Essay aus dem Jahr 2015 im Fachbereich Informatik - Allgemeines, , Sprache: Deutsch, Abstract: Cloud computing is a new computing technology which has attracted much attention. Unfortunately, it is a risk prone technology since users are sharing remote computing resources, data is held remotely, and clients lack of control over data. Therefore, assessing security risk of cloud is important to establish trust and to increase the level of confidence of cloud service consumers and provide cost effective and reliable service and infrastructure of cloud providers. This paper provides a survey on the state of the art research on risk assessment in the cloud environment.
Operational Gaming: An International Approach is the result of research carried out at the International Institute for Applied Systems Analysis (IIASA) situated at Laxenburg (near Vienna), Austria, which relates game theory and system analysis to decision making. The book first shows the relationship of game theory, experimental gaming, and operational gaming through a state-of-the-art survey. This topic includes the history, context, type, and uses of gaming. Then, the text shifts to the discussion on operational gaming, including the definitions of institutional model and game situation concepts. An overview of gaming in different nations including USSR is provided. The book also studies the international transfer of games and the East-West international trade games. The future of this field of study, as well as its implications for humans, is also examined in the latter parts. This book will be of significance to those interested in game theories and those people involved in policy and decision making in their country or organization.
´´Excellent, practical, comprehensive; peppered with good data, colourful anecdotes and practical common sense action points enabling you to solve some big problems in an intelligent way. A great read and an even greater ´´Handbook.´´´´ --John Madelin, Director of Corporate Development, RSA ´´This is a refreshingly different approach to writing about security.´´ --Martin Veitch, Executive Editor, IT Week According to a survey carried out by Lloyds TSB, 54% of all PCs and laptops have been infected with a computer virus Computers and the Internet are a virtual battleground for IT security and hackers. For years, systems have been attacked and defended; the cost of this cyber war has spiralled and will continue to rise. As technology improves, so do the hacker´s weapons of mass destruction. Defeating the Hacker is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them at bay. Whether you are working in the office or from home, shopping online or checking your e-mails, the hacker could be stalking your computer system. So what makes this book different from other security books? Quite simply, the author used to be a world-famous hacker. So you´re getting advice from someone who knows just how exhilarating it can be to break into other people´s computers and who has, in the past, got his kicks from exploiting information surrounding a member of the Royal Family. This gripping book shows you how to protect yourself, your computer and your organisation with practical advice from someone who has now beaten the addiction, and for the first time, reveals all the dirty tricks to watch out for!
Bachelor Thesis from the year 2014 in the subject Computer Science - General, University of Derby, course: Computing and Information Technology, language: English, abstract: Over the last few years social network websites have become a global phenomenon and brought great social impact across the world. Such happenings deserve to be studied and their many aspects investigated thoroughly. The aim of this study was to explore the motives and preferences of users on Facebook. The data was obtained through an online survey on 383 random participants. The result confirmed that Facebook has become a powerful medium of communication. Younger people between ages 14 to 21 are the users who spend more time on Facebook and like to chat with school friends, while age 22 and up chat more with old friends and family members. A sense of security is shown across all ages, gender and education level as in the majority the participants declared that their profile can be only viewed by friends and that they have few unknown friends on Facebook.
Can computers change what you think and do? Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army? ´´Yes, they can,´´ says Dr. B.J. Fogg, director of the Persuasive Technology Lab at Stanford University. Fogg has coined the phrase ´´Captology´´(an acronym for computers as persuasive technologies) to capture the domain of research, design, and applications of persuasive computers.In this thought-provoking book, based on nine years of research in captology, Dr. Fogg reveals how Web sites, software applications, and mobile devices can be used to change people´s attitudes and behavior. Technology designers, marketers, researchers, consumers-anyone who wants to leverage or simply understand the persuasive power of interactive technology-will appreciate the compelling insights and illuminating examples found inside. Persuasive technology can be controversial-and it should be. Who will wield this power of digital influence? And to what end? Now is the time to survey the issues and explore the principles of persuasive technology, and B.J. Fogg has written this book to be your guide. Filled with key term definitions in persuasive computing Provides frameworks for understanding this domain Describes real examples of persuasive technologies
Oncology Informatics: Using Health Information Technology to Improve Processes and Outcomes in Cancer Care encapsulates National Cancer Institute-collected evidence into a format that is optimally useful for hospital planners, physicians, researcher, and informaticians alike as they collectively strive to accelerate progress against cancer using informatics tools. This book is a formational guide for turning clinical systems into engines of discovery as well as a translational guide for moving evidence into practice. It meets recommendations from the National Academies of Science to reorient the research portfolio toward providing greater cognitive support for physicians, patients, and their caregivers to improve patient outcomes. Data from systems studies have suggested that oncology and primary care systems are prone to errors of omission, which can lead to fatal consequences downstream. By infusing the best science across disciplines, this book creates new environments of Smart and Connected Health. Oncology Informatics is also a policy guide in an era of extensive reform in healthcare settings, including new incentives for healthcare providers to demonstrate meaningful use of these technologies to improve system safety, engage patients, ensure continuity of care, enable population health, and protect privacy. Oncology Informatics acknowledges this extraordinary turn of events and offers practical guidance for meeting meaningful use requirements in the service of improved cancer care. Anyone who wishes to take full advantage of the health information revolution in oncology to accelerate successes against cancer will find the information in this book valuable. Presents a pragmatic perspective for practitioners and allied health care professionals on how to implement Health I.T. solutions in a way that will minimize disruption while optimizing practice goals Proposes evidence-based guidelines for designers on how to create system interfaces that are easy to use, efficacious, and timesaving Offers insight for researchers into the ways in which informatics tools in oncology can be utilized to shorten the distance between discovery and practice Bradford (Brad) Hesse was appointed Chief of the National Cancer Institutes (NCI) Health Communication and Informatics Research Branch (HCIRB) in November, 2006. He served as the Acting Chief of HCIRB from 2004-2006. Dr. Hesses professional focus is bringing the power of health information technologies to bear on the problem of eliminating death and suffering from cancer, a cause to which he remains steadfastly dedicated. While at the NCI, he has championed several initiatives that evaluate and progress the science of cancer communication and informatics, including the Health Information National Trends Survey (HINTS) and the Centers of Excellence in Cancer Communication (CECCR). As director of NCIs biennial Health Information National Trends Survey (HINTS), Dr. Hesse is responsible for leading a team of scientists in the development and execution of this nationally representative, general population survey of American adults. HINTS, now entering its fourth iteration, systematically evaluates the publics knowledge, attitudes and behaviors relevant to cancer control in an environment of rapidly changing communication technologies. Dr. Hesse also serves as the program director for NCIs Centers of Excellence in Cancer Communication Research (CECCR). This initiative supports the research of four centers aimed at increasing the knowledge of, tools for, access to, and use of cancer communications by the public, patients, survivors, and health professionals. The centers have been instrumental in defining the next generation of interdisciplinary collaboration in cancer communication science. Prior to his work at NCI, Dr. Hesse conducted research in the interdisciplinary fields of human computer interaction, health communication, medical informatics, and computer-supported decision making. In 1988, he served as a postdoctoral member of the Committee for Social Science Research on Computing at Carnegie Mellon University, and subsequently co-founded the Center for Research on Technology at the American Institutes for Research in Palo Alto, California in 1991. Working in a contract environment before coming to NCI, Dr. Hesse directed projects for the Departments of Education and Labor, the Centers for Disease Control and Prevention, and the National Institutes of Health. He has also
The first of a two volume set on novel methods in harmonic analysis, this book draws on a number of original research and survey papers from well-known specialists detailing the latest innovations and recently discovered links between various fields. Along with many deep theoretical results, these volumes contain numerous applications to problems in signal processing, medical imaging, geodesy, statistics, and data science. The chapters within cover an impressive range of ideas from both traditional and modern harmonic analysis, such as: the Fourier transform, Shannon sampling, frames, wavelets, functions on Euclidean spaces, analysis on function spaces of Riemannian and sub-Riemannian manifolds, Fourier analysis on manifolds and Lie groups, analysis on combinatorial graphs, sheaves, co-sheaves, and persistent homologies on topological spaces. Volume I is organized around the theme of frames and other bases in abstract and function spaces, covering topics such as: The advanced development of frames, including Sigma-Delta quantization for fusion frames, localization of frames, and frame conditioning, as well as applications to distributed sensor networks, Galerkin-like representation of operators, scaling on graphs, and dynamical sampling. A systematic approach to shearlets with applications to wavefront sets and function spaces. Prolate and generalized prolate functions, spherical Gauss-Laguerre basis functions, and radial basis functions. Kernel methods, wavelets, and frames on compact and non-compact manifolds.
Search games and rendezvous problems have received growing attention in computer science within the past few years. Rendezvous problems emerge naturally, for instance, to optimize performance and convergence of mobile robots. This gives a new algorithmic point of view to the theory. Furthermore, modern topics such as the spreading of gossip or disease in social networks have lead to new challenging problems in search and rendezvous. Search Theory: A Game Theoretic Perspective introduces the first integrated approach to Search and Rendezvous from the perspectives of biologists, computer scientists and mathematicians. This contributed volume covers a wide range of topics including rendezvous problems and solutions, rendezvous on graphs, search games on biology, mobility in governed social networks, search and security, and more. Most chapters also include case studies or a survey, in addition to a chapter on the future direction of Search and Rendezvous research. This book targets researchers and practitioners working in computer science, mathematics and biology as a reference book. Advanced level students focused on these fields will also find this book valuable as a secondary text book or reference.
This comprehensive reference consists of 18 chapters from prominent researchers in the field. Each chapter is self-contained, and synthesizes one aspect of frequent pattern mining. An emphasis is placed on simplifying the content, so that students and practitioners can benefit from the book. Each chapter contains a survey describing key research on the topic, a case study and future directions. Key topics include: Pattern Growth Methods, Frequent Pattern Mining in Data Streams, Mining Graph Patterns, Big Data Frequent Pattern Mining, Algorithms for Data Clustering and more. Advanced-level students in computer science, researchers and practitioners from industry will find this book an invaluable reference. Charu Aggarwal is a Research Scientist at the IBM T. J. Watson Research Center in Yorktown Heights, New York. He completed his B.S. from IIT Kanpur in 1993 and his Ph.D. from Massachusetts Institute of Technology in 1996. His research interest during his Ph.D. years was in combinatorial optimization (network flow algorithms), and his thesis advisor was Professor James B. Orlin. He has since worked in the field of data mining, with particular interests in data streams, privacy, uncertain data and social network analysis. He has published over 200 papers in refereed venues and has applied for or been granted over 80 patents. Because of the commercial value of the above-mentioned patents, he has received several invention achievement awards and has thrice been designated a Master Inventor at IBM. He is a recipient of an IBM Corporate Award (2003) for his work on bio-terrorist threat detection in data streams, a recipient of the IBM Outstanding Innovation Award (2008) for his scientific contributions to privacy technology and a recipient of an IBM Research Division Award (2008) for his scientific contributions to data stream research. He has served on the program committees of most major database/data mining conferences, and served as program vice-chairs of the SIAM Conference on Data Mining, 2007, the IEEE ICDM Conference, 2007, the WWW Conference 2009, and the IEEE ICDM Conference, 2009. He served as an associate editor of the IEEE Transactions on Knowledge and Data Engineering Journal from 2004 to 2008. He is an associate editor of the ACM TKDD Journal an action editor of the Data Mining and Knowledge Discovery Journal , editor-in-chief of ACM SIGKDD Explorations and an associate editor of the Knowledge and Information Systems Journal. He is a fellow of the ACM (2013) and the IEEE (2010) for contributions to knowledge discovery and data mining techniques. Jiawei Han received his BS from University of Science and Technology of China in 1979 and his PhD from the University of Wisconsin in Computer Science in 1985.He was a professor in the School of Computing Science at Simon Fraser University. Currently he is a professor, at the Department of Computer Science in the University of Illinois at Urbana-Champaign. He is also the Director of Information Network Academic Research Center (INARC) supported by Network Science Collaborative Technology Alliance (NSCTA) program of U.S. Army Research Lab (ARL). Han has chaired or served on over 100 program committees of international conferences and workshops, including PC co-chair of 2005 (IEEE), International Conference on Data Mining (ICDM), Americas Coordinator of 2006 International Conference on Very Large Data Bases (VLDB). He also served as the founding Editor-In-Chief of ACM Transactions on Knowledge Discovery from Data. He is an ACM fellow and an IEEE Fellow. He received the 2004 ACM SIGKDD Innovations Award and the 2005 IEEE Computer Society Technical Achievement Award. The book: Han, Kamber and Pei, Data Mining: Concepts and Techniques (3rd ed., Morgan Kaufmann, 2011) has been popularly used as a textbook worldwide. He was the 2009 winner of the McDowell Award, the highest technical award made by IEEE. He teaches courses CS412 - Data Mining and CS512 - Advanced Data Mining at University of Illinois, Urbana Champaign. His course CS412 - Data Mining is highly popular among students and is over-subscribed in each offering.