Security and Privacy Issues in Sensor Networks and IoT


Book Description

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.




The Adaptive Challenge of Climate Change


Book Description

This book presents a new perspective on climate change for researchers and policymakers in the environmental social sciences and humanities.




Challenges and Opportunities of Corporate Governance Transformation in the Digital Era


Book Description

While corporate governance has been a successful concept throughout the centuries, it is in question whether this concept can remain sustainable in the digital era and during a time of technological and managerial disruption. Under the pressure of new economic, social, and ecologic challenges, it is vital to understand how this concept needs to transform. Challenges and Opportunities of Corporate Governance Transformation in the Digital Era is an essential reference source that discusses concepts, trends, and forecasts of corporate governance and examines its transformation under the pressure of new technologies and economic changes. Featuring research on topics such as corporate identity, e-commerce, and cost management, this book is ideally designed for corporate leaders, managers, executives, business professionals, consultants, professors, researchers, and students.




Dilemmas and Challenges in Islamic Finance


Book Description

The phenomenal growth of Islamic finance in the last few decades has been accompanied by a host of interesting questions and challenges. One of the critical challenges is how Islamic financial institutions can be motivated to participate in the 'equity-like' profit-and-loss sharing (PLS) contracts. It is observed that Islamic banks are reluctant to participate in the pure PLS scheme which is manifested by the rising concentration of investment on murabaha or mark-up financing. This phenomenon has been the hotbed of academic criticism on the contemporary practice of Islamic banking. This book explains the 'murabaha syndrome' in light of the incentive provided by the current institutional framework and what are the changes required in the governance structure to mend this anomaly.




Contemporary Challenges in Cooperation and Coopetition in the Age of Industry 4.0


Book Description

This proceedings volume provides a fresh perspective on current challenges in cooperation and coopetition in the age of Industry 4.0. Featuring selected papers from the 10th Conference on Management of Organizations’ Development (MOD) held in Zamek Gniew, Poland, this volume extends the knowledge of cooperation and coopetition, presents analytic tools used in the research, considers the potential impact of Industry 4.0 on collaboration, and provides recommendations for managerial practice. Interorganizational relations have been a relevant topic in the management sciences in recent years. Globalization, social, cultural, and technological progress are among the factors shaping the environment for collaboration, determining the conditions for development and defining a set of new challenges that managers have to face in today's knowledge-based economy. This book, therefore, explores emerging problems of organizational development in the light of the needs and challenges of Industry 4.0. Combining the latest theory and practice, the volume provides a realistic outlook on the network economy and interdependencies both within and between sectors.




Pervasive Computing


Book Description

Pervasive Computing: Next Generation Platforms for Intelligent Data Collection presents current advances and state-of-the-art work on methods, techniques, and algorithms designed to support pervasive collection of data under ubiquitous networks of devices able to intelligently collaborate towards common goals. Using numerous illustrative examples and following both theoretical and practical results the authors discuss: a coherent and realistic image of today's architectures, techniques, protocols, components, orchestration, choreography, and developments related to pervasive computing components for intelligently collecting data, resource, and data management issues; the importance of data security and privacy in the era of big data; the benefits of pervasive computing and the development process for scientific and commercial applications and platforms to support them in this field. Pervasive computing has developed technology that allows sensing, computing, and wireless communication to be embedded in everyday objects, from cell phones to running shoes, enabling a range of context-aware applications. Pervasive computing is supported by technology able to acquire and make use of the ubiquitous data sensed or produced by many sensors blended into our environment, designed to make available a wide range of new context-aware applications and systems. While such applications and systems are useful, the time has come to develop the next generation of pervasive computing systems. Future systems will be data oriented and need to support quality data, in terms of accuracy, latency and availability. Pervasive Computing is intended as a platform for the dissemination of research efforts and presentation of advances in the pervasive computing area, and constitutes a flagship driver towards presenting and supporting advanced research in this area. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS - Offers a coherent and realistic image of today's architectures, techniques, protocols, components, orchestration, choreography, and development related to pervasive computing - Explains the state-of-the-art technological solutions necessary for the development of next-generation pervasive data systems, including: components for intelligently collecting data, resource and data management issues, fault tolerance, data security, monitoring and controlling big data, and applications for pervasive context-aware processing - Presents the benefits of pervasive computing, and the development process of scientific and commercial applications and platforms to support them in this field - Provides numerous illustrative examples and follows both theoretical and practical results to serve as a platform for the dissemination of research advances in the pervasive computing area




Mobile and Wireless Network Security and Privacy


Book Description

This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the reader a good idea of the current state-of-the-art technologies in mobile and wireless network security and privacy.




Mobile Opportunistic Networks


Book Description

From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest experimental studies-including simulation tools and implementation test beds.




Homelessness, Health, and Human Needs


Book Description

There have always been homeless people in the United States, but their plight has only recently stirred widespread public reaction and concern. Part of this new recognition stems from the problem's prevalence: the number of homeless individuals, while hard to pin down exactly, is rising. In light of this, Congress asked the Institute of Medicine to find out whether existing health care programs were ignoring the homeless or delivering care to them inefficiently. This book is the report prepared by a committee of experts who examined these problems through visits to city slums and impoverished rural areas, and through an analysis of papers written by leading scholars in the field.




Cyber Threat Intelligence


Book Description

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions – this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.