Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications
Author: Management Association, Information Resources
Publsiher: IGI Global
Total Pages: 837
Release: 2021-02-05
Genre: Technology & Engineering
ISBN: 9781799886013

Download Research Anthology on Securing Mobile Technologies and Applications Book in PDF, Epub and Kindle

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

Research Anthology on Securing Mobile Technologies and Applications VOL 1

Research Anthology on Securing Mobile Technologies and Applications  VOL 1
Author: Information R. . . Management Association
Publsiher: Unknown
Total Pages: 448
Release: 2021-04-19
Genre: Electronic Book
ISBN: 1668433370

Download Research Anthology on Securing Mobile Technologies and Applications VOL 1 Book in PDF, Epub and Kindle

Research Anthology on Securing Mobile Technologies and Applications VOL 2

Research Anthology on Securing Mobile Technologies and Applications  VOL 2
Author: Information R. . . Management Association
Publsiher: Unknown
Total Pages: 460
Release: 2021-04-19
Genre: Electronic Book
ISBN: 1668433389

Download Research Anthology on Securing Mobile Technologies and Applications VOL 2 Book in PDF, Epub and Kindle

Digital Technologies and Applications

Digital Technologies and Applications
Author: Saad Motahhir,Badre Bossoufi
Publsiher: Springer Nature
Total Pages: 867
Release: 2022-05-07
Genre: Technology & Engineering
ISBN: 9783031019425

Download Digital Technologies and Applications Book in PDF, Epub and Kindle

This book presents Volume 1 of selected research papers presented at the Second International Conference on Digital Technologies and Applications (ICDTA 22), held at Sidi Mohamed Ben Abdellah University, Fez, Morocco, on January 28–29, 2022. This book highlights the latest innovations in digital technologies as: artificial intelligence, Internet of Things, embedded systems, network technology, information processing and their applications in several areas as hybrid vehicles, renewable energy, mechatronics, medicine... This book will encourage and inspire researchers, industry professionals, and policymakers to put these methods into practice.

Mobile Security and Privacy

Mobile Security and Privacy
Author: Man Ho Au,Raymond Choo
Publsiher: Syngress
Total Pages: 274
Release: 2016-09-14
Genre: Computers
ISBN: 9780128047460

Download Mobile Security and Privacy Book in PDF, Epub and Kindle

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges. Presents the most current and leading edge research on mobile security and privacy, featuring a panel of top experts in the field Provides a strategic and international overview of the security issues surrounding mobile technologies Covers key technical topics and provides readers with a complete understanding of the most current research findings along with future research directions and challenges Enables practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding the implementation of mobile technology security and privacy initiatives

Research Anthology on Artificial Intelligence Applications in Security

Research Anthology on Artificial Intelligence Applications in Security
Author: Management Association, Information Resources
Publsiher: IGI Global
Total Pages: 2253
Release: 2020-11-27
Genre: Computers
ISBN: 9781799877486

Download Research Anthology on Artificial Intelligence Applications in Security Book in PDF, Epub and Kindle

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.

Handbook of Big Data and Analytics in Accounting and Auditing

Handbook of Big Data and Analytics in Accounting and Auditing
Author: Tarek Rana,Jan Svanberg,Peter Öhman,Alan Lowe
Publsiher: Springer Nature
Total Pages: 564
Release: 2023-02-03
Genre: Business & Economics
ISBN: 9789811944604

Download Handbook of Big Data and Analytics in Accounting and Auditing Book in PDF, Epub and Kindle

This handbook collects the most up-to-date scholarship, knowledge, and new developments of big data and data analytics by bringing together many strands of contextual and disciplinary research. In recent times, while there has been considerable research in exploring the role of big data, data analytics, and textual analytics in accounting, and auditing, we still lack evidence on what kinds of best practices academics, practitioners, and organizations can implement and use. To achieve this aim, the handbook focuses on both conventional and contemporary issues facing by academics, practitioners, and organizations particularly when technology and business environments are changing faster than ever. All the chapters in this handbook provide both retrospective and contemporary views and commentaries by leading and knowledgeable scholars in the field, who offer unique insights on the changing role of accounting and auditing in today’s data and analytics driven environment. Aimed at academics, practitioners, students, and consultants in the areas of accounting, auditing, and other business disciplines, the handbook provides high-level insight into the design, implementation, and working of big data and data analytics practices for all types of organizations worldwide. The leading scholars in the field provide critical evaluations and guidance on big data and data analytics by illustrating issues related to various sectors such as public, private, not-for-profit, and social enterprises. The handbook’s content will be highly desirable and accessible to accounting and non-accounting audiences across the globe.

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity
Author: Lobo, Victor,Correia, Anacleto
Publsiher: IGI Global
Total Pages: 292
Release: 2022-06-24
Genre: Computers
ISBN: 9781799894322

Download Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity Book in PDF, Epub and Kindle

The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.