|
Showing 1 - 21 of
21 matches in All Departments
In a digital context, trust is a multifaceted concept, including
trust in application usability, trust in information security, and
trust in fellow users. Mobile technologies have compounded the
impact of such considerations. Trust Management in Mobile
Environments: Autonomic and Usable Models explores current advances
in digital and mobile computing technologies from the user
perspective, evaluating trust models and autonomic trust
management. From the recent history of trust in digital
environments to prospective future developments, this book serves
as a potent reference source for professionals, graduate and
post-graduate students, researchers, and practitioners in the field
of trust management.
The rapid evolution of technology continuously changes the way
people interact, work, and learn. By examining these advances from
a sociological perspective, researchers can further understand the
impact of cyberspace on human behavior, interaction, and cognition.
Analyzing Human Behavior in Cyberspace provides emerging research
exploring the four types of cyber behavior, expanding the
scientific knowledge about the subject matter and revealing its
extreme complexity. Featuring coverage on a broad range of topics
such as cyber effects, emotion recognition, and cyber
victimization, this book is ideally designed for sociologists,
psychologists, academicians, researchers, and graduate-level
students seeking current research on how people behave online.
The ability to effective learn, process, and retain new information
is critical to the success of any student. Since mathematics are
becoming increasingly more important in our educational systems, it
is imperative that we devise an efficient system to measure these
types of information recall. Assessing and Measuring Statistics
Cognition in Higher Education Online Environments: Emerging
Research and Opportunities is a critical reference source that
overviews the current state of higher education learning assessment
systems. Featuring extensive coverage on relevant topics such as
statistical cognitions, online learning implications, cognitive
development, and curricular mismatches, this publication is ideally
designed for academics, students, educators, professionals, and
researchers seeking innovative perspectives on current assessment
and measurement systems within our educational facilities.
Human behavior in cyber space is extremely complex. Change is the
only constant as technologies and social contexts evolve rapidly.
This leads to new behaviors in cybersecurity, Facebook use,
smartphone habits, social networking, and many more. Scientific
research in this area is becoming an established field and has
already generated a broad range of social impacts. Alongside the
four key elements (users, technologies, activities, and effects),
the text covers cyber law, business, health, governance, education,
and many other fields. Written by international scholars from a
wide range of disciplines, this handbook brings all these aspects
together in a clear, user-friendly format. After introducing the
history and development of the field, each chapter synthesizes the
most recent advances in key topics, highlights leading scholars and
their major achievements, and identifies core future directions. It
is the ideal overview of the field for researchers, scholars, and
students alike.
Human behavior in cyber space is extremely complex. Change is the
only constant as technologies and social contexts evolve rapidly.
This leads to new behaviors in cybersecurity, Facebook use,
smartphone habits, social networking, and many more. Scientific
research in this area is becoming an established field and has
already generated a broad range of social impacts. Alongside the
four key elements (users, technologies, activities, and effects),
the text covers cyber law, business, health, governance, education,
and many other fields. Written by international scholars from a
wide range of disciplines, this handbook brings all these aspects
together in a clear, user-friendly format. After introducing the
history and development of the field, each chapter synthesizes the
most recent advances in key topics, highlights leading scholars and
their major achievements, and identifies core future directions. It
is the ideal overview of the field for researchers, scholars, and
students alike.
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings (Paperback, 1st ed. 2017)
Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo
|
R3,336
Discovery Miles 33 360
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 10th
International Conference on Security, Privacy and Anonymity in
Computation, Communication, and Storage, SpaCCS 2017, held in
Guangzhou, China, in December 2017. The 47 papers presented in this
volume were carefully reviewed and selected from 140 submissions.
They deal with research findings, achievements, innovations and
perspectives in information security and related fields covering
topics such as security algorithms and architectures, privacy-aware
policies, regulations and techniques, anonymous computation and
communication, encompassing fundamental theoretical approaches,
practical experimental projects, and commercial application systems
for computation, communication and storage.
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings (Paperback, 1st ed. 2017)
Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo
|
R3,100
Discovery Miles 31 000
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of 11 symposia and
workshops held at the 10th International Conference on Security,
Privacy and Anonymity in Computation, Communication, and Storage,
SpaCCS 2017, held in Guangzhou, China, in December 2017. The total
of 75 papers presented in this volume was carefully reviewed and
selected from a total of 190 submissions to all workshops: UbiSafe
2017: The 9th IEEE International Symposium on UbiSafe Computing
ISSR 2017: The 9th IEEE International Workshop on Security in
e-Science and e-Research TrustData 2017: The 8th International
Workshop on Trust, Security and Privacy for Big Data TSP 2017: The
7th International Symposium on Trust, Security and Privacy for
Emerging Applications SPIoT 2017: The 6th International Symposium
on Security and Privacy on Internet of Things NOPE 2017: The 5th
International Workshop on Network Optimization and Performance
Evaluation DependSys 2017: The Third International Symposium on
Dependability in Sensor, Cloud, and Big Data Systems and
Applications SCS 2017: The Third International Symposium on
Sensor-Cloud Systems WCSSC 2017: The Second International Workshop
on Cloud Storage Service and Computing MSCF 2017: The First
International Symposium on Multimedia Security and Digital
Forensics SPBD 2017: The 2017 International Symposium on Big Data
and Machine Learning in Information Security, Privacy and Anonymity
Journal publication and grant writing are two core professional
skills for new scholars today. However, systematic training is not
typically offered in graduate programs worldwide. This book equips
readers with the current scientific knowledge by providing a
concise introduction to the science of journal article publication.
The overall structure generally matches the curriculum of a
graduate course and each chapter features a learning sequence based
on Daniel Kahneman's intuitive judgement theory. The volume
analyzes the intuitive thoughts of new authors from a variety of
countries, uses over fifty real-life cases, and focuses on core
concepts from nearly 100 research articles. It provides scientific
advice for new authors, junior researchers, and graduate students
to publish their scholarly work and advance their academic careers.
Journal publication and grant writing are two core professional
skills for new scholars today. However, systematic training is not
typically offered in graduate programs worldwide. This book equips
readers with the current scientific knowledge by providing a
concise introduction to the science of journal article publication.
The overall structure generally matches the curriculum of a
graduate course and each chapter features a learning sequence based
on Daniel Kahneman's intuitive judgement theory. The volume
analyzes the intuitive thoughts of new authors from a variety of
countries, uses over fifty real-life cases, and focuses on core
concepts from nearly 100 research articles. It provides scientific
advice for new authors, junior researchers, and graduate students
to publish their scholarly work and advance their academic careers.
|
Algorithms and Architectures for Parallel Processing - 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings (Paperback, 1st ed. 2017)
Shadi Ibrahim, Kim-Kwang Raymond Choo, Zheng Yan, Witold Pedrycz
|
R3,098
Discovery Miles 30 980
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 17th International
Conference on Algorithms and Architectures for Parallel Processing,
ICA3PP 2017, held in Helsinki, Finland, in August 2017. The 25 full
papers presented were carefully reviewed and selected from 117
submissions. They cover topics such as parallel and distributed
architectures; software systems and programming models; distributed
and network-based computing; big data and its applications;
parallel and distributed algorithms; applications of parallel and
distributed computing; service dependability and security in
distributed and parallel systems; service dependability and
security in distributed and parallel systems; performance modeling
and evaluation.This volume also includes 41 papers of four
workshops, namely: the 4th International Workshop on Data, Text,
Web, and Social Network Mining (DTWSM 2017), the 5th International
Workshop on Parallelism in Bioinformatics (PBio 2017), the First
International Workshop on Distributed Autonomous Computing in Smart
City (DACSC 2017), and the Second International Workshop on
Ultrascale Computing for Early Researchers (UCER 2017).
|
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings (Paperback, 1st ed. 2017)
Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
|
R1,685
Discovery Miles 16 850
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 11th International
Conference on Network and System Security, NSS 2017, held in
Helsinki, Finland, in August 2017. The 24 revised full papers
presented in this book were carefully reviewed and selected from 83
initial submissions. The papers are organized in topical sections
on Cloud and IoT Security; Network Security; Platform and Hardware
Security; Crypto and Others; and Authentication and Key Management.
This volume also contains 35 contributions of the following
workshops: Security Measurements of Cyber Networks (SMCN-2017);
Security in Big Data (SECBD-2017); 5G Security and Machine Learning
(IW5GS-2017); of the Internet of Everything (SECIOE-2017).
This book provides the first comprehensive introduction to the
newly-emerging science of mobile phone behavior. It presents the
unexpected complexity of human mobile phone behavior through four
basic aspects of mobile phone usage (users, technologies,
activities, and effects), and then explores four major domains of
such behavior (medicine, business, education, and everyday life).
Chapters open with thoughts on mobile phone usage and behavior from
interviews with cell phone users, then present a series of
scientific studies, synthesized knowledge, and real-life cases,
concluding with complex but highly readable analyses of each aspect
of mobile phone behavior. Readers should achieve two intellectual
goals: gaining a usable knowledge of the complexity of mobile phone
behaviour, and developing the skills to analyze the complexity of
mobile phone usage - and further technological behaviors.
This book provides the first comprehensive introduction to the
newly-emerging science of mobile phone behavior. It presents the
unexpected complexity of human mobile phone behavior through four
basic aspects of mobile phone usage (users, technologies,
activities, and effects), and then explores four major domains of
such behavior (medicine, business, education, and everyday life).
Chapters open with thoughts on mobile phone usage and behavior from
interviews with cell phone users, then present a series of
scientific studies, synthesized knowledge, and real-life cases,
concluding with complex but highly readable analyses of each aspect
of mobile phone behavior. Readers should achieve two intellectual
goals: gaining a usable knowledge of the complexity of mobile phone
behaviour, and developing the skills to analyze the complexity of
mobile phone usage - and further technological behaviors.
The rapid evolution of technology continuously changes the way
people interact, work, and learn. By examining these advances from
a sociological perspective, researchers can further understand the
impact of cyberspace on human behavior, interaction, and cognition.
Analyzing Human Behavior in Cyberspace provides emerging research
exploring the four types of cyber behavior, expanding the
scientific knowledge about the subject matter and revealing its
extreme complexity. Featuring coverage on a broad range of topics
such as cyber effects, emotion recognition, and cyber
victimization, this book is ideally designed for sociologists,
psychologists, academicians, researchers, and graduate-level
students seeking current research on how people behave online.
The "Wu Family Shrines" pictorial carvings from Han dynasty China
(206 BCE-220 CE) are among the earliest works of Chinese art
examined in an international arena. Since the eleventh century, the
carvings have been identified by scholars as one of the most
valuable and authentic materials for the study of antiquity. This
important book presents essays by archaeologists, art and
architectural historians, curators, and historians that reexamine
the carvings, adding to our understanding of the long cultural
history behind them and to our knowledge of Han practices. The
authors offer a thorough analysis of surviving physical and visual
sources, invoking fresh perspectives from new disciplines. Essays
address the ideals, practices, and problems of the "Wu Family
Shrines" and Han China; Han funerary art and architecture in
Shandong and other regions; architectural functions and carved
meanings; Qing Dynasty Reception of the Wu Family Shrines; and
more. Distributed for the Princeton University Art Museum
|
You may like...
X-Men: Apocalypse
James McAvoy, Michael Fassbender, …
Blu-ray disc
R32
Discovery Miles 320
|