Narrow your search
Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
Tunable Security for Deployable Data Outsourcing
Author:
ISBN: 1000048084 3731504111 Year: 2015 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be used to build such tunable approaches. The book shows how the proposed methodology can be applied in the domains of database outsourcing, identity management, and credential management.


Dissertation
How do women create and manage their identity in a hostile and gendered gaming community: The case of League of Legends.
Authors: --- --- ---
Year: 2022 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

In an era where inclusivity and gender equality are at the centre of our societal preoccupations, this thesis investigates, through the prism of identity dilemmas, how female gamers manage their identity(ies) in a hostile and gendered gaming community: League of Legends. Accordingly, this research fills a gap in the literature by combining the themes of online communities, female gamers, and identity creation in relation to aggressive behaviours, namely gender-based harassment and stigmatisations. Additionally, this research, by investigating such a challenging topic for the industry, brings food for thought to the gaming sector, namely game developers. As a result, various findings could be drawn from this research relying on in-depth-interviews of 20 female League of Legends players.&#13;First, the focus of this research is based on the definitions of the gaming communities and the notion of femininity accepted by both our society and respondents. I argue that several women and gamer identities must be considered to analyse such an identity process. Then, the sources of identity dilemmas are explored which leads to the conclusion that stigmatisations are the trigger of the studied identity dilemmas, complemented by gender-based harassment and incongruity between identities. Later, this research allows the identification of four types of resolutions to identity dilemmas, also called identity management styles in this thesis. In addition, factors which might influence the identity management styles developed by female gamers are addressed. Thus, the influence of game rank is denied while the influence of exposure to stigmatisations outside the community is assumed. Finally, recommendations for future research are formulated, as well as the identified limitations of this thesis.


Book
Cybersecurity and the Digital Health: An Investigation on the State of the Art and the Position of the Actors
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain.


Book
Access to Online Resources : A Guide for the Modern Librarian
Author:
ISBN: 3319739905 9783319739908 3319739891 Year: 2018 Publisher: Cham Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is published open access under a CC BY 4.0 licence.The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP address recognition in an easy to understand manner. A special chapter is dedicated to Security Assertion Markup Language (SAML), followed by an overview of the key concepts of OpenID Connect. The book concludes with basic troubleshooting guidelines and recommendations for further assistance. Librarians will benefit from this quick and easy read, which demystifies the technologies used, features real-life scenarios, and explains how to competently employ authentication and access management.

Keywords

online --- digitale --- elektroniske ressurser --- nettressurser --- bibliotek --- tilgangskontroll --- digitale medier --- digitale bøker --- e-bøker --- informasjonsressurser --- administrasjon --- Culture --- Library science. --- Industrial management. --- Management information systems. --- Educational technology. --- Cultural and Media Studies. --- Library Science. --- Business Information Systems. --- Information Systems Applications (incl. Internet). --- Technology and Digital Education. --- Media Management. --- Study and teaching. --- Instructional technology --- Technology in education --- Technology --- Educational innovations --- Instructional systems --- Teaching --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Business --- Industrial organization --- Librarianship --- Library economy --- Bibliography --- Documentation --- Information science --- Cultural studies --- Aids and devices --- Communication systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- access management --- online resources --- library technology --- access protocols --- identity management --- authentication --- authorisation --- troubleshooting --- SAML

Beauty up : exploring contemporary Japanese body aesthetics
Author:
ISBN: 9780520938847 0520938844 128277185X 1601293976 1429402342 9781429402347 9780520245082 0520245083 9780520245099 0520245091 9781601293978 9786612771859 6612771852 9781282771857 Year: 2006 Publisher: Berkeley : University of California Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This engaging introduction to Japan's burgeoning beauty culture investigates a wide range of phenomenon-aesthetic salons, dieting products, male beauty activities, and beauty language-to find out why Japanese women and men are paying so much attention to their bodies. Laura Miller uses social science and popular culture sources to connect breast enhancements, eyelid surgery, body hair removal, nipple bleaching, and other beauty work to larger issues of gender ideology, the culturally-constructed nature of beauty ideals, and the globalization of beauty technologies and standards. Her sophisticated treatment of this timely topic suggests that new body aesthetics are not forms of "deracializiation" but rather innovative experimentation with identity management. While recognizing that these beauty activities are potentially a form of resistance, Miller also considers the commodification of beauty, exploring how new ideals and technologies are tying consumers even more firmly to an ever-expanding beauty industry. By considering beauty in a Japanese context, Miller challenges widespread assumptions about the universality and naturalness of beauty standards.


Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.


Book
Cybersecurity and the Digital Health: An Investigation on the State of the Art and the Position of the Actors
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain.


Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.


Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.


Book
Cybersecurity and the Digital Health: An Investigation on the State of the Art and the Position of the Actors
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain.

Listing 1 - 10 of 11 << page
of 2
>>
Sort by