Browse Results

Showing 14,901 through 14,925 of 61,821 results

Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0

by Vishal Bhatnagar Vikram Bali Mario José Diván Deepti Aggarwal Shivani Bali

This book addresses topics related to the Internet of Things (IoT), machine learning, cyber-physical systems, cloud computing, and autonomous vehicles in Industry 4.0. It investigates challenges across multiple sectors and industries and considers Industry 4.0 for operations research and supply chain management.Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0 encourages readers to develop novel theories and enrich their knowledge to foster sustainability. It examines the recent research trends and the future of cyber-physical systems, IoT, and autonomous systems as they relate to Industry 4.0. This book is intended for undergraduates, postgraduates, academics, researchers, and industry individuals to explore new ideas, techniques, and tools related to Industry 4.0.

Cyber-Physical-Human Systems: Fundamentals and Applications (IEEE Press Series on Technology Management, Innovation, and Leadership)

by Anuradha M. Annaswamy Sarah K. Spurgeon Pramod P. Khargonekar Françoise Lamnabhi‐Lagarrigue

Cyber–Physical–Human Systems A comprehensive edited volume exploring the latest in the interactions between cyber–physical systems and humans In Cyber–Physical–Human Systems: Fundamentals and Applications, a team of distinguished researchers delivers a robust and up-to-date volume of contributions from leading researchers on Cyber–Physical–Human Systems, an emerging class of systems with increased interactions between cyber–physical, and human systems communicating with each other at various levels across space and time, so as to achieve desired performance related to human welfare, efficiency, and sustainability. The editors have focused on papers that address the power of emerging CPHS disciplines, all of which feature humans as an active component during cyber and physical interactions. Articles that span fundamental concepts and methods to various applications in engineering sectors of transportation, robotics, and healthcare and general socio-technical systems such as smart cities are featured. Together, these articles address challenges and opportunities that arise due to the emerging interactions between cyber–physical systems and humans, allowing readers to appreciate the intersection of cyber–physical system research and human behavior in large-scale systems. In the book, readers will also find: A thorough introduction to the fundamentals of cyber–physical–human systems In-depth discussions of cyber–physical–human systems with applications in transportation, robotics, and healthcare A comprehensive treatment of socio-technical systems, including social networks and smart cities Perfect for cyber–physical systems researchers, academics, and graduate students, Cyber–Physical–Human Systems: Fundamentals and Applications will also earn a place in the libraries of research and development professionals working in industry and government agencies.

Cyber-Physical-Social Intelligence: On Human-Machine-Nature Symbiosis (Springerbriefs In Computer Science Ser.)

by Hai Zhuge

This book explores next-generation artificial intelligence based on the symbiosis between humans, machines and nature, including the rules and emerging patterns of recognition, and the integration and optimization of various flows through cyberspace, physical space and social space. It unveils a reciprocal human-machine-nature symbiotic mechanism together with relevant rules on structuring and evolving reality, and also proposes a multi-dimensional space for modelling reality and managing the methodologies for exploring reality. As such it lays the foundation for the emerging research area cyber-physical-social intelligence. Inspiring researchers and university students to explore the development of intelligence and scientific methodology, it is intended for researchers and broad readers with a basic understanding of computer science and the natural sciences. Next-generation artificial intelligence will extend machine intelligence and human intelligence to cyber-physical-social intelligence rendered by various interactions in cyberspace, physical space and social space. With the transformational development of science and society, a multi-dimensional reality is emerging and evolving, leading to the generation and development of various spaces obeying different principles. A fundamental scientific challenge is uncovering the essential mechanisms and principles that structure and evolve the reality emerging and evolving along various dimensions. Meeting this challenge requires identifying the basic relations between humans, machines and nature in order to reveal the cyber-physical-social principles.

Cyber-Risk Informatics: Engineering Evaluation with Data Science

by Mehmet Sahinoglu

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book's specifically preserved website will enable readers to utilize the course related problems. * Enables the reader to use the book's website's applications to implement and see results, and use them making 'budgetary' sense * Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds * Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University's metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)

by Indrajit Ray Quanyan Zhu Carol Smidts Pavan Kumar Vaddi Yunfei Zhao Linan Huang Xiaoxu Diao Rakibul Talukdar Michael C. Pietrykowski

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well.A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well.This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.

Cyber-Security Threats, Actors, and Dynamic Mitigation

by Stavros Shiaeles Nicholas Kolokotronis

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.

Cyber-Security for Smart Grid Control: Vulnerability Assessment, Attack Detection, and Mitigation (Transactions on Computer Systems and Networks)

by K. Shanti Swarup Amulya Sreejith

The book focuses on a very important area of Smart Grids - cyber security. It deals in particular with the tools and techniques for cyber security analysis of the Smart Grid control systems. This includes the standards and guidelines, detailed vulnerability assessment framework, attack detection strategies, and attack mitigation methods. The book is divided into three parts. The smart grid cyber-physical system is discussed in the first part. The second part introduces the attacks in the grid system and a vulnerability assessment framework followed by a tool that can be used to analyze the grid control systems using existing cyber security standards. In the third part, different forms of attack detection methods are discussed along with Python-based implementations for the same. The book also discusses attack mitigation methods with implementation. Detailed illustrations and tables are provided in each section. The book also includes case studies based on standard test systems thushelping students to implement the discussed methods. The case studies are based on MATLAB and Python implementations thus catering to a wide range of audiences. Outputs and screenshots of the tools and programs are included so students can compare their results and improve upon the discussed methods. The book will be useful to a wide variety of audiences such as students and researchers in Smart Grids, power system operators, and device manufacturers.

Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)

by Quanyan Zhu Stefan Rass Stefan Schauer Sandra König

This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically impossible.” A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors’ experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.

Cyber-Sicherheit für Dummies (Für Dummies)

by Joseph Steinberg

Steht auf Ihrer To-Do-Liste auch, dass Sie unbedingt Ihre privaten Daten besser schützen müssen? Dieses Buch führt Sie in die Grundlagen der Cyber-Sicherheit ein. Sie erfahren zuerst einmal, welche Bedrohungen es überhaupt gibt, wie Sie sie erkennen, wie Sie sich vor Ihnen schützen und was Sie unbedingt tun sollten. Und falls Sie dann doch von einem Angriff betroffen sind, wie Sie Ihre Daten wiederherstellen. Dieses Buch hilft Ihnen auch, von vornherein Schwachstellen in Ihren Systemen und Geräten zu erkennen, sodass Cyber-Kriminelle erst gar keine Chance haben.

Cyber-Sicherheit: Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung

by Norbert Pohlmann

Dieses Lehrbuch gibt Ihnen einen Überblick über die Themen der IT-Sicherheit Die Digitalisierung hat Geschäftsmodelle und Verwaltungsprozesse radikal verändert. Dadurch eröffnet der digitale Wandel auf der einen Seite viele neue Möglichkeiten. Auf der anderen Seite haben Hacker jüngst mit Cyber-Angriffen für Aufsehen gesorgt. So gesehen birgt die fortschreitende Digitalisierung auch Gefahren. Für eine erfolgreiche Zukunft unserer Gesellschaft ist es daher entscheidend, eine sichere und vertrauenswürdige IT zu gestalten. Norbert Pohlmann gibt Ihnen mit diesem Lehrbuch eine umfassende Einführung in den Themenkomplex der IT-Sicherheit. Lernen Sie mehr über Mechanismen, Prinzipien, Konzepte und Eigenschaften von Cyber-Sicherheitssystemen. Der Autor vermittelt aber nicht nur theoretisches Fachwissen, sondern versetzt Sie auch in die Lage, die IT-Sicherheit aus der anwendungsorientierten Perspektive zu betrachten. Lesen Sie, auf welche Sicherheitseigenschaften es bei Cyber-Systemen ankommt. So sind Sie mit Hilfe dieses Lehrbuchs in der Lage, die Wirksamkeit von IT-Lösungen mit Blick auf deren Sicherheit zu beurteilen. Grundlegende Aspekte der Cyber-Sicherheit Im einführenden Abschnitt dieses Lehrbuchs vermittelt Ihnen Pohlmann zunächst die Grundlagen der IT-Sicherheit und schärft Ihren Blick für folgende Aspekte:StrategienMotivationenBedürfnisseProblemeHerausforderungenWirksamkeitskonzepte Tauchen Sie tiefer in die Materie ein In den darauffolgenden Kapiteln befasst sich Pohlmann mit diesen Teilbereichen der IT-SicherheitKryptographieHardware-Sicherheitsmodule zum Schutz von sicherheitsrelevanten InformationenDigitale Signatur, elektronische Zertifikate sowie PKIs und PKAsIdentifikation und AuthentifikationEnterprise Identity und Access ManagementTrusted ComputingCyber-Sicherheit Frühwarn- und LagebildsystemeFirewall-SystemeE-Mail-SicherheitBlockchain-TechnologieKünstliche Intelligenz und Cyber-SecuritySocial Web Cyber-Sicherheit Zudem erfahren Sie mehr über IPSec-Verschlüsselung, Transport Layer Security (TLS), Secure Socket Layer (SSL) sowie Sicherheitsmaßnahmen gegen DDoS-Angriffe. Anschauliche Grafiken und Tabellen bilden Prozesse und Zusammenhänge verständlich ab. Didaktisch gut aufbereitet, können Sie die Inhalte mit zahlreichen Übungsaufgaben vertiefen. Das Lehrbucht richtet sich speziell an Leser, für die die IT-Sicherheit eine besondere Rolle spielt, etwa: Studierende der InformatikAuszubildende im Bereich FachinformatikMitarbeiter und Führungspersonen der IT-Branche

Cyber-Threats to Canadian Democracy (McGill-Queen's/Brian Mulroney Institute of Government Studies in Leadership, Public Policy, and Governance)

by Holly Ann Garnett and Michael Pal

From the Cambridge Analytica scandal to overloaded internet voting servers to faulty voting machines, the growing relationship between democracy and technology has brought to light the challenges associated with integrating new digital tools into the electoral system. Canadian politics has also felt the impact of this migration online.This timely book presents the first comprehensive study of the various cyber-threats to election integrity across Canadian jurisdictions. Scrutinizing the events of the 2019 federal election, Cyber-Threats to Canadian Democracy examines how new technologies have affected the practice of electoral politics and what we can do to strengthen future Canadian elections. Through the disciplines of political science, law, computer science, engineering, communications, and others, chapters shed light on some of the most contentious issues around technology and electoral integrity. The contributors address current domestic and foreign threats to Canadian elections, evaluate the behaviour of actors ranging from political parties and interest groups to policymakers and election administrators, and assess emerging legal and regulatory responses while anticipating future challenges to the quality of elections in Canada and around the globe.Cyber-Threats to Canadian Democracy helps seed the study of digital technology’s security risks, providing insight into what reforms are needed and evaluating existing legal and policy frameworks in light of these threats.

Cyber-Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT

by Wiem Tounsi

Cyber-physical Systems and Digital Twins: Proceedings of the 16th International Conference on Remote Engineering and Virtual Instrumentation (Lecture Notes in Networks and Systems #80)

by Michael Auer Kalyan B.

This book constitutes the proceedings of the 16th International Conference on Remote Engineering and Virtual Instrumentation (REV), held at the BMS College of Engineering, Bangalore, India on 3–6 February 2019. Today, online technologies are at the core of most fields of engineering, as well as of society as a whole, and are inseparably connected with Internet of Things,cyber-physical systems,collaborative networks and grids,cyber cloud technologies,service architectures, to name but a few. Since it was first held in, 2004, the REV conference has focused on the increasing use of the Internet for engineering tasks and the problems surrounding it. The 2019 conference demonstrated and discussed the fundamentals, applications and experiences in the field of online engineering and virtual instrumentation. It also presented guidelines for university-level courses on these topics, in view of the increasing globalization of education and the demand for teleworking, remote services and collaborative working environments.

Cyber-risk and Youth: Digital Citizenship, Privacy and Surveillance (Routledge Studies in Crime and Society)

by Michael Adorjan Rosemary Ricciardelli

Cyber-risks are moving targets and societal responses to combat cyber-victimization are often met by the distrust of young people. Drawing on original research, this book explores how young people define, perceive, and experience cyber-risks, how they respond to both the messages they are receiving from society regarding their safety online, and the various strategies and practices employed by society in regulating their online access and activities. This book complements existing quantitative examinations of cyberbullying assessing its extent and frequency, but also aims to critique and extend knowledge of how cyber-risks such as cyberbullying are perceived and responded to. Following a discussion of their methodology and their experiences of conducting research with teens, the authors discuss the social network services that teens are using and what they find appealing about them, and address teens’ experiences with and views towards parental and school-based surveillance. The authors then turn directly to areas of concern expressed by their participants, such as relational aggression, cyberhacking, privacy, and privacy management, as well as sexting. The authors conclude by making recommendations for policy makers, educators and teens – not only by drawing from their own theoretical and sociological interpretations of their findings, but also from the responses and recommendations given by their participants about going online and tackling cyber-risk. One of the first texts to explore how young people respond to attempts to regulate online activity, this book will be key reading for those involved in research and study surrounding youth crime, cybercrime, youth culture, media and crime, and victimology – and will inform those interested in addressing youth safety online how to best approach what is often perceived as a sensitive and volatile social problem.

Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security #66)

by Alexander Kott Edward J. M. Colbert

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats? This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

CyberDynamX: The Art and Science of Building a Simplified Digital Security Program

by Curtis L. Blais

This book simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical background. It ensures that more individuals within your organization can effectively contribute to building and maintaining a robust cybersecurity program. The book's structured framework focuses on the four key areas essential for any successful cybersecurity initiative, allowing you to prioritize efforts and transition from a reactive to a proactive stance. "CyberDynamX" addresses the common challenge of developing efficient and comprehensive cybersecurity programs. Many tasked with this responsibility are not dedicated cybersecurity professionals, often juggling these duties alongside their primary roles. This can lead to fragmented efforts and incomplete solutions. The book provides clear, concise guidance that is easy to follow, ensuring meaningful progress even for those new to cybersecurity. By offering practical, actionable advice, "CyberDynamX" helps streamline the development process, enabling you to build an effective cybersecurity program that meets your organization's needs swiftly and efficiently. What You Will Learn: The four things to radically focus on in building a functional cybersecurity program. The importance of Risk Management and the means to get started performing this function. The significant difference between Policy, Standards, Procedures, Guidance and Baselines; when to use each and how to build them. Who This Book is for: The market includes a wide range of professionals such as Chief Information Security Officers (CISOs), IT managers, cybersecurity analysts, compliance officers, and risk management professionals who are tasked with developing, implementing and even reviewing effective security programs. Additionally, senior executives and board members seek guidance to ensure that their organizations are not only compliant with regulatory requirements but also resilient against cyber threats.

CyberForensics: Understanding Information Security Investigations (Springer’s Forensic Laboratory Science Series)

by Jennifer Bayuk

This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years' experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.

CyberMedics: Navigating AI and Security in the Medical Field

by Rohit Tanwar Varun Sapra Luxmi Sapra

CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world. As AI technologies revolutionize diagnostics, treatment planning, and patient care, they also introduce new challenges related to data privacy, ethical considerations, and cybersecurity. This book offers a balanced perspective, providing healthcare professionals, technologists, and policymakers with the tools they need to understand and navigate the intersection of AI and security. Through detailed case studies, expert insights, and practical guidance, readers will discover how AI can be leveraged to improve patient outcomes while maintaining the highest standards of data protection.Key topics include: AI in healthcare, exploring how emerging technologies like machine learning, natural language processing, and predictive analytics are poised to reshape the industry the ethical implications of AI in healthcare strategies for safeguarding sensitive information against cyber threats future frameworks governing the use of AI in medical settings Whether you’re on the front lines of patient care, involved in healthcare IT, or shaping policy, CyberMedics: Navigating AI and Security in the Medical Field equips you with the knowledge to make informed decisions in a rapidly evolving landscape, ensuring that innovation and security go hand in hand to enhance the quality of care.

CyberParks – The Interface Between People, Places and Technology: New Approaches and Perspectives (Lecture Notes in Computer Science #11380)

by Michiel De Lange Martijn De Waal Carlos Smaniotto Costa Ina Šuklje Erjavec Therese Kenna Konstantinos Ioannidis Gabriela Maksymiuk

This open access book is about public open spaces, about people, and about the relationship between them and the role of technology in this relationship. It is about different approaches, methods, empirical studies, and concerns about a phenomenon that is increasingly being in the centre of sciences and strategies – the penetration of digital technologies in the urban space. As the main outcome of the CyberParks Project, this book aims at fostering the understanding about the current and future interactions of the nexus people, public spaces and technology. It addresses a wide range of challenges and multidisciplinary perspectives on emerging phenomena related to the penetration of technology in people’s lifestyles - affecting therefore the whole society, and with this, the production and use of public spaces. Cyberparks coined the term cyberpark to describe the mediated public space, that emerging type of urban spaces where nature and cybertechnologies blend together to generate hybrid experiences and enhance quality of life.

CyberSecurity in a DevOps Environment: From Requirements to Monitoring

by Cristina Seceleanu Ana Rosa Cavalli Andrey Sadovykh Dragos Truscan Wissam Mallouli Alessandra Bagnato

This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous monitoring. It presents an overview of the latest techniques and tools that help engineers and developers verify the security requirements of large-scale industrial systems and explains novel methods that enable a faster feedback loop for verifying security-related activities, which rely on techniques such as automated testing, model checking, static analysis, runtime monitoring, and formal methods. The book consists of three parts, each covering a different aspect of security engineering in the DevOps context. The first part, "Security Requirements", explains how to specify and analyse security issues in a formal way. The second part, "Prevention at Development Time", offers a practical and industrial perspective on how to design, develop and verify secure applications. The third part, "Protection at Operations", eventually introduces tools for continuous monitoring of security events and incidents. Overall, it covers several advanced topics related to security verification, such as optimizing security verification activities, automatically creating verifiable specifications from security requirements and vulnerabilities, and using these security specifications to verify security properties against design specifications and generate artifacts such as tests or monitors that can be used later in the DevOps process. The book aims at computer engineers in general and does not require specific knowledge. In particular, it is intended for software architects, developers, testers, security professionals, and tool providers, who want to define, build, test, and verify secure applications, Web services, and industrial systems.

Cyberactivism on the Participatory Web (Routledge Studies in New Media and Cyberculture)

by Martha McCaughey

Cyberactivism already has a rich history, but over the past decade the participatory web—with its de-centralized information/media sharing, portability, storage capacity, and user-generated content—has reshaped political and social change. Cyberactivism on the Participatory Web examines the impact of these new technologies on political organizing and protest across the political spectrum, from the Arab Spring to artists to far-right groups. Linking new information and communication technologies to possibilities for solidarity and action—as well as surveillance and control—in a context of global capital flow, war, and environmental crisis, the contributors to this volume provide nuanced analyses of the dramatic transformations in media, citizenship, and social movements taking place today.

Cyberbullying

by Juan Moises de la Serna Beatriz Sosa Rebelo

O cyberbullying é uma nova modalidade de assédio que qualquer pessoa pode vir a sofrer, mas a situação é especialmente preocupante quando se trata de menores. Neste breve manual são respondidas as perguntas mais importantes sobre este tema que todo pai com filhos em idade escolar deve ter em mente: O que é o Cyberbullying? Quais os efeitos do Cyberbullying? Pode se prevenir o Cyberbullying? e principalmente, O que fazer se nosso filho for vítima do Cyberbullying? Descubra todos os segredos sobre o Cyberbullying com os resultados das últimas pesquisas realizadas no âmbito da psicologia sobre o assunto.

Cyberbullying

by Juan Moises de la Serna Conchi Fuentes

Cyberbullying is a modern form of harassment that anyone can suffer, but the situation is especially worrying when dealing with minors.This short guide presents answers to some of the most important questions on this subject that any parent with children of school age should bear in mind, such as: What is cyberbullying? How does cyberbullying affect people? Can cyberbullying be prevented? And, above all, what to do if your child is suffering from cyberbullying? Discover all the facts about cyberbullying, based on results from the latest research in the field of psychology on this matter.

Cyberbullying

by Vanessa Rogers

Children and teenagers text, network and twitter online as second nature, but when emails or texts are used to threaten, harass, intimidate or embarrass someone, they can turn from being a source of enjoyment to a source of crippling anxiety and fear. This approachable book is packed with advice, games and activities for groups and individuals to help young people understand what cyberbullying is, how they should behave online and how they can stay safe. The activities range from quizzes and competitions to storyboard games and art activities, and cover issues such as how easily personal information can be forwarded, the risks posed by unknown 'friends' on social networking sites, and how to discuss and deal with bullying issues. They are designed to encourage young people to think about their own behaviour and attitudes and give them the skills and knowledge to stay safe in a digital world. Particularly suited to children and teens aged 11+, this essential book will be an invaluable resource for parents, teachers, youth workers, and anyone working with young people who could be exposed to cyberbullying.

Cyberbullying Across the Globe: Gender, Family, and Mental Health

by Raúl Navarro Santiago Yubero Elisa Larrañaga

This book provides a much-needed analysis of the current research in the global epidemic of electronic bullying. Scholars and professionals from the Americas, Europe, and Asia offer data, insights, and solutions, acknowledging both the social psychology and technological contexts underlying cyberbullying phenomena. Contributors address questions that are just beginning to emerge as well as longstanding issues concerning family and gender dynamics, and provide evidence-based prevention and intervention strategies for school and home. The global nature of the book reflects not only the scope and severity of cyberbullying, but also the tenacity of efforts to control and eradicate the problem. Included in the coverage: * Gender issues and cyberbullying in children and adolescents: from gender differences to gender identity measures. * Family relationships and cyberbullying. * Examining the incremental impact of cyberbullying on outcomes over and above traditional bullying in North America. * A review of cyberbullying and education issues in Latin America. * Cyberbullying prevention from child and youth literature. * Cyberbullying and restorative justice. Cyberbullying across the Globe is an essential resource for researchers, graduate students, and other professionals in child and school psychology, public health, social work and counseling, educational policy, and family advocacy.

Refine Search

Showing 14,901 through 14,925 of 61,821 results