Information Technology and Systems ICITS 2024, Volume 1

This book is composed by the papers written in English and accepted for presentation and discussion at The 2024 International Conference on Information Technology & Systems (ICITS'24), held at Universidad de La Frontera, in Temuco, Chile, between the 24th and the 26th of January 2024. ICIST...

Full description

Bibliographic Details
Other Authors: Rocha, Álvaro (Editor), Ferrás, Carlos (Editor), Hochstetter Diez, Jorge (Editor), Diéguez Rebolledo, Mauricio (Editor)
Format: eBook
Language:English
Published: Cham Springer Nature Switzerland 2024, 2024
Edition:1st ed. 2024
Series:Lecture Notes in Networks and Systems
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03693nmm a2200361 u 4500
001 EB002198934
003 EBX01000000000000001336137
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240301 ||| eng
020 |a 9783031542350 
100 1 |a Rocha, Álvaro  |e [editor] 
245 0 0 |a Information Technology and Systems  |h Elektronische Ressource  |b ICITS 2024, Volume 1  |c edited by Álvaro Rocha, Carlos Ferrás, Jorge Hochstetter Diez, Mauricio Diéguez Rebolledo 
250 |a 1st ed. 2024 
260 |a Cham  |b Springer Nature Switzerland  |c 2024, 2024 
300 |a XI, 479 p. 162 illus., 129 illus. in color  |b online resource 
505 0 |a Detection of fake news using Machine Learning -- Water_Quality_Stat_Analysis -- Customer Segmentation in Online Retail using K-means Clustering Classification and Principal Component Biplot -- Covid interactive query answering using a data cube -- Influence of Indoor Conditions on Sick Building Syndrome: A Data-Driven Investigation -- Análisis de un sistema de horarios como propuesta para la generación automática usando Machine Learning -- Taxonomy of Malicious URL Detection Techniques -- Unmanned Aerial Systems: A Systematic Literature Review -- Vulnerability Analysis - Business Case -- Information security vulnerabilities using steganography as the art of hiding information -- Artificial Intelligence for Cybersecurity: Use Cases and Country Perspective -- Analysis of Plaintext Features in DoH Traffic for DGA Domains Detection -- Cybersecurity for higher education institutions: general strategy vision -- Ethics and AI in HigherEducation: A Study on Students' Perceptions 
653 |a Computational intelligence 
653 |a Application software 
653 |a Computational Intelligence 
653 |a Data Engineering 
653 |a Engineering / Data processing 
653 |a Computer and Information Systems Applications 
700 1 |a Ferrás, Carlos  |e [editor] 
700 1 |a Hochstetter Diez, Jorge  |e [editor] 
700 1 |a Diéguez Rebolledo, Mauricio  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes in Networks and Systems 
028 5 0 |a 10.1007/978-3-031-54235-0 
856 4 0 |u https://doi.org/10.1007/978-3-031-54235-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 006.3 
520 |a This book is composed by the papers written in English and accepted for presentation and discussion at The 2024 International Conference on Information Technology & Systems (ICITS'24), held at Universidad de La Frontera, in Temuco, Chile, between the 24th and the 26th of January 2024. ICIST is a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, professional experiences, and challenges of modern information technology and systems research, together with their technological development and applications. The main topics covered are information and knowledge management; organizational models and information systems; software and systems modeling; software systems, architectures, applications and tools; multimedia systems and applications; computer networks, mobility and pervasive systems; intelligent and decision support systems; big data analytics and applications; human–computer interaction; ethics, computers & security; health informatics; information technologies in education, and Media, Applied Technology and Communication. The primary markets of this book are postgraduates and researchers in Information Systems and Technologies domains. The secondary markets are undergraduates and professionals as well in Information Systems and Technologies domains