Cybersecurity, Privacy and Freedom Protection in the Connected World Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging...

Full description

Bibliographic Details
Other Authors: Jahankhani, Hamid (Editor), Jamal, Arshad (Editor), Lawson, Shaun (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2021, 2021
Edition:1st ed. 2021
Series:Advanced Sciences and Technologies for Security Applications
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03817nmm a2200397 u 4500
001 EB001993368
003 EBX01000000000000001156270
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210608 ||| eng
020 |a 9783030685348 
100 1 |a Jahankhani, Hamid  |e [editor] 
245 0 0 |a Cybersecurity, Privacy and Freedom Protection in the Connected World  |h Elektronische Ressource  |b Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021  |c edited by Hamid Jahankhani, Arshad Jamal, Shaun Lawson 
250 |a 1st ed. 2021 
260 |a Cham  |b Springer International Publishing  |c 2021, 2021 
300 |a XI, 469 p. 134 illus., 72 illus. in color  |b online resource 
505 0 |a 1. Artificial Intelligence and the International Information and Psychological Security -- 2. Blockchain Medicine Administration Records (BMAR): Reflections and Modelling Blockchain with UML -- 3. An Investigation into an Approach to Updating the Governance of Satellite Communications to Enhance Cyber Security -- 4. Enhancing Smart Home Threat Detection with Artificial Intelligence -- 5. Cybercrime Predicting in the Light of Police Statistics -- 6. Prediction of Cyber Attacks During Coronavirus Pandemic by Classification Techniques and Open Source Intelligence 
653 |a Security Science and Technology 
653 |a Economic development 
653 |a Artificial Intelligence 
653 |a Development Studies 
653 |a Computer crimes 
653 |a Privacy 
653 |a Security systems 
653 |a Cybercrime 
653 |a Artificial intelligence 
653 |a Data protection / Law and legislation 
700 1 |a Jamal, Arshad  |e [editor] 
700 1 |a Lawson, Shaun  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Advanced Sciences and Technologies for Security Applications 
028 5 0 |a 10.1007/978-3-030-68534-8 
856 4 0 |u https://doi.org/10.1007/978-3-030-68534-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 006.3 
520 |a This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes andresponsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope