Normal view MARC view ISBD view

Global Security, Safety, and Sustainability [electronic resource] : 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings / edited by Sérgio Tenreiro de Magalhães, Hamid Jahankhani, Ali G. Hessami.

By: Tenreiro de Magalhães, Sérgio [editor.].
Contributor(s): Jahankhani, Hamid [editor.] | Hessami, Ali G [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Communications in Computer and Information Science: 92Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Description: XI, 301p. 84 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642157172.Subject(s): Computer science | Computer Communication Networks | Data encryption (Computer science) | Computer software | Information systems | Information Systems | Computer Science | Computer Communication Networks | Management of Computing and Information Systems | Data Encryption | Algorithm Analysis and Problem Complexity | Information Systems Applications (incl.Internet) | Computers and SocietyDDC classification: 004.6 Online resources: Click here to access online
Contents:
Management of the Benefits on the Client’s Involvement on Ergonomic Analysis -- A Security Audit Framework to Manage Information System Security -- The Cloud’s Core Virtual Infrastructure Security -- Collaboration and Command Tools for Crises Management -- Trust and Reputation Management for Critical Infrastructure Protection -- An Approach to Textual Steganography -- Cybercrime Victimisations/Criminalisation and Punishment -- Baby-Crying Acceptance -- Design of Discrete Variable Structure Controller Based on Variable Boundary Layer -- Cognitive Biometrics: Challenges for the Future -- Multimodal Biometrics and Multilayered IDM for Secure Authentication -- Secure Biometric Multi-Logon System Based on Current Authentication Technologies -- Analysis of Fingerprint Image to Verify a Person -- Methods of Organizational Information Security -- OTM Machine Acceptance: In the Arab Culture -- A Study on the Interrelations between the Security-Related Antecedents of Customers’ Online Trust -- Does Nationality Matter in the B2C Environment? Results from a Two Nation Study -- Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company) -- Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks -- The Effect of Non-technical Factors in B2C E-Commerce -- Self-monitoring Composite Rods for Sustainable Construction -- Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approach -- A Review on Sustainability Models -- The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling -- “Fiscal Illusion Causes Fiscal Delusion – Please Be Careful!” -- A Coloured Petri Net Analysis of the Transaction Internet Protocol -- Identification of the Required Security Practices during e-Government Maturity -- Dynamic Device Configuration in Ubiquitous Environments -- Mitigation of Control Channel Jamming via Combinatorial Key Distribution -- A Proxy Signature Scheme Based on Coding Theory -- Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 6th International Conference, ICGS3, held in Braga, Portugal, in September 2010. The 31 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from many submissions. The topics are divided into six streams: e-S3, Physical S3, S3 Strategic Frameworks, Cybernetic S3, Socio- Technical Systems as well as Emerging Trends.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Management of the Benefits on the Client’s Involvement on Ergonomic Analysis -- A Security Audit Framework to Manage Information System Security -- The Cloud’s Core Virtual Infrastructure Security -- Collaboration and Command Tools for Crises Management -- Trust and Reputation Management for Critical Infrastructure Protection -- An Approach to Textual Steganography -- Cybercrime Victimisations/Criminalisation and Punishment -- Baby-Crying Acceptance -- Design of Discrete Variable Structure Controller Based on Variable Boundary Layer -- Cognitive Biometrics: Challenges for the Future -- Multimodal Biometrics and Multilayered IDM for Secure Authentication -- Secure Biometric Multi-Logon System Based on Current Authentication Technologies -- Analysis of Fingerprint Image to Verify a Person -- Methods of Organizational Information Security -- OTM Machine Acceptance: In the Arab Culture -- A Study on the Interrelations between the Security-Related Antecedents of Customers’ Online Trust -- Does Nationality Matter in the B2C Environment? Results from a Two Nation Study -- Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company) -- Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks -- The Effect of Non-technical Factors in B2C E-Commerce -- Self-monitoring Composite Rods for Sustainable Construction -- Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approach -- A Review on Sustainability Models -- The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling -- “Fiscal Illusion Causes Fiscal Delusion – Please Be Careful!” -- A Coloured Petri Net Analysis of the Transaction Internet Protocol -- Identification of the Required Security Practices during e-Government Maturity -- Dynamic Device Configuration in Ubiquitous Environments -- Mitigation of Control Channel Jamming via Combinatorial Key Distribution -- A Proxy Signature Scheme Based on Coding Theory -- Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes.

This book constitutes the refereed proceedings of the 6th International Conference, ICGS3, held in Braga, Portugal, in September 2010. The 31 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from many submissions. The topics are divided into six streams: e-S3, Physical S3, S3 Strategic Frameworks, Cybernetic S3, Socio- Technical Systems as well as Emerging Trends.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue