Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, Proceedings

by ; ;
Edition: 1st
Format: Paperback
Pub. Date: 2010-09-15
Publisher(s): Springer-Verlag New York Inc
List Price: $139.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$19.80
Online:60 Days access
Downloadable:60 Days
$26.40
Online:90 Days access
Downloadable:90 Days
$33.00
Online:120 Days access
Downloadable:120 Days
$39.60
Online:180 Days access
Downloadable:180 Days
$42.90
Online:1825 Days access
Downloadable:Lifetime Access
$65.99
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$42.90*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book constitutes the refereed proceedings of the 6th International Conference, ICGS3, held in Braga, Portugal, in September 2010.The 31 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from many submissions. The topics are divided into six streams: e-S3, Physical S3, S3 Strategic Frameworks, Cybernetic S3, Socio- Technical Systems as well as Emerging Trends.

Table of Contents

Management of the Benefits on the Client's Involvement on Ergonomic Analysisp. 1
A Security Audit Framework to Manage Information System Securityp. 9
The Cloud's Core Virtual Infrastructure Securityp. 19
Collaboration and Command Tools for Crises Managementp. 28
Trust and Reputation Management for Critical Infrastructure Protectionp. 39
An Approach to Textual Steganographyp. 48
Cybercime Victimisations/Criminalisation and Punishmentp. 55
Baby-Crying Acceptancep. 63
Design of Discrete Variable Structure Controller Based on Variable Boundary Layerp. 71
Cognitive Biometrics: Challenges for the Futurep. 79
Multimodal Biometrics and Multilayered IDM for Secure Authenticationp. 87
Secure Biometric Multi-Logon System Based on Current Authentication Technologiesp. 96
Analysis of Fingerprint Image to Verify a Personp. 104
Methods of Organizational Information Security (A Literature Review)p. 120
OTM Machine Acceptance: In the Arab Culturep. 131
A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trustp. 139
Does Nationality Matter in the B2C Environment? Results from a Two Nation Studyp. 149
Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Comapany)p. 160
Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risksp. 170
The Effect of Non-technical Factors in B2C E-Commerce (A Case Study in Iran)p. 178
Self-monitoring Composite Rods for Sustainable Constructionp. 193
Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approachp. 202
A Review Sustainability Modelsp. 216
The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modelingp. 223
ôFiscal Illusion Causes Fiscal Delusion-Please Be Carefulöp. 232
A Coloured Petri Net Analysis of the Transaction Internet Protocolp. 238
Identification of the Required Security Practices during e-Government Maturityp. 250
Dynamic Device Configuration in Ubiquitous Environmentsp. 263
Mitigation of Control Channel Jamming via Combinatorial Key Distributionp. 274
A Proxy Signature Scheme Based on Coding Theoryp. 282
Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codesp. 291
Author Indexp. 301
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.