Advanced Mobile Technologies for Secure Transaction Processing: Emerging Research and Opportunities


Book Description

The development of mobile applications has created numerous opportunities across different industries. With these advances, the management of data has been optimized to allow a broader scope of potential uses. Advanced Mobile Technologies for Secure Transaction Processing: Emerging Research and Opportunities is an innovative reference source for the latest academic material on the application of mobile computing for secure payment transactions. Highlighting a range of relevant topics such as information security, electronic money, and online banking, this book is ideally designed for professionals, researchers, practitioners, students, and professionals interested in novel perspectives on mobile technologies and data management.




Centrality Metrics for Complex Network Analysis: Emerging Research and Opportunities


Book Description

As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Centrality Metrics for Complex Network Analysis: Emerging Research and Opportunities is a pivotal reference source for the latest research findings on centrality metrics and their broader applications for different categories of networks including wireless sensor networks, curriculum networks, social networks etc. Featuring extensive coverage on relevant areas, such as complex network graphs, node centrality metrics, and mobile sensor networks, this publication is an ideal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.




Handbook of Research on Environmental Policies for Emergency Management and Public Safety


Book Description

In a world of earthquakes, tsunamis, and hurricanes, it is evident that emergency response plans are crucial to solve problems, overcome challenges, and restore and improve communities affected by such negative events. Although the necessity for quick and efficient aid is understood, researchers and professionals continue to strive for the best practices and methodologies to properly handle these significant events. The Handbook of Research on Environmental Policies for Emergency Management and Public Safety is a pivotal reference source for the latest research findings on the examination of environmental policies and its interface with management and public safety from various country's perspectives, its local impacts and global lessons. Featuring extensive coverage on relevant areas, such as public-private partnership, disaster management, and natural resource management, this publication is an ideal resource for academicians, practitioners, and researchers interested in understanding the effects of environmental policies on emergency management.




Sensing Techniques for Next Generation Cognitive Radio Networks


Book Description

The inadequate use of wireless spectrum resources has recently motivated researchers and practitioners to look for new ways to improve resource efficiency. As a result, new cognitive radio technologies have been proposed as an effective solution. Sensing Techniques for Next Generation Cognitive Radio Networks is a pivotal reference source that provides vital research on the application of spectrum sensing techniques. While highlighting topics such as radio identification, compressive sensing, and wavelet transform, this publication explores the standards and the methods of cognitive radio network architecture. This book is ideally designed for IT and network engineers, practitioners, and researchers seeking current research on radio scene analysis for cognitive radios and networks.




Positioning and Navigation in Complex Environments


Book Description

The limitations of satellites create a large gap in assistive directional technologies, especially indoors. The methods and advances in alternate directional technologies is allowing for new systems to fill the gaps caused by the limitations of GPS systems. Positioning and Navigation in Complex Environments is a critical scholarly resource that examines the methodologies and advances in technologies that allow for indoor navigation. Featuring insight on a broad scope of topics, such as multipath mitigation, Global Navigation Satellite System (GNSS), and multi-sensor integration, this book is directed toward data scientists, engineers, government agencies, researchers, and graduate-level students.




Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction


Book Description

As the world becomes digitalized, developing countries are starting to see an increase in technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction is a relevant scholarly publication that examines the importance of information and communications technology (ICT) and its ability to aid in developing countries and the methods to make such technologies more accessible and cost less. Featuring coverage on a wide range of topics, including community networks, infrastructure sharing, and the digital divide, this book is geared toward academics, technology developers, researchers, students, practitioners, and professionals interested in the importance of understanding technological innovations.




Mobile Technologies and Socio-Economic Development in Emerging Nations


Book Description

As technology advances, mobile devices have become more affordable and useful to countries around the world. As a result, mobile evolution has become an essential part of economic and social advancement. Mobile Technologies and Socio-Economic Development in Emerging Nations provides emerging research on the role of mobile devices as an important aspect of social and economic growth in developing countries. While highlighting topics, such as device authentication, mobile data management, and sensor services, this book explores how mobile devices have evolved to become an extremely useful tool. This book is a vital resource for academicians, researchers, students, practitioners, politicians, and professionals seeking current research on the uses, applications, and advantages of mobile services in increasing economic growth.




Mobile Applications and Solutions for Social Inclusion


Book Description

Advancements in technology have allowed the creation of new tools and innovations that can improve different aspects of life. Mobile technologies are an ever-expanding area of research that can benefit users. Mobile Applications and Solutions for Social Inclusion provides emerging research on the use of mobile technology to assist in improving social inclusion in several domains and for users in their daily lives. While highlighting topics such as alert systems, indoor navigation, and tracking and monitoring, this publication explores the various applications and techniques of mobile solutions in assistive technology. This book is an important resource for researchers, academics, professionals, and students seeking current research on the benefits and uses of mobile devices for end users and community acceptance.




Optimizing E-Participation Initiatives Through Social Media


Book Description

As technology and social media tools become more integrated into society, they provide important frameworks for online government and community collaboration. Optimizing E-Participation Initiatives Through Social Media provides emerging research on the role of online web technologies in promoting citizen and community involvement in public affairs. While highlighting topics such as online transaction, participatory design, and e-polling, this publication explores the use of Web 2.0 by governments to create more affordable, participatory, and transparent public-sector management models. This book is an important resource for academicians, practitioners, and researchers seeking current research on online public involvement in government policy decision making.




Research Anthology on Securing Mobile Technologies and Applications


Book Description

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.