtual environments. Topics dis
Acknowledging that information communication technology constantly opens new doors to both opportunities and risks, this collection explores the need to integrate data protection and privacy from the
"This book covers the fundamental concepts of big data management and analytics along with recent research development in big data. It also includes various real time/offline applications and case stu
Scholars of business management and of information systems explore approaches and methods for providing information to some people all the time and other people none of the time. Among their topics ar
Technical, legal, social, and philosophical approaches are brought to bear on the tension between the need to collect data and information for disparate operational objectives, and the need to preserv
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and secur