Description : With more than 200 million people online and their numbers on the rise, growing also is a perceived threat to personal privacy. A movement to create strict forms of privacy-protecting legislation is well developed in Europe and seems to be coming soon to America. What should corporations expect and how should they comply? Frye analyzes the interests and concerns of Internet users, then offers advice to guide businesses through the minefield of current and emerging privacy issues. Without demonizing or lionizing them, he looks impartially at how corporations could and might actually function in a variety of short- and long-term privacy-sensitive scenarios. His book, among the first to attempt these tasks, is a timely, much needed advisory (and warning) for top echelon excutives in the public and private sectors both--particularly in marketing and sales, where pro-privacy activism is currently most prevalent. It is also an important source of information and thought for academics and their graduate-level students.
Description : This book constitutes the proceedings of the 15th International Conference on Business Process Management, BPM 2017, held in Barcelona, Spain, in September 2017.The 19 revised full papers papers presented were carefully reviewed and selected from 116 initial submissions. The topics selected by the authors demonstrate an increasing interest of the research community in the area of process mining, resonated by an equally fast-growing uptake by different industry sectors. The papers are organized in topical sections on process modeling; process mining; assorted BPM topics; decisions and understanding; and process knowledge.
Description : The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence. Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions. The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.
Description : This book constitutes the refereed proceedings of the Second International Conference on Trust and Privacy in Digital Business, TrustBus 2005, held in Copenhagen, Denmark, in August 2005. The 32 revised full papers presented together with an invited paper were carefully reviewed and selected from more than 100 submissions. The papers are organized in topical sections on digital business, mobile/wireless services, certificate revocation/index search, trust, digital signature, privacy, e-auctions, and smart cards/authentication.
Description : "This book is a collection of research on privacy protection technologies and their application in business organizations"--Provided by publisher.
Description : This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully reviewed. They cover privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.
Description : Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for coming to Zaragoza to participate and debate the new emerging advances in this area. The conference program consisted of one invited talk and nine regular technical papers sessions. The invited talk and keynote speech was delivered by Ahmed Patel from the Computer Networks and Distributed Systems Research Group, University College Dublin, Ireland on “Developing Secure, Trusted and Auditable Services for E-Business: An Autonomic Computing Approach”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control - sues to electronic voting, from trust and protocols to digital rights management. The conference attracted close to 100 submissions of which the program committee - cepted 29 papers for presentation and inclusion in the conference proceedings.
Description : Offers proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011. This title features papers that are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; and, reliability and security of content and data.