The same computer games are played by youths all over the world, and worldwide games become matters of concern in relation to children: worries rise about addiction, violence, education, time, and economy. Yet, these concerns vary depending upon where they are situated: in families, legal contexts, industry or science. They also play out differently across countries and cultures. This situated …
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all in…
Kini dunia nyata dan dunia maya nyaris tak ada bedanya lagi. Bagaimana tidak, semua yang dilakukan di dunia nyata dapat dilakukan di dunia maya. Belajar, bermain, berbisnis, bekerja, bersosialisasi, bahkan berekreasi dapat kita lakukan di dunia maya. Jumlah pengguna internet di seantero dunia sudah mencapai 3,8 miliar atau 51 persen dari total populasi dunia, demikian menurut WeAreSocial.Com h…
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security ma…
This volume discusses the prospects and evolution of informatics (or computer science), which has become the operating system of our world, and is today seen as the science of the information society. Its artifacts change the world and its methods have an impact on how we think about and perceive the world. Classical computer science is built on the notion of an “abstract” machine, which ca…
In this book readers will find technological discussions on the existing and emerging technologies across the different stages of the big data value chain. They will learn about legal aspects of big data, the social impact, and about education needs and requirements. And they will discover the business perspective and how big data technology can be exploited to deliver value within different se…
Introduction to Ubuntu Linux is a user guide that suits newbies. This book based on Ubuntu 20.04 LTS. It includes information on the evolution of Linux-based operating systems, Ubuntu flavours, Ubuntu basics, installation of Ubuntu, and basic commands. This book gives the step-by-step instructions with clear explanations that demystify Ubuntu Linux. This book is for persons with little or no…
Reports on a new generation of Internet controls that establish a new normative terrain in which surveillance and censorship are routine.Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely …
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things…
This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The total of 60 regular papers presented in these volumes was …