Skip to main content

Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications

Download Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications Full eBooks in PDF, EPUB, and kindle. Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications is one my favorite book and give us some inspiration, very enjoy to read. you could read this book anywhere anytime directly from your device.

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications Book
Author : Kim-Kwang Raymond Choo,Ali Dehghantanha
Publisher : Syngress
Release : 2016-10-12
ISBN : 0128054484
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges. Presents the most current, leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the field Introduces the first book to provide an in-depth overview of the issues surrounding digital forensic investigations in cloud and associated mobile apps Covers key technical topics and provides readers with a complete understanding of the most current research findings Includes discussions on future research directions and challenges

Strategic Leadership in Digital Evidence

Strategic Leadership in Digital Evidence Book
Author : Paul Reedy
Publisher : Academic Press
Release : 2020-10-08
ISBN : 012822763X
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Strategic Leadership in Digital Evidence: What Executives Need to Know provides leaders with broad knowledge and understanding of practical concepts in digital evidence, along with its impact on investigations. The book's chapters cover the differentiation of related fields, new market technologies, operating systems, social networking, and much more. This guide is written at the layperson level, although the audience is expected to have reached a level of achievement and seniority in their profession, principally law enforcement, security and intelligence. Additionally, this book will appeal to legal professionals and others in the broader justice system. Covers a broad range of challenges confronting investigators in the digital environment Addresses gaps in currently available resources and the future focus of a fast-moving field Written by a manager who has been a leader in the field of digital forensics for decades

Cyber Threat Intelligence

Cyber Threat Intelligence Book
Author : Ali Dehghantanha,Mauro Conti,Tooska Dargahi
Publisher : Springer
Release : 2018-04-27
ISBN : 3319739514
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions – this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Handbook of Big Data and IoT Security

Handbook of Big Data and IoT Security Book
Author : Ali Dehghantanha,Kim-Kwang Raymond Choo
Publisher : Springer
Release : 2019-03-22
ISBN : 3030105431
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.

Innovative Data Communication Technologies and Application

Innovative Data Communication Technologies and Application Book
Author : Jennifer S. Raj,Abul Bashar,S. R. Jino Ramson
Publisher : Springer Nature
Release : 2020-01-30
ISBN : 3030380408
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This book presents emerging concepts in data mining, big data analysis, communication, and networking technologies, and discusses the state-of-the-art in data engineering practices to tackle massive data distributions in smart networked environments. It also provides insights into potential data distribution challenges in ubiquitous data-driven networks, highlighting research on the theoretical and systematic framework for analyzing, testing and designing intelligent data analysis models for evolving communication frameworks. Further, the book showcases the latest developments in wireless sensor networks, cloud computing, mobile network, autonomous systems, cryptography, automation, and other communication and networking technologies. In addition, it addresses data security, privacy and trust, wireless networks, data classification, data prediction, performance analysis, data validation and verification models, machine learning, sentiment analysis, and various data analysis techniques.

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications Book
Author : Kim-Kwang Raymond Choo,Ali Dehghantanha
Publisher : Syngress Publishing
Release : 2016-11-29
ISBN : 9780128053034
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Cloud storage services and applications have become part of everyday life in both developed and developing countries. As with most evolving technologies, cloud services and apps can be used for criminal exploitation. Drawing upon the expertise of world-renowned researchers and experts, this book comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers an up-to-date and advanced knowledge of collecting, preserving and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud application when accessed through mobile devices. In addition, this is the first book which covers investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized and led research, and having published widely in the field. "Contemporary Digital Forensic Investigations of Cloud and Mobile Applications" provides a deep overview of seminal research in the field, while also identifying prospective future research topics and open challenges. Presents the most current and leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the fieldThe first book to provide an in-depth overview of the issues surrounding digital forensic investigations of cloud and associated mobile appsCovers key technical topics and provides readers with a complete understanding of the most current research findings along with future research directions and challenges

Digital Forensics and Investigations

Digital Forensics and Investigations Book
Author : Jason Sachowski
Publisher : CRC Press
Release : 2018-05-16
ISBN : 1351762206
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques have remained consistent despite the evolution of technology, and, ultimately, it and can be applied to any form of digital data. However, within a corporate environment, digital forensic professionals are particularly challenged. They must maintain the legal admissibility and forensic viability of digital evidence in support of a broad range of different business functions that include incident response, electronic discovery (ediscovery), and ensuring the controls and accountability of such information across networks. Digital Forensics and Investigations: People, Process, and Technologies to Defend the Enterprise provides the methodologies and strategies necessary for these key business functions to seamlessly integrate digital forensic capabilities to guarantee the admissibility and integrity of digital evidence. In many books, the focus on digital evidence is primarily in the technical, software, and investigative elements, of which there are numerous publications. What tends to get overlooked are the people and process elements within the organization. Taking a step back, the book outlines the importance of integrating and accounting for the people, process, and technology components of digital forensics. In essence, to establish a holistic paradigm—and best-practice procedure and policy approach—to defending the enterprise. This book serves as a roadmap for professionals to successfully integrate an organization’s people, process, and technology with other key business functions in an enterprise’s digital forensic capabilities.

Implementing Digital Forensic Readiness

Implementing Digital Forensic Readiness Book
Author : Jason Sachowski
Publisher : CRC Press
Release : 2019-05-29
ISBN : 0429805829
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program. Detailing proper collection, preservation, storage, and presentation of digital evidence, the procedures outlined illustrate how digital evidence can be an essential tool in mitigating risk and redusing the impact of both internal and external, digital incidents, disputes, and crimes. By utilizing a digital forensic readiness approach and stances, a company’s preparedness and ability to take action quickly and respond as needed. In addition, this approach enhances the ability to gather evidence, as well as the relevance, reliability, and credibility of any such evidence. New chapters to this edition include Chapter 4 on Code of Ethics and Standards, Chapter 5 on Digital Forensics as a Business, and Chapter 10 on Establishing Legal Admissibility. This book offers best practices to professionals on enhancing their digital forensic program, or how to start and develop one the right way for effective forensic readiness in any corporate or enterprise setting.

Crime Science and Digital Forensics

Crime Science and Digital Forensics Book
Author : Anthony C. Ijeh,Kevin Curran
Publisher : CRC Press
Release : 2021-09-15
ISBN : 1000405966
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This volume is a collation of articles on counter forensics practices and digital investigative methods from the perspective of crime science. The book also shares alternative dialogue on information security techniques used to protect data from unauthorised access and manipulation. Scandals such as those at OPCW and Gatwick Airport have reinforced the importance of crime science and the need to take proactive measures rather than a wait and see approach currently used by many organisations. This book proposes a new approach in dealing with cybercrime and unsociable behavior involving remote technologies using a combination of evidence-based disciplines in order to enhance cybersecurity and authorised controls. It starts by providing a rationale for combining selected disciplines to enhance cybersecurity by discussing relevant theories and highlighting the features that strengthen privacy when mixed. The essence of a holistic model is brought about by the challenge facing digital forensic professionals within environments where tested investigative practices are unable to provide satisfactory evidence and security. This book will be of interest to students, digital forensic and cyber security practitioners and policy makers. It marks a new route in the study of combined disciplines to tackle cybercrime using digital investigations and crime science.

Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime Book
Author : Pavel Gladyshev,Sanjay Goel ((Of University of Albany, SUNY)),Joshua James,George Markowsky,Daryl Johnson
Publisher : Springer Nature
Release : 2022
ISBN : 3031063651
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.

Emerging Technologies in Computing

Emerging Technologies in Computing Book
Author : Mahdi H. Miraz,Peter S. Excell,Andrew Ware,Safeeullah Soomro,Maaruf Ali
Publisher : Springer Nature
Release : 2020-09-28
ISBN : 303060036X
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This book constitutes the refereed conference proceedings of the Third International Conference on Emerging Technologies in Computing, iCEtiC 2020, held in London, UK, in August 2020. Due to VOVID-19 pandemic the conference was helt virtually.The 25 revised full papers were reviewed and selected from 65 submissions and are organized in topical sections covering blockchain and cloud computing; security, wireless sensor networks and IoT; AI, big data and data analytics; emerging technologies in engineering, education and sustainable development.

Advances in Digital Forensics XIV

Advances in Digital Forensics XIV Book
Author : Gilbert Peterson,Sujeet Shenoi
Publisher : Springer
Release : 2018-08-29
ISBN : 3319992775
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XIV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues; Forensic Techniques; Network Forensics; Cloud Forensics; and Mobile and Embedded Device Forensics. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of nineteen edited papers from the Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2018. Advances in Digital Forensics XIV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

Introduction to Professional Policing

Introduction to Professional Policing Book
Author : Ian K. Pepper,Ruth McGrath
Publisher : Routledge
Release : 2020-04-10
ISBN : 1351135252
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Policing is a dynamic profession with increasing demands and complexities placed upon the police officers and staff who provide a 24-hour service across a diverse range of communities. Written by experts in police higher education from across both academic and professional practice, this book equips aspiring or newly appointed police constables with the knowledge and understanding to deal with the significant and often complex challenges they face daily. Introduction to Professional Policing explores a selected number of the core underpinning knowledge requirements identified as themes within the evolving National Policing Curriculum (NPC) and Police Education Qualifications Framework (PEQF). These include: The evolution of criminal justice as a discipline Exploration of operational duties The ethics of professional policing Victims and protection of the vulnerable Crime prevention and approaches to counter-terrorism Digital policing and data protection Evidence based decision making Police leadership At the end of each chapter the student finds a case study, reflective questions and a further reading list, all of which reinforces students’ knowledge and furthers their professional development. Written in a clear and direct style, this book supports aspiring police constables, newly appointed police constables or direct entry (DE) detectives, as well as those interested in learning more about policing. It is essential reading for students taking a degree in Professional Policing.

Security Issues and Privacy Concerns in Industry 4 0 Applications

Security Issues and Privacy Concerns in Industry 4 0 Applications Book
Author : Shibin David,R. S. Anand,V. Jeyakrishnan,M. Niranjanamurthy
Publisher : John Wiley & Sons
Release : 2021-08-24
ISBN : 1119775620
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

SECURITY ISSUES AND PRIVACY CONCERNS IN INDUSTRY 4.0 APPLICATIONS Written and edited by a team of international experts, this is the most comprehensive and up-to-date coverage of the security and privacy issues surrounding Industry 4.0 applications, a must-have for any library. The scope of Security Issues and Privacy Concerns in Industry 4.0 Applications is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trends and the need for technological change in Industry 4.0. Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT-based health care management systems, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed. Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library.

Research Anthology on Big Data Analytics Architectures and Applications

Research Anthology on Big Data Analytics  Architectures  and Applications Book
Author : Management Association, Information Resources
Publisher : IGI Global
Release : 2021-09-24
ISBN : 1668436639
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Society is now completely driven by data with many industries relying on data to conduct business or basic functions within the organization. With the efficiencies that big data bring to all institutions, data is continuously being collected and analyzed. However, data sets may be too complex for traditional data-processing, and therefore, different strategies must evolve to solve the issue. The field of big data works as a valuable tool for many different industries. The Research Anthology on Big Data Analytics, Architectures, and Applications is a complete reference source on big data analytics that offers the latest, innovative architectures and frameworks and explores a variety of applications within various industries. Offering an international perspective, the applications discussed within this anthology feature global representation. Covering topics such as advertising curricula, driven supply chain, and smart cities, this research anthology is ideal for data scientists, data analysts, computer engineers, software engineers, technologists, government officials, managers, CEOs, professors, graduate students, researchers, and academicians.

Workshops at 18th International Conference on Intelligent Environments IE2022

Workshops at 18th International Conference on Intelligent Environments  IE2022  Book
Author : H.H. Alvarez Valera,M. Luštrek
Publisher : IOS Press
Release : 2022-07-05
ISBN : 1643682873
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

The term Intelligent Environments (IEs) refers to physical spaces in which information and communication technologies are interwoven with sensing technologies, innovative user interfaces, robotics and artificial intelligence to create interactive spaces which increase the awareness and enhance the experience of those occupying them. The growing IE community is rooted in academia, but increasingly involves practitioners. It explores the core ideas of IEs as well as the factors necessary to make them a reality, such as energy efficiency, the computational constraints of edge devices and privacy issues. This book presents papers from Workshops held during the 18th International Conference on Intelligent Environments, IE2022, held as a hybrid conference in Biarritz, France, from 20 to 23 June 2022. The conference is now recognized as a major annual venue in the field of IE. It offers a truly international forum for the exchange of information and ideas, and welcomes contributions from all technically active regions of the planet. Included here are 35 papers from the 1st International Workshop on Sentiment Analysis and Emotion Recognition for Social Robots (SENTIRobots’22); 1st International Workshop on Edge AI for Smart Agriculture (EAISA’22); 2nd International Workshop on Artificial Intelligence and Machine Learning for Emerging Topics (ALLEGET’22); 11th International Workshop on the Reliability of Intelligent Environments (WoRIE’22); 2nd International Workshop on Self-Learning in Intelligent Environments (SeLIE’22); 5th Workshop on Citizen Centric Smart Cities Solutions (CCSCS’22); 11th International Workshop on Intelligent Environments Supporting Healthcare and Well-being (WISHWell’22) Exploring some of the latest research and developments in the field, the book will be of interest to all those working with intelligent environments and its associated technologies.

Detection of Intrusions and Malware and Vulnerability Assessment

Detection of Intrusions and Malware  and Vulnerability Assessment Book
Author : Clémentine Maurice,Leyla Bilge,Gianluca Stringhini,Nuno Neves
Publisher : Springer Nature
Release : 2020-07-07
ISBN : 3030526836
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. ​*The conference was held virtually due to the COVID-19 pandemic.

Intelligent Computing

Intelligent Computing Book
Author : Kohei Arai
Publisher : Springer Nature
Release : 2022-08-07
ISBN : 3031104676
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

The book, “Intelligent Computing - Proceedings of the 2022 Computing Conference”, is a comprehensive collection of chapters focusing on the core areas of computing and their further applications in the real world. Each chapter is a paper presented at the Computing Conference 2022 held on July 14-15, 2022. Computing 2022 attracted a total of 498 submissions which underwent a double-blind peer-review process. Of those 498 submissions, 179 submissions have been selected to be included in this book. The goal of this conference is to give a platform to researchers with fundamental contributions and to be a premier venue for academic and industry practitioners to share new ideas and development experiences. We hope that readers find this book interesting and valuable as it provides the state-of-the-art intelligent methods and techniques for solving real-world problems. We also expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.

Delivering Distinctive Value in Emerging Economies

Delivering Distinctive Value in Emerging Economies Book
Author : Thomas Anning-Dorson,Sheena Lovia Boateng,Richard Boateng
Publisher : CRC Press
Release : 2022-06-16
ISBN : 1000527239
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

The idea behind editing this book is to present a contemporary reference that tells the story of how businesses and institutions in emerging economies are circumventing or can better circumvent institutional voids in order to create distinct value for consumers and develop resilient and sustainable economies. For this book, we gathered 24 contributions (or chapters) on new directions and strategies to create value in emerging economies. The contributions span thematic areas such as: COVID-19 and small businesses, social influencers and COVID-19 advocacy, artisan entrepreneurship, leadership and project success, internationalization and intellectual property, cultural artifacts in corporate branding, fintech adoption, mobile money and agriculture value chain, workplace fraud, ethical decision-making in accountancy, modeling early detection of mother’s mode of delivery, assessment of health systems in Africa, online platforms and patient empowerment, students’ academic engagement and technology, and continuous use of e-learning among professional accounting students. The authors of these contributions discuss the relevance of each chapter to its target audience (practitioners and students). They also outline the implications for practice and policy (where applicable) alongside the concluding arguments of their respective chapters. In effect, the 24 chapters offer key strategic directions for businesses, public sector institutions, non-governmental organizations, and international development institutions to be more efficient and sustainably responsible in delivering distinctive value in emerging economies. Emerging economies have become an opportune interest of practitioners, entrepreneurs and policy makers worldwide. Hence, a contemporary text which explores how to create and deliver distinct value in these economies is a must a read.

Human Aspects of Information Security and Assurance

Human Aspects of Information Security and Assurance Book
Author : Nathan Clarke,Steven Furnell
Publisher : Springer Nature
Release : 2022-07-21
ISBN : 3031121724
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in July 2022. The 25 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: cyber security education and training; cyber security culture; privacy; and cyber security management.