You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.
This book constitutes the refereed proceedings of the 5th International Symposium on Mobile Human-Computer Interaction, Mobile HCI 2003, held in Udine, Italy in September 2003. The 21 revised full papers and 29 revised short papers presented together with a keynote paper and an abstract of a keynote speech were carefully reviewed and selected from 122 submissions. The papers are organized in topical sections on mobile users in natural context, input techniques for mobile devices, location-aware guides and planners, bringing mobile services to groups in workplaces, mobile gambling, tools and frameworks for mobile interface design and generation, and usability and HCI research methods.
This volume in the Advances in Management Information Systems series covers the managerial landscape of information security.
This book constitutes the refereed proceedings of the 6th International Symposium on Mobile Human-Computer Interaction, Mobile HCI 2004, held in Glasgow, UK, in September 2004. The 25 revised full papers, 20 revised short papers, and 22 revised posters presented together with summaries of 7 workshops and 2 panels were carefully reviewed and selected from a total of 166 submissions. The full papers are organized in topical sections on screen and power limitations; user differences and navigation; evaluation and evaluation techniques, till, touch and text entry; auditory interactions; device differences and web pages; and novel interaction techniques.
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.
While growth is a top priority for companies of all sizes, it can be extremely difficult to create and maintain—especially in today’s competitive business environment. The Granularity of Growth will put you in a better position to succeed as it reveals why growth is so important, what enables certain companies to grow so spectacularly, and how to ensure that growth comes from multiple sources as you take both a broad and a granular view of your markets.
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.
This book constitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing, UbiComp 2005, held in Tokyo, Japan in September 2005. The 22 revised full papers presented were carefully reviewed and selected from 230 submissions. The papers address topics related to human-computer interface (HCI), systems, context recognition and use, communications, and social implications and applications of computing. Methodologies included real-world deployments, laboratory experiments, ethnographic analysis, qualitative and quantitative evaluation, and theoretical explorations. Topics of special interest are location systems and their applications, case studies and user interfaces, algorithms for recognition of context, and novel devices.