You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In an era where new areas of life and new problems call for normative solutions while the plurality of values in society challenge the very basis for normative solutions, this book looks at a growing field of research on the relations between social and legal norms. New technologies and social media offer new ways to communicate about normative issues and the centrality of formal law and how normativity comes about is a question for debate. This book offers empirical and theoretical research in the field of social and legal norms and will inspire future debate and research in terms of internationalization and cross-national comparative studies. It presents a consistent picture of empirical r...
The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous d...
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022. The 7 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 18 submissions. The workshop presents papers with topics such as security and trust access control, cryptographic protocols, identity management, security metrics, and privacy.
Examining the Concepts, Issues, and Implications of Internet Trolling provides current research on the technical approaches as well as more social and behavioral involvements for gaining a better understanding of internet trolling. This book is useful to researchers, students and practitioners interested in building a share meaning for online community users.
As the world rapidly moves online, sectors from management, industry, government, and education have broadly begun to virtualize the way people interact and learn. Virtual Learning Environments: Concepts, Methodologies, Tools and Applications is a three-volume compendium of the latest research, case studies, theories, and methodologies within the field of virtual learning environments. As networks get faster, cheaper, safer, and more reliable, their applications grow at a rate that makes it difficult for the typical practitioner to keep abreast. With a wide range of subjects, spanning from authors across the globe and with applications at different levels of education and higher learning, this reference guide serves academics and practitioners alike, indexed and categorized easily for study and application.
This book constitutes the refereed proceedings of the 15th International Symposium on Algorithms and Computation, ISAAC 2004, held in Hong Kong, China in December 2004. The 76 revised full papers presented were carefully reviewed and selected from 226 submissions. Among the topics addressed are computational geometry, graph computations, computational combinatorics, combinatorial optimization, computational complexity, scheduling, distributed algorithms, parallel algorithms, data structures, network optimization, randomized algorithms, and computational mathematics more generally.
Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
None
This book constitutes the refereed proceedings of the 8th International Conference on Hybrid Learning, ICHL 2015, held in Wuhan, China, in July 2015. The 35 papers presented were carefully reviewed and selected from 104 submissions. The selected papers cover various aspects on experiences in hybrid learning, computer supported collaborative learning, improved flexibility of learning processes, learning styles and behaviours, and pedagogical and other issues.