000 04756nam a22006255i 4500
001 978-3-030-68534-8
003 DE-He213
005 20240423125409.0
007 cr nn 008mamaa
008 210520s2021 sz | s |||| 0|eng d
020 _a9783030685348
_9978-3-030-68534-8
024 7 _a10.1007/978-3-030-68534-8
_2doi
050 4 _aQ334-342
050 4 _aTA347.A78
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aCybersecurity, Privacy and Freedom Protection in the Connected World
_h[electronic resource] :
_bProceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 /
_cedited by Hamid Jahankhani, Arshad Jamal, Shaun Lawson.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXI, 469 p. 134 illus., 72 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
505 0 _a1. Artificial Intelligence and the International Information and Psychological Security -- 2. Blockchain Medicine Administration Records (BMAR): Reflections and Modelling Blockchain with UML -- 3. An Investigation into an Approach to Updating the Governance of Satellite Communications to Enhance Cyber Security -- 4. Enhancing Smart Home Threat Detection with Artificial Intelligence -- 5. Cybercrime Predicting in the Light of Police Statistics -- 6. Prediction of Cyber Attacks During Coronavirus Pandemic by Classification Techniques and Open Source Intelligence.
520 _a This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes andresponsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.
650 0 _aArtificial intelligence.
650 0 _aComputer crimes.
650 0 _aData protection
_xLaw and legislation.
650 0 _aEconomic development.
650 0 _aSecurity systems.
650 1 4 _aArtificial Intelligence.
650 2 4 _aCybercrime.
650 2 4 _aPrivacy.
650 2 4 _aDevelopment Studies.
650 2 4 _aSecurity Science and Technology.
700 1 _aJahankhani, Hamid.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJamal, Arshad.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLawson, Shaun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030685331
776 0 8 _iPrinted edition:
_z9783030685355
776 0 8 _iPrinted edition:
_z9783030685362
830 0 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
856 4 0 _uhttps://doi.org/10.1007/978-3-030-68534-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177486
_d177486