Sebelum terjun ke bisnis online, pelaku bisnis sebaiknya mengenali dan memetakan ranah bisnis yang makin ramai ini. Selain strategi memilih model bisnis, trik marketing, dan memilih platform yang t…
This is the first full-length study of digital identity in a transactional context, from a legal perspective. Clare Sullivan's analysis reveals the emergence of a distinct, new legal concept of ide…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled …
Kompleksnya isu cybersecurity hingga keberagaman multistakeholder yang terlibat dalam cybersecurity memberikan tantangan tersendiri dalam upaya menghadapi cybersecurity. Mulai dari belum adanya def…
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in Ju…
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical …
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way th…
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full…
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers pre…
This volume contains the papers presented a t POST 2019, the 8th Conference on Principles of Security and Trust, held April 11, 2019, in Prague, Czech Republic, as part of ETAPS. Principles of Secu…