You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.
Time has become a precious commodity, so business leaders who can save their customers' time more effectively than competitors do will win their loyalty. This book shows how it's done. Business survival requires valuing what customers value—and in our overworked and distraction-rich era, customers value their time above all else. Real-time companies beat their rivals by being faster and more responsive in meeting customer needs. To become a real-time company, as top scholars Jerry Power and Tom Ferratt explain, you need a real-time monitoring and response system. They offer detailed advice on how to put procedures in place that will collect data on how well products or services are saving ...
This book constitutes the refereed proceedings of the Second EAI International Conference on Smart Grid and Internet of Things, SGIoT 2018, held in Niagara Falls, Canada, Ontario, in July 2018. The 14 papers presented were carefully reviewed and selected from 25 submissions and present research results on how to achieve more efficient use of resources based largely on IoT-based machine-to-machine interactions in the smart grit communication networks. The smart grid also encompasses IoT technologies, which monitor transmission lines, manage substations, integrate renewable energy generation (e.g., solar or wind), and utilize hybrid vehicle batteries. Through these technologies, the authorities can smartly identify outage problems, and intelligently schedule the power generation and delivery to the customers
The two-volume Proceedings set CCIS 1675 and 1676 constitutes the refereed proceedings of the Second International Conference, ARTIIS 2022, held in Santiago de Compostela, Spain, during September 12–15, 2022. The 72 papers included in these proceedings were carefully reviewed and selected from 191 submissions. These papers were categorized into 2 technical tracks, i.e., Computing Solutions and Data Intelligence.
Digital technologies are influencing the way we learn, live, work, and exist in different contexts of society in the digital age. There are a variety of learning systems that support innovative digital approaches, and universities and organizations around the world are investing in building their own e-learning platforms. Digital technologies are enabling wider access to education and new markets for student recruitment, resulting in increased income prospects for global higher education institutions. Technology enables numerous data and information sources, which give greater access to information and data. It also enables highly virtual environments, which impact teaching and the classroom...
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.
Over 60 simple and incredibly effective recipes for harnessing the power of the best Moodle modules to create effective online learning sites.