"This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher.
This book represents the proceedings from the information security multi-conference (EISMC). All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.
This volume presents the key informational, communication, and socio-political drivers of the Ukrainian state's national security. Since the beginning of the third millennium, there has been an aggravation of global inter-civilizational confrontations, which in 2022 has already resulted in an open military aggression against Ukraine. The hybrid wars against the world of democracy have put ensuring the national security of states on the front pages of world and national agendas. Using the example of Ukraine, the book demonstrates how, in order to achieve their geopolitical interests, authoritarian regimes incite information wars as a prerequisite for the transition to an armed "hot" war. It further shows how these processes actualize the formation of a fundamentally new state policy to ensure information and, more broadly, national security. The book identifies the main threats to national security in modern states and identifies ways of protecting Ukraine's national interests. The book will appeal to scholars, students, and researchers of political science, international relations, social sciences, and neighboring disciplines, as well as practitioners and policy-makers interested in a better understanding of national security drivers and protecting national interests.
In the era of digital technology, business transactions and partnerships across borders have become easier than ever. As part of this shift in the corporate sphere, managers, executives, and strategists across industries must acclimate themselves with the challenges and opportunities for conducting business. Mobile Commerce: Concepts, Methodologies, Tools, and Applications provides a comprehensive source of advanced academic examinations on the latest innovations and technologies for businesses. Including innovative studies on marketing, mobile commerce security, and wireless handheld devices, this multi-volume book is an ideal source for researchers, scholars, business executives, professionals, and graduate-level students.
This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment.
Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.
Cultural factors, in both the narrow sense of different national, racial, and ethnic groups, and in the broader sense of different groups of any type, play major roles in individual and group decisions. Written by an international, interdisciplinary group of experts, Cultural Factors in Systems Design: Decision Making and Action explores innovations in the understanding of how cultural differences influence decision making and action. Reflecting the diverse interests and viewpoints that characterize the current state of decision making and cultural research, the chapter authors represent a variety of disciplines and specialize in areas ranging from basic decision processes of individuals, to decisions made in teams and large organizations, to cultural influences on behavior. Balancing theoretical and practical perspectives, the book explores why the best laid plans go awry, examining conditions that can yield unanticipated behaviors from complex, adaptive sociotechnical systems. It highlights the different ways in which East Asians and Westerners make decisions and explores how to model and investigate cultural influences in interpersonal interactions, social judgment, and decision making. The book also reviews decision field theory and examines its implications for cross cultural decision making. With increasing globalization of organizations and interactions among people from various cultures, a better understanding of how cultural factors influence decision making and action is a necessity. Much is known about decision processes, culture and cognition, design of products and interfaces for human interaction with machines and organizational processes, however this knowledge is dispersed across several disciplines and research areas. Presenting a range of current research and new ideas, this volume brings together previously scattered research and explores how to apply it when designing systems that will be used by individuals of varied backgrounds.