Trust, Privacy and Security in Digital Business: 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings
Trust, Privacy and Security in Digital Business: 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings
YOU SAVE £8.60
- Condition: Brand new
- UK Delivery times: Usually arrives within 2 - 3 working days
- UK Shipping: Fee starts at £2.39. Subject to product weight & dimension
- More about Trust, Privacy and Security in Digital Business: 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings
This volume LNCS 13582 contains papers from the 19th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2022, held in Vienna, Austria. The papers cover various topics related to trust, privacy, security, and digital business, including GDPR, authenticity-enhancing technologies, Internet of Things, intrusion detection, honeypots, homomorphic encryption, and serious games.
Format: Paperback / softback
Length: 97 pages
Publication date: 06 October 2022
Publisher: Springer International Publishing AG
This volume LNCS 13582 comprises the papers presented at the 19th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2022, held in Vienna, Austria, in August 2022, as part of the DEXA 2022 conference. A total of 11 full papers were carefully reviewed and selected from 30 submissions, focusing on advancements in the state-of-the-art and practical aspects of trust and privacy in digital business. The papers are organized into topical sections, including Trust, Privacy, Security, Digital Business, GDPR, Authenticity-enhancing Technologies, Internet of Things, Intrusion Detection, Honeypots, Homomorphic Encryption, and Serious Games.
The first section, Trust, explores various aspects of trust in digital business, such as trust models, trust management, and trust assessment. The papers in this section discuss the challenges and opportunities associated with trust in online environments, including the role of trust in building customer relationships, enhancing security, and facilitating digital transactions.
The second section, Privacy, delves into the protection of personal data and privacy in digital business. The papers in this section address the legal and ethical implications of data collection, processing, and storage, as well as the use of privacy-enhancing technologies such as encryption, anonymization, and pseudonymization. The authors discuss the challenges and solutions related to preserving privacy in the age of big data and the Internet of Things.
The third section, Security, focuses on the security of digital business systems and networks. The papers in this section discuss the latest security technologies, such as encryption, authentication, and access control, as well as the strategies and techniques used to prevent and detect security breaches. The authors explore the challenges and risks associated with cyber threats, such as malware, phishing, and ransomware, and propose innovative solutions to mitigate these risks.
The fourth section, Digital Business, examines the role of digital technologies in shaping the business landscape. The papers in this section explore the impact of digital transformation on trust, privacy, and security in digital business, as well as the strategies and practices used to navigate the complexities of the digital environment. The authors discuss the challenges and opportunities associated with digital business, such as the development of new business models, the integration of artificial intelligence and machine learning, and the regulation of digital platforms.
The fifth section, GDPR, focuses on the General Data Protection Regulation (GDPR), a European Union regulation that governs the processing of personal data. The papers in this section discuss the compliance requirements of GDPR, the challenges and opportunities associated with GDPR implementation, and the strategies and practices used to ensure compliance. The authors explore the implications of GDPR for trust, privacy, and security in digital business, as well as the potential risks and benefits of GDPR compliance.
The sixth section, Authenticity-enhancing Technologies, explores the use of technologies to enhance the authenticity and integrity of digital information. The papers in this section discuss the use of digital signatures, tamper-proof seals, and other authentication technologies to prevent fraud, counterfeiting, and unauthorized access. The authors explore the challenges and limitations of authenticity-enhancing technologies, as well as the potential benefits of their use in digital business.
The seventh section, Internet of Things, examines the opportunities and challenges associated with the Internet of Things (IoT). The papers in this section discuss the security and privacy implications of IoT devices, as well as the strategies and techniques used to secure and protect IoT networks. The authors explore the potential benefits of IoT, such as increased efficiency, reduced costs, and improved customer experience, as well as the risks and challenges associated with IoT adoption, such as device vulnerabilities, data privacy, and security breaches.
The eighth section, Intrusion Detection, focuses on the detection and prevention of unauthorized access to digital systems and networks. The papers in this section discuss the latest intrusion detection technologies, such as anomaly detection, behavior analysis, and network monitoring, as well as the strategies and techniques used to detect and respond to security incidents. The authors explore the challenges and limitations of intrusion detection, as well as the potential benefits of its use in digital business.
The ninth section, Honeypots, focuses on the use of honeypots to simulate and detect malicious activity in digital systems and networks. The papers in this section discuss the design and implementation of honeypots, as well as the techniques and strategies used to capture and analyze malicious traffic. The authors explore the potential benefits of honeypots, such as the identification of vulnerabilities and the prevention of cyberattacks, as well as the challenges and limitations of their use in digital business.
The tenth section, Homomorphic Encryption, focuses on the use of encryption techniques that allow users to perform computations on encrypted data without revealing the underlying data. The papers in this section discuss the theoretical foundations of homomorphic encryption, as well as the practical applications of homomorphic encryption in digital business. The authors explore the potential benefits of homomorphic encryption, such as data privacy, data security, and data sharing, as well as the challenges and limitations of its use in digital business.
The eleventh section, Serious Games, explores the use of games and simulations to teach and promote cybersecurity and privacy awareness. The papers in this section discuss the design and development of serious games, as well as the techniques and strategies used to engage and educate users about cybersecurity and privacy risks. The authors explore the potential benefits of serious games, such as improved user awareness, increased knowledge retention, and improved decision-making skills, as well as the challenges and limitations of their use in digital business.
In conclusion, this volume LNCS 13582 provides a comprehensive overview of the latest advancements in trust, privacy, and security in digital business. The papers presented at TrustBus 2022 cover a wide range of topics, from trust models and management to privacy-enhancing technologies and GDPR compliance. The contributions of the authors to the field of trust, privacy, and security in digital business are invaluable, and their insights and recommendations will be of great interest to researchers, practitioners, and policymakers alike
This volume LNCS 13582 comprises the papers presented at the 19th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2022, held in Vienna, Austria, in August 2022, as part of the DEXA 2022 conference. A total of 11 full papers were carefully reviewed and selected from 30 submissions, focusing on advancements in the state-of-the-art and practical aspects of trust and privacy in digital business. The papers are organized into topical sections, including Trust, Privacy, Security, Digital Business, GDPR, Authenticity-enhancing Technologies, Internet of Things, Intrusion Detection, Honeypots, Homomorphic Encryption, and Serious Games.
The first section, Trust, explores various aspects of trust in digital business, such as trust models, trust management, and trust assessment. The papers in this section discuss the challenges and opportunities associated with trust in online environments, including the role of trust in building customer relationships, enhancing security, and facilitating digital transactions.
The second section, Privacy, delves into the protection of personal data and privacy in digital business. The papers in this section address the legal and ethical implications of data collection, processing, and storage, as well as the use of privacy-enhancing technologies such as encryption, anonymization, and pseudonymization. The authors discuss the challenges and solutions related to preserving privacy in the age of big data and the Internet of Things.
The third section, Security, focuses on the security of digital business systems and networks. The papers in this section discuss the latest security technologies, such as encryption, authentication, and access control, as well as the strategies and techniques used to prevent and detect security breaches. The authors explore the challenges and risks associated with cyber threats, such as malware, phishing, and ransomware, and propose innovative solutions to mitigate these risks.
The fourth section, Digital Business, examines the role of digital technologies in shaping the business landscape. The papers in this section explore the impact of digital transformation on trust, privacy, and security in digital business, as well as the strategies and practices used to navigate the complexities of the digital environment. The authors discuss the challenges and opportunities associated with digital business, such as the development of new business models, the integration of artificial intelligence and machine learning, and the regulation of digital platforms.
The fifth section, GDPR, focuses on the General Data Protection Regulation (GDPR), a European Union regulation that governs the processing of personal data. The papers in this section discuss the compliance requirements of GDPR, the challenges and opportunities associated with GDPR implementation, and the strategies and practices used to ensure compliance. The authors explore the implications of GDPR for trust, privacy, and security in digital business, as well as the potential risks and benefits of GDPR compliance.
The sixth section, Authenticity-enhancing Technologies, explores the use of technologies to enhance the authenticity and integrity of digital information. The papers in this section discuss the use of digital signatures, tamper-proof seals, and other authentication technologies to prevent fraud, counterfeiting, and unauthorized access. The authors explore the challenges and limitations of authenticity-enhancing technologies, as well as the potential benefits of their use in digital business.
The seventh section, Internet of Things, examines the opportunities and challenges associated with the Internet of Things (IoT). The papers in this section discuss the security and privacy implications of IoT devices, as well as the strategies and techniques used to secure and protect IoT networks. The authors explore the potential benefits of IoT, such as increased efficiency, reduced costs, and improved customer experience, as well as the risks and challenges associated with IoT adoption, such as device vulnerabilities, data privacy, and security breaches.
The eighth section, Intrusion Detection, focuses on the detection and prevention of unauthorized access to digital systems and networks. The papers in this section discuss the latest intrusion detection technologies, such as anomaly detection, behavior analysis, and network monitoring, as well as the strategies and techniques used to detect and respond to security incidents. The authors explore the challenges and limitations of intrusion detection, as well as the potential benefits of its use in digital business.
The ninth section, Honeypots, focuses on the use of honeypots to simulate and detect malicious activity in digital systems and networks. The papers in this section discuss the design and implementation of honeypots, as well as the techniques and strategies used to capture and analyze malicious traffic. The authors explore the potential benefits of honeypots, such as the identification of vulnerabilities and the prevention of cyberattacks, as well as the challenges and limitations of their use in digital business.
The tenth section, Homomorphic Encryption, focuses on the use of encryption techniques that allow users to perform computations on encrypted data without revealing the underlying data. The papers in this section discuss the theoretical foundations of homomorphic encryption, as well as the practical applications of homomorphic encryption in digital business. The authors explore the potential benefits of homomorphic encryption, such as data privacy, data security, and data sharing, as well as the challenges and limitations of its use in digital business.
The eleventh section, Serious Games, explores the use of games and simulations to teach and promote cybersecurity and privacy awareness. The papers in this section discuss the design and development of serious games, as well as the techniques and strategies used to engage and educate users about cybersecurity and privacy risks. The authors explore the potential benefits of serious games, such as improved user awareness, increased knowledge retention, and improved decision-making skills, as well as the challenges and limitations of their use in digital business.
In conclusion, this volume LNCS 13582 provides a comprehensive overview of the latest advancements in trust, privacy, and security in digital business. The papers presented at TrustBus 2022 cover a wide range of topics, from trust models and management to privacy-enhancing technologies and GDPR compliance. The contributions of the authors to the field of trust, privacy, and security in digital business are invaluable, and their insights and recommendations will be of great interest to researchers, practitioners, and policymakers.
Weight: 185g
Dimension: 235 x 155 (mm)
ISBN-13: 9783031179259
Edition number: 1st ed. 2022
This item can be found in:
UK and International shipping information
UK and International shipping information
UK Delivery and returns information:
- Delivery within 2 - 3 days when ordering in the UK.
- Shipping fee for UK customers from £2.39. Fully tracked shipping service available.
- Returns policy: Return within 30 days of receipt for full refund.
International deliveries:
Shulph Ink now ships to Australia, Belgium, Canada, France, Germany, Ireland, Italy, India, Luxembourg Saudi Arabia, Singapore, Spain, Netherlands, New Zealand, United Arab Emirates, United States of America.
- Delivery times: within 5 - 10 days for international orders.
- Shipping fee: charges vary for overseas orders. Only tracked services are available for most international orders. Some countries have untracked shipping options.
- Customs charges: If ordering to addresses outside the United Kingdom, you may or may not incur additional customs and duties fees during local delivery.