![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > General
Designed to serve as a reference work for practitioners, academics, and scholars worldwide, this book is the first of its kind to explain complex cybercrimes from the perspectives of multiple disciplines (computer science, law, economics, psychology, etc.) and scientifically analyze their impact on individuals, society, and nations holistically and comprehensively. In particular, the book shows: How multiple disciplines concurrently bring out the complex, subtle, and elusive nature of cybercrimes How cybercrimes will affect every human endeavor, at the level of individuals, societies, and nations How to legislate proactive cyberlaws, building on a fundamental grasp of computers and networking, and stop reacting to every new cyberattack How conventional laws and traditional thinking fall short in protecting us from cybercrimes How we may be able to transform the destructive potential of cybercrimes into amazing innovations in cyberspace that can lead to explosive technological growth and prosperity
Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights from practice. Efforts to theoretically anchor the field have opened perspectives from multiple research domains, as demonstrated in Practical Studies in E-Government. In this volume, the editors and contributors consider the evolution of the e-government field from both practical and research perspectives. Featuring in-depth case studies of initiatives in eight countries, the book deals with such technology-oriented issues as interoperability, prototyping, data quality, and advanced interfaces, and management-oriented issues as e-procurement, e-identification, election results verification, and information privacy. The book features best practices, tools for measuring and improving performance, and analytical methods for researchers.
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as matching theory, game dynamics, games of coordination, networks and social choice, markets and auctions, price of anarchy, computational aspects of games, mechanism design and auctions.
1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandA. Motro PartIII InformationandKnowledgeManagement EffectiveStorageofSemanticWebData...177 RobertoDeVirgilio,PierluigiDelNostro,GiorgioGianforme, StefanoPaolozzi,andRiccardoTorlone AReferenceArchitectureforSemanticKnowledge Coordination ...185 S. Castano,A. Ferrara,andS. Montanelli Service-BasedNetworkedCollaboration...195 DevisBianchini,ValeriaDeAntonellis,andMicheleMelchiori HowtoExploitDataMiningWithoutBecomingAwareofit ...203 N. Ciaramella,andA. Albano AMethodologicalApproachtoEnableCooperative ProcessDesignThroughWebServices...211 D. Bianchini,C. Cappiello,V. DeAntonellis,andB. Pernici TowardanEffectiveandEf?cientQueryProcessing intheNeP4BProject ...
RFID is a key technology for Europe. Today there is a noticeable shift away from the days of RFID pilot projects, and towards a time where organisations are looking to RFID to drive efficiency and innovation. Although Europe is a leading player in the world of RFID technology, several challenges which are preventing RFID from reaching its full potential need to be addressed. To further the advancement of this technology, coordinated European efforts need to be promoted, specifically in the areas of standardisation, user guidelines, legislation, technology development, and research and development. These themes have been analysed, and clear recommendations have been derived, stating what the different RFID stakeholders can do to support the technology. This book is aimed at decision makers in all fields of society, e.g. in companies, politics, business associations, etc. The publication is a summary of the results of the coordination action CE RFID - "Coordinating European Efforts in the RFID Value Chain" - and is a network of European RFID technology providers, vendors and end users. It aims at promoting the use of RFID technology and supporting further development. The project was funded by the European Commission under the 6th Framework Programme.
Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government deals with the accelerating evolution in the computerization of society. This evolution, or should we call it a revolution, is dominantly driven by the Internet, and documented by the novelties introduced, year by year, by Information and Communication Technologies. The book contains recent results of research and development in the areas of: -E-government, -Business models of e-applications, -Innovative structures in the internet, -Auctions and e-payment, -Future aspects of communication, -Internet and the web, -Advanced platforms and grid computing, -Cooperation and integration, -Modeling and construction of e-services.
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP),focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government,...Themoreour societyrelies on electronicforms ofcommunication,themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines,organisationsandcountries,todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering,mobileagentsecurity,e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies,one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion,and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea drivingforce for futureconferencestocome.
This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014.The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy."
This book constitutes the refereed proceedings of the 11th International Conference on Mobile Web and Information Systems, MobiWIS 2014, held in Barcelona, Spain, in August 2014. The 24 papers presented were carefully reviewed and selected from 75 submissions and cover topics such as: mobile software systems, middleware/SOA for mobile systems, context- and location-aware services, data management in the mobile web, mobile cloud services, mobile web of things, mobile web security, trust and privacy, mobile networks, protocols and applications, mobile commerce and business services, HCI in mobile applications, social media, and adaptive approaches for mobile computing.
Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.
This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers address issues such as future Internet architecture, Internet routing, network security, network management, data center networks, green networks, wireless networks, P2P networks, mobile Internet and the Internet of Things.
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.
This book contains the thoroughly refereed and revised best papers from the 8th International Conference on Web Information Systems and Technologies, WEBIST 2012, held in Porto, Portugal, in April 2012, and organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS. The 23 papers presented in this book were carefully reviewed and selected from 184 submissions. The papers were selected from those with the best reviews also taking into account the quality of their presentation at the conference. The papers are grouped into parts on Internet Technology; Web Interfaces and Applications; Society, e-Business, and e-Government; Web Intelligence; and Mobile Information Systems.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.
Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.
This book constitutes the refereed proceedings of the two workshops held at the 14th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2011, held in Wollongong, Australia, in November. The workshops were, Workshop on Agent Based Simulation for a Sustainable Society (ABSSS 2011) and International Workshop on Multi-Agent Smart Computing (MASmart 2011). The 8 papers presented were carefully reviewed and selected from various submissions. The papers cover topics from agent based simulation for a sustainable society and on multi-agent smart computing.
The papers presented in this volume advance the state-of-the-art research on social media and Web 2.0, electronic tourism marketing, website development and evaluation, search engine marketing and optimization, IT adoption and diffusion, virtual travel communities, mobile technologies, management information systems in tourism, eLearning, recommender systems for tourism businesses and destinations and electronic distribution for hospitality and travel products. This book covers the most significant topics contributed by prominent scholars from around the world and is suitable for both academics and practitioners who are interested in the latest developments in e-Tourism.
This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.
The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule. |
You may like...
Glory Game - The Joost van der…
Joost Van Der Westhuizen, Odette Schwegler
Paperback
(5)
|