- Table View
- List View
Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11449)
by Moti Yung Xinyi Huang Fuchun GuoThis book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.
Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9722)
by Joseph K. Liu Ron SteinfeldThe two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Lecture Notes in Computer Science #10946)
by Willy Susilo Guomin YangThis book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.
Information Security and Privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (Lecture Notes in Computer Science #11547)
by Fuchun Guo Julian Jang-JaccardThis book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.
Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings (Lecture Notes in Computer Science #12248)
by Joseph K. Liu Hui CuiThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science #10599)
by Phong Q. Nguyen and Jianying ZhouThis book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.
Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings (Lecture Notes in Computer Science #11060)
by Liqun Chen Mark Manulis Steve SchneiderThis book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
Information Services: Economics, Management, And Technology
by Robert M. Mason John E. CrepsAs information service management becomes increasingly critical in the 1980s, its attention is no longer limited to the acquisition, indexing, and storage of documents. Instead, it is taking on an expanded role in the understanding and analysis of economic issues and the management of technological innovation, This collection defines the dimensions of this expanded role and suggests strategies for improved information service management. Three principal areas related to information policy and decision making are covered: economics and government policy, management and marketing of services, and innovations and the impacts of technology. The book provides a practical and comprehensive background and framework for librarians, students of information science, information center managers, and others who are concerned with effective management of information services.
Information Sharing and Collaboration: Workshop Summary
by Deepali M. PatelAfter the September 11, 2001, terrorist attacks and subsequent anthrax mailings, the U. S. government prioritized a biosurveillance strategy aimed at detecting, monitoring, and characterizing national security health threats in human and animal populations, food, water, agriculture, and the environment. However, gaps and challenges in biosurveillance efforts and integration of biosurveillance activities remain. September 8-9, 2011, the IOM held a workshop to explore the information-sharing and collaboration processes needed for the nation's integrated biosurveillance strategy.
Information Society Studies (Routledge Research in Information Technology and Society #3)
by Alistair S. DuffWe are often told that we are "living in an information society" or that we are "information workers." But what exactly do these claims mean, and how might they be verified? In this important methodological study, Alistair S. Duff cuts through the rhetoric to get to the bottom of the "information society thesis." Wide-ranging in coverage, this study will be of interest to scholars in information science, communication and media studies and social theory. It is a key text for the newly-unified specialism of information society studies, and an indispensable guide to the future of this discipline.
Information Society and the Workplace: Spaces, Boundaries and Agency (Routledge Studies in Technology, Work and Organizations #Vol. 1)
by Jeff Hearn Tuula HeiskanenMuch has been written on the grand prospects for "Information Society"; much less on what this might mean in everyday terms. So what do we find when we look at what is happening in a society, Finland, that is one of closest to an information society? Bringing together studies of everyday local practices in workplaces within information society, this book has a special focus on social space and the agency of actors. It includes both theoretical reviews and detailed qualitative research. It also highlights the political challenges of the information society, challenges which are likely to become subjects of international concern.
Information Sources for Teachers (Routledge Revivals)
by David BrownPublished in 1996, this book aims to address the problem faced by teachers needing basic information about the subject they have been asked to teach. It includes addresses of publishers, suppliers, agencies and organizations which should be useful for teachers.
Information Space: A Framework For Learning In Organizations, Institutions, And Culture (Routledge Library Editions: Organizations)
by Max BoisotIn this book the author lays the foundations for a new political economy of information. The information space, or I-Space is the conceptual framework in which organizations, institutions and cultures are being transformed by new information and communication technologies. In the penultimate chapter, the I-Space’s usefulness as an explanatory framework is illustrated with an application: a case study of China’s modernization. Information Space proposes a radical shift in the way that we approach the emerging information age and the implications it holds for societies, organizations and individuals.
Information Strategy in Practice
by Elizabeth OrnaLiz Orna's original Practical Information Policies has become a standard text which has helped information managers in many countries to take productive action in their own environment: to get a job they wanted, carry through an information audit, make a successful business case for an information policy, or formulate an information strategy. This book is designed specially for students preparing to enter the information professions; working professionals in other fields, whose job includes an information-management element; and senior managers from other specialisms who have overall responsibilities for information activities. Information Strategy in Practice provides, in brief and practical form, and informal style: ¢ a reliable account of the key processes involved in developing organizational information policy and strategy, with realistic suggestions on carrying them through, drawn from actual practice ¢ a sound framework of the ideas underlying the practice recommended, which readers can relate to their own context ¢ advice from experience about dealing with the kind of problems that often beset information-strategy development, and about getting the best from the process.
Information Systems Security and Privacy: 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #977)
by Steven Furnell Olivier Camp Paolo MoriThis book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.
Information Systems Security: 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings (Lecture Notes in Computer Science #11281)
by Trent Jaeger Vinod Ganapathy R. K. ShyamasundarThis book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.
Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings (Lecture Notes in Computer Science #12553)
by Salil Kanhere Vishwas T Patil Shamik Sural Manoj S GaurThis book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
Information Systems and Neuroscience
by Jan Vom Brocke René Riedl Pierre-Majorique Léger Fred D. Davis Adriane B. RandolphThis book presents the proceedings of the Gmunden Retreat on NeuroIS 2015, reporting on topics at the intersection of Information Systems (IS) research, neurophysiology and the brain sciences. Readers will discover the latest findings from top scholars in the field of NeuroIS, which offer detailed insights on the neurobiology underlying IS behavior, essential methods and tools and their applications for IS, as well as the application of neuroscience and neurophysiological theories to advance IS theory.
Information Technologies and Social Orders (Communication And Social Order Ser.)
by Carl J. CouchAccording to Carl J. Couch, the history of human society is one of successive, sometimes overlapping, information technologies used to process the various symbolic representations that inform social contexts. Unlike earlier “media” theorists who ignored social context in order to concentrate on the information technologies themselves, Couch implements a consistent theory of interpersonal and intergroup relations to describe the essential interface between information technologies and the social contexts in which they are used. Couch emphasizes the formative capacities of information technologies across historical epochs and cultures, and places them within the major institutional relations of various societies. He views social orders as reflexively shaped by the information technologies that participants use, and as susceptible to mass brutality and oppression due to oligarchic control though he hopes technology will remain humane. The original edition of this manuscript was nearly complete at the time of Couch’s death and was brought to completion by two of his closest associates. Now after two decades, during which its impact is indisputable, it has been updated for a new generation of students and scholars. Additions include discussions on books in the digital age, social media, mobile telephones, recordings, participatory culture, and more.
Information Technology For The Social Scientist
by Raymond M. LeeAccessible and practical overview to help social reseachers make the most of information technology in relation to research design and selection, management and analysis of research data. The book pinpoints current and future trends in computer-assisted methods.; This book is intended for postgraduate and undergraduate social research methods courses and professional social researchers in sociology, social policy and administration, social psychology and geography. Particular appeal to courses in computer applications for social scientists and researchers.
Information Technology In The Third World: Can I.T. Lead To Humane National Development?
by William James StoverMass media, telecommunications, and computer technology can effect change in poor countries, but Third World leaders are often disappointed in the results. Professor Stover looks closely at information technology and communication as agents of economic, social, and political development in Third World countries, stressing that definitions of "communication" and "development" must include participation in the exchange of information and the attainment of humane values. He examines reasons why the current world information order does not meet the needs of the Third World and argues that the major difficulty in achieving the potential of information technology for humane development is a cyclical pattern involving technology and values. When countries acquire the physical means of communication, their leaders are tempted to control them, resulting in censorship that prevents genuine communication. Breaking this cycle is a major requirement in using information technology for development, and Dr. Stover discusses how this may be accomplished practically in developmental, Western, and Soviet contexts.
Information Technology Risk Management in Enterprise Environments
by Jake Kouns Daniel MinoliDiscusses all types of corporate risks and practical means of defending against them.Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations.Offers an effective risk management program, which is the most critical function of an information security program.
Information Technology and the World of Work
by James T. Bennett Anthony M. Townsend Daphne Gottlieb TarasInformation technologies have become both a means and an end, transforming the workplace and how work is performed. This ongoing evolution in the work process has received extensive coverage but relatively little attention has been given to how changing technologies and work practices affect the workers themselves. This volume specifi cally examines the institutional and social environment of the workplaces that information technologies have created.
Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace (Technology, Peace and Security I Technologie, Frieden und Sicherheit)
by Christian ReuterTechnological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security. It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.
Information Technology in Bio- and Medical Informatics: 8th International Conference, ITBAM 2017, Lyon, France, August 28–31, 2017, Proceedings (Lecture Notes in Computer Science #10443)
by Miroslav Bursa, Andreas Holzinger, M. Elena Renda and Sami KhuriThis book constitutes the refereed proceedings of the 8th International Conference on Information Technology in Bio- and Medical Informatics, ITBAM 2017, held in Lyon, France, in August 2017.The 3 revised full papers and 6 poster papers presented were carefully reviewed and selected from 15 submissions. The papers address a broad range of topics in applications of information technology to biomedical engineering and medical informatics.